VCP DCV For Vsphere 7.x
VCP DCV For Vsphere 7.x
EDITOR-IN-CHIEF
Mark Taub
EXECUTIVE EDITOR
Nancy Davis
TECHNICAL EDITOR
Joseph Cooper
DEVELOPMENT EDITOR
Ellie Bru
MANAGING EDITOR
Sandra Schroeder
PROJECT EDITOR
Mandie Frank
COPY EDITOR
Kitty Wilson
PROOFREADER
Betty Pessagno
EDITORIAL ASSISTANT
Cindy Teeters
DESIGNER
Chuti Prasertsith
COMPOSITOR
codeMantra
Figure Attribution/Credit
Line
Figure 5-1, Figure 5-2, Figure 5-3, Figure 5-4, Figure VMware Hands on
8-1, Figure 10-1, Figure 10-2, Figure 10-3, Figure 10-4 Lab
First and foremost, I would like to dedicate this book to my loving wife,
Sharyl. Without your support, I would not be able to commit the time
necessary to co-author a book. Thank you for believing in me and allowing
me to have the time for my many endeavors. I would also like to dedicate this
book to my children: Zachary, Brianna, Eileen, Susan, Keenan, and Maura.
—Steve Baca
I would like to dedicate this book to my wife, Angela, and our daughter,
Emma. May it be a reminder of pushing for bigger and brighter things in life.
I love you both with all of my heart.
—Owen Thomas
Index
Online Elements:
Glossary
VCP-DCV Requirements
The primary objective of the VCP-DCV 2021 certification is to demonstrate
that you have mastered the skills to successfully install, configure, and
manage VMware vSphere 7 environments. You can find the exam
requirements, objectives, and other details on the certification web portal, at
http://mylearn.vmware.com/portals/certification/. On the website, navigate to
the Data Center Virtualization track and to the VCP-DCV certification.
Examine the VCP-DCV 2021 requirements based on your qualifications. For
example, if you select that you currently hold no VCP certifications, then the
website indicates that your path to certification is to gain experience with
vSphere 7.0, attend one of the following required training courses, and pass
the Professional vSphere 7.0 (2V0-21.20) exam:
If you select that you currently hold a VCP6-DCV certification, the website
Section 3: Planning and Designing (There are no testable objectives for this
section.)
Section 4: Installing, Configuring, and Setup
Note
Sections 3 and 6 currently do not apply to the 2V0-21.20 exam, but
they may be used for other exams.
Note
For future exams, download and examine the objectives in the updated
exam blueprint. Be sure to use the future Pearson-provided online
appendix specific to the updated exam.
“Do I Know This Already?” Quizzes: Each chapter begins with a quiz
that helps you determine the amount of time you need to spend studying
that chapter.
Foundation Topics: These are the core sections of each chapter. They
explain the protocols, concepts, and configuration for the topics in that
chapter.
Exam Preparation Tasks: This section of each chapter lists a series of
study activities that should be done after reading the “Foundation
Topics” section. Each chapter includes the activities that make the most
sense for studying the topics in that chapter. The activities include the
following:
Key Topics Review: The Key Topics icon appears next to the most
important items in the “Foundation Topics” section of the chapter.
The “Key Topics Review” section lists the key topics from the
chapter and their page numbers. Although the contents of the entire
chapter could be on the exam, you should definitely know the
information listed for each key topic. Review these topics carefully.
Memory Tables: To help you exercise your memory and memorize
some important facts, memory tables are provided. The memory
tables contain only portions of key tables provided previously in the
Book Organization
The chapters in this book are organized such that Chapters 1 through 7
provide in-depth material on vSphere concepts, and Chapters 8 through 14
describe procedures for the installation, configuration, and management of
vSphere components and features. The authors recommend that you read the
entire book from cover to cover at least once. As you read about any topic in
Chapters 1 to 7, keep in mind that you can find corresponding “how to” steps
in Chapters 8 to 14. As you read about any specific procedure in Chapters 8
to 14, keep in mind that you can find associated details (concepts) in
Chapters 1 to 7.
Optionally, you can prepare for the exam by studying for the exam objectives
in order, using Table I-1 as your guide. As you prepare for each exam
objective, you can focus on the most appropriate chapter and section. You
can also refer to related chapters and sections. For example, as you prepare
for Objective 1.2 (Describe vCenter Server topology), you should focus on
the “vCenter Server Topology” section in Chapter 1, but you may also want
to review the “Deploying vCenter Server Components” section in Chapter 8
and the “vSphere Managed Inventory Objects” section in Chapter 5.
When preparing for a specific exam objective, you can use Table I-1 to
identify the sections in the book that directly address the objective and the
sections that provide related information.
Table I-1 Mapping of Exam Objectives to Book Chapters and Sections
Infrastructure
Requirements Deploying
vCenter Server
Components
Other
Requirements
5—vCenter
vCenter Server Server
Topology Features and
Virtual
Machines
Storage
Virtualization—
Traditional Model
Datastore Types
VASA: Manage
Storage
Providers
Managing
Software-Defined Datastore
Storage Models
Configuring and
Datastore Types Managing
vVols
Managing
vVols Storage Policies
Managing
PMEM
Configuring
Network I/O
Control (NIOC)
11—Managing
Storage
Configuring and
Managing SIOC
Instant Clone
Cluster Concepts
and Overview
Creating and
Configuring a
Distributed vSphere Cluster
Resources
Scheduler (DRS)
Creating and
Configuring a
High Availability vSphere DRS
(HA) Cluster
Creating and
Configuring a
vSphere HA
cluster
Cluster Concepts
and Overview
Creating and
Configuring a
Distributed vSphere DRS
Enhanced
vMotion
Compatibility EVC Mode
(EVC)
Creating and
Configuring a
vSphere HA
Cluster
Creating and
vSphere Configuring
Distributed vSphere
Switch (vDS) Standard
Switches
Networking
vDS Networking Policies and
Policies Advanced
Features
VMware
Using vSphere vSphere
Lifecycle Lifecyle
Manager Manager
Implementation
vSAN Concepts
vSphere Trust
Authority (vTA) Configuring and
Managing
vSphere Trust
Authority
(vTA)
Securing Virtual
Machines with Securing
Virtual Intel Virtual
Software Guard Machines with
Extension Intel Software
(vSGX) Guard
Extensions
(SGX)
VMware SDDC
VMware Cloud
Foundation
(VCF)
Inbound and
Outbound
vSphere Virtual Machine
Migration Migration
vSphere
Replication
Site Recovery
Manager (SRM)
VMware Skyline
Integration
Managing SSO
Managing SSO
Configuring
Single Sign-On
(SSO)
12—Managing
vSphere
Security
Managing SSO
vSphere
Standard Switch
Creating and (vSS)
Configuring
vSphere Standard
Switches
Creating and
Configuring
Standard Port
Groups
Adding, Editing,
and Removing Managing SSO
SSO Identity
Sources
Adding an LDAP
Authentication
Source
12—Managing
vSphere Security
Using Active
Directory to
Manage ESXi
Users
vCenter Server
13—Managing
vSphere and
vCenter Server
Upgrading to
vSphere 7.0
Repointing a
vCenter Server
to Another
Domain
Distributed
Creating and Resource
Configuring a Scheduler
vSphere DRS (DRS)
Cluster
vSphere High
Creating and Availability
Configuring a (HA)
vCenter Server
Topology
vCenter High
Availability
Requirements
4—Clusters
and High
Availability
vCenter Server
High
Availability
13—Managing
Managing the
vCenter HA
Cluster
Content Library
Content Library
vCenter Server
Backup
Logging in
vSphere Viewing the
System Event
Log
System Logs
Files
Verifying SSL
Certificates for
Legacy Hosts
vSphere Lifecycle
Manager Using vSphere
Implementation Lifecycle
Manager
Update
Manager
Download
Service
(UMDS)
VMkernel
Networking and
Configuring TCP/IP Stacks
Configuring ESXi
Using Host
Profiles
ESXi Kernel
Options
Resource Pools
Creating a
Resource Pool
Monitoring and
Managing
Resource Pool
Resources
Shares, Limits,
and Reservations
Shares, Limits,
and
Reservations
Creating a
Resource Pool
Monitoring and
Managing
Cluster
Monitoring and Concepts and
Managing Overview
vSphere
Resources
Distributed
Resource
Monitoring and Scheduler
Managing (DRS)
vCenter Server
Services
13—Managing
vSphere and
vCenter Server
Monitoring and
Managing
vCenter Server
Monitoring and
Managing
vSphere
Resources
Network I/O
Control
Configuring
Network I/O
Control (NIOC)
Creating and
Virtual Machine Managing
Snapshots Virtual Machine
Snapshots
Using Lifecycle
Manager
Upgrading to
vSphere 7.0
Managing VMs
Using PowerCLI
Virtual Machine
Cloning
Deploying OVF
and OVA
Templates
14—Managing
Deploying VMs Virtual
Using Content Machines
Library
Managing OVF
Templates
Content Library
Creating and
Configuring
Virtual Machines Virtual Machine
Settings
Managing Virtual
Machines
Storage Policies
Managing
Storage Policies
Storage
Multipathing
Managing and Failover
Multipathing
Changing Path
Selection Policy
Configuring and
Managing VSAN
DRS Rules
Creating Affinity
and Anti-Affinity
Rules
Migrating Virtual
Machines
Virtual Machine
Migration
vMotion Details
Storage
vMotion Details
Applying
Permissions to
ESXi Hosts
Using Host
Profiles
Configuring and
Managing ESXi
Security
Configuring and
Managing
vSphere
Certificates
VMware
Using vSphere vSphere
Lifecycle Lifecycle
Manager Manager
Implementation
About VMware
Update Manager
VMware
vSphere
Using vSphere Lifecycle
Lifecycle Manager
Manager Implementation
14—Managing
Virtual
Machines
Installing and
Upgrading
VMware Tools
VM Hardware
and
Compatibility
14—Managing
Virtual
Machines
Configuring
Virtual Machine
Hardware
Cluster
Concepts and
Overview
Advanced Use
Cases for Alarms
Companion Website
Register this book to get access to the Pearson IT Certification test engine
and other study materials plus additional bonus content. Check this site
regularly for new and updated postings written by the authors that provide
further insight into the more troublesome topics on the exam. Be sure to
check the box indicating that you would like to hear from us to receive
updates and exclusive discounts on future editions of this product or related
products.
To access this companion website, follow these steps:
Print book: Look in the cardboard sleeve in the back of the book for a
piece of paper with your book’s unique PTP code.
Premium Edition: If you purchase the Premium Edition eBook and
Practice Test directly from the www.pearsonITcertification.com website,
the code will be populated on your account page after purchase. Just log
in to www.pearsonITcertification.com, click Account to see details of
your account, and click the Digital Purchases tab.
Amazon Kindle: For those who purchase a Kindle edition from
Amazon, the access code will be supplied directly from Amazon.
Other bookseller e-books: Note that if you purchase an e-book version
from any other source, the practice test is not included because other
Note
Do not lose the activation code because it is the only means with which
you can access the QA content with the book.
Once you have the access code, to find instructions about both the PTP web
app and the desktop app, follow these steps:
Step 1. Open this book’s companion website.
Step 2. Click the Practice Exams button.
Step 3. Follow the instructions listed there both for installing the desktop
app and for using the web app.
Note that if you want to use the web app only at this point, just navigate to
www.pearsontestprep.com, establish a free login if you do not already have
one, and register this book’s practice tests using the registration code you just
found. The process should take only a couple of minutes.
Note
Amazon eBook (Kindle) customers: It is easy to miss Amazon’s e-mail
that lists your PTP access code. Soon after you purchase the Kindle
eBook, Amazon should send an e-mail. However, the e-mail uses very
generic text, and makes no specific mention of PTP or practice exams.
To find your code, read every e-mail from Amazon after you purchase
the book. Also do the usual checks for ensuring your e-mail arrives,
like checking your spam folder.
Note
Other eBook customers: As of the time of publication, only the
publisher and Amazon supply PTP access codes when you purchase
Study mode: Enables you to fully customize your exams and review
answers as you are taking the exam. This is typically the mode you
would use first to assess your knowledge and identify information gaps.
Practice Exam mode: Locks certain customization options, as it is
presenting a realistic exam experience. Use this mode when you are
preparing to test your exam readiness.
Flash Card mode: Strips out the answers and presents you with only the
question stem. This mode is great for late-stage preparation when you
really want to challenge yourself to provide answers without the benefit
of seeing multiple-choice options. This mode does not provide the
detailed score reports that the other two modes do, so you should not use
it if you are trying to identify knowledge gaps.
In addition to these three modes, you will be able to select the source of your
questions. You can choose to take exams that cover all of the chapters or you
can narrow your selection to just a single chapter or the chapters that make up
specific parts in the book. All chapters are selected by default. If you want to
narrow your focus to individual chapters, simply deselect all the chapters and
then select only those on which you wish to focus in the Objectives area.
You can also select the exam banks on which to focus. Each exam bank
comes complete with a full exam of questions that cover topics in every
chapter. You can have the test engine serve up exams from all test banks or
just from one individual bank by selecting the desired banks in the exam bank
area. There are several other customizations you can make to your exam from
the exam settings screen, such as the time of the exam, the number of
questions served up, whether to randomize questions and answers, whether to
show the number of correct answers for multiple-answer questions, and
whether to serve up only specific types of questions. You can also create
This chapter introduces vSphere 7.0, describes its major components, and
identifies its requirements.
1. You plan to deploy vSphere 7.0 for three ESXi hosts and want to
deploy the minimum vCenter Server edition that supports vMotion.
Which vCenter Server edition do you choose?
a. Essentials
b. Essentials Plus
c. Foundation
d. Standard
2. You plan to deploy vSphere 7.0 and want to minimize virtual
machine downtime by proactively detecting hardware failures and
placing the host in Quarantine Mode or Maintenance Mode. Which
feature do you need?
a. vSphere High Availability
b. Proactive HA
c. Predictive DRS
d. vCenter HA
3. You are preparing to deploy and manage a vSphere environment.
Which vCenter Server component provides Security Assertion
Markup Language (SAML) tokens?
a. vCenter Lookup Service
b. VMware Directory Service
vSphere Components
Table 1-2 describes the installable VMware products that are the core
components in a vSphere environment.
Table 1-2 Installable Core vSphere Components
Co Description
mp
one
nt
v The major management component in the vSphere environment. Its
C services include vCenter Server, vSphere Web Client, vSphere Auto
e Deploy, vSphere ESXi Dump Collector, and the components that
n were associated with the Platform Services Controller in prior
te versions: vCenter Single Sign-On, License Service, Lookup Service,
r and VMware Certificate Authority.
S
e
r
v
e
r
E The physical host (including the hypervisor) on which virtual
S machines run.
X
i
S
e
Note
Although it is an add-on product, vSAN is covered in the VCP-DCV
certification exam and in this book.
The major editions of vSphere 7.0 are Standard and Enterprise Plus. Other
editions may be licensed in different manners than the major editions. For
example, the vSphere Desktop edition (for VDI environments) and VMware
You can use Enhanced Linked Mode to link multiple vCenter Server systems.
With Enhanced Linked Mode, you can log in to all linked vCenter Server
systems simultaneously and manage the inventories of the linked systems.
This mode replicates roles, permissions, licenses, and other key data across
the linked systems. To join vCenter Server systems in Enhanced Linked
Mode, connect them to the same vCenter SSO domain, as illustrated in
Figure 1-1. Enhanced Linked Mode requires the vCenter Server Standard
licensing level and is not supported with vCenter Server Foundation or
vCenter Server Essentials. Up to 15 vCenter Server Appliance instances can
be linked together by using Enhanced Linked Mode.
vCenter HA
A vCenter HA cluster consists of three vCenter Server instances. The first
instance, initially used as the Active node, is cloned twice to a Passive node
and to a Witness node. Together, the three nodes provide an active/passive
failover solution.
Deploying each of the nodes on a different ESXi instance protects against
hardware failure. Adding the three ESXi hosts to a DRS cluster can further
protect your environment.
When the vCenter HA configuration is complete, only the Active node has an
active management interface (public IP address), as illustrated in Figure 1-2.
The three nodes communicate over a private network called a vCenter HA
All three nodes are necessary for the functioning of this feature. Table 1-9
provides details for each of the nodes.
Table 1-9 vCenter HA Node Details
Node Description
Type
Active Is the active vCenter Server instance.
Infrastructure Requirements
This section describes some of the main infrastructure requirements that you
should address prior to implementing vSphere.
vCenter Server
vCenter Server Appliance 7.0 can be deployed on ESXi 6.5 hosts or later,
which can be managed by vCenter Server 6.5 or later.
To prepare for deployment of vCenter Server, you should plan to address the
compute specifications listed in Table 1-10.
Table 1-10 Compute Specifications for vCenter Server Appliance
Note
If you want to have an ESXi host with more than 512 LUNs and 2048
paths, you should deploy a vCenter Server Appliance instance for a
Large Environment or X-Large Environment component.
ESXi
To install ESXi 7.0, ensure that the hardware system meets the following
requirements:
Note
SATA disks are considered remote, not local. These disks are not used
as scratch partitions by default because they are considered remote.
You cannot connect a SATA CD-ROM device to a virtual machine on
an ESXi 7.0 host. To use the SATA CD-ROM device, you must use
IDE emulation mode.
For vSphere 7.0, you should ensure that you meet the ESXi booting
considerations:
You can boot using the Unified Extensible Firmware Interface (UEFI),
which enables booting from hard drives, CD-ROM drives, or USB
media.
Note
Changing the host boot type between legacy BIOS and UEFI is not
supported after you install ESXi 7.0.
Storage Requirements
When preparing to implement a vSphere environment, you should ensure that
you have sufficient supported storage resources, as described in this section.
ESXi
Note
You cannot roll back to an earlier version of ESXi after upgrading. If
you are concerned about upgrading, create a backup of the boot device
prior to upgrading; if needed, you can restore from this backup after the
upgrade.
Network Requirements
This section describes some of the key networking requirements for a
successful vSphere deployment.
Networking Concepts
Management
vMotion
vSphere Replication
Infrastructure Services
In addition to providing the required compute, storage, and network
infrastructure, you should provide supporting infrastructure services, such as
Active Directory (AD), Domain Name System (DNS), and Network Time
Protocol (NTP).
AD
In many vSphere environments, vCenter Single Sign-On (SSO) is integrated
with directory services, such as Microsoft Active Directory (AD). SSO can
authenticate users from internal users and groups, and it can connect to
trusted external directory services such as AD. If you plan to leverage AD for
an SSO identity source, you should ensure that the proper network
connectivity, service account credentials, and AD services are available and
ready for use.
If you plan to install vCenter Server for Windows and use AD identity
sources, you should ensure that the Windows server is a member of the AD
domain but is not a domain controller.
Note
If the system you use for your vCenter Server installation belongs to a
workgroup rather than a domain, vCenter Server cannot discover all
domains and systems available on the network when using some
features.
NTP
It is important to provide time synchronization between the nodes. All
vCenter Server instances must be time synchronized. ESXi hosts must be
time synchronized to support features such as vSphere HA. In most
Note
If a vCenter Server Appliance instance is set for NTP time
synchronization, it ignores its time_tools-sync Boolean parameter.
Otherwise, if the parameter is TRUE, VMware Tools synchronizes the
time in the appliance’s guest OS with the ESXi host.
Other Requirements
This section describes a few additional requirements for some of the optional
components (refer to Table 1-3), available vSphere features (refer to Table 1-
4), and add-on products (refer to Table 1-5).
Additional Requirements
The following sections describe some of the requirements for a variety of
commonly used vSphere features.
User Interfaces
The vSphere Host Client and vSphere Client utilize HTML5. The flash-based
vSphere Web Client is not supported in vSphere 7. For Windows users,
VMware supports Microsoft Edge 38 and later, Microsoft Internet Explorer
11.0.96 and later, Mozilla Firefox 45 and later, Google Chrome 50 and later,
and Safari 5.1 and later. For Mac users, VMware supports Safari 5.1 and
later, Mozilla Firefox 45 and later, and Google Chrome 50 and later.
GUI Installer
You can use the GUI installer to interactively install vCenter Server
Appliance. To do so, you must run the GUI deployment from a Windows,
Linux, or Mac machine that is in the network on which you want to deploy
the instance.
SDDC Requirements
To build a software-defined data center (SDDC), you may plan to implement
additional VMware products, such as vSAN, NSX, and vRealize Suite. Here
are some of the requirements you should address.
vSAN
When preparing to implement vSAN, verify that the ESXi hosts meet the
vSAN hardware requirements. All the devices, drivers, and firmware versions
in your vSAN configuration must be certified and listed in the vSAN section
of the VMware Compatibility Guide.
Table 1-14 lists the storage device requirements for vSAN hosts.
Table 1-14 Storage Device Requirements for vSAN Hosts
Component Requirements
Cache One SAS or SATA solid-state disk (SSD) or PCIe flash
device
Virtual For hybrid group configuration, at least one SAS or NL-
machine data SAS magnetic disk
storage
For all-flash group configuration, at least one SAS or
SATA solid-state disk (SSD) or PCIe flash device
Storage One SAS or SATA host bus adapter (HBA) or a RAID
controllers controller that is in passthrough mode or RAID 0 mode
You need to prepare a network for vSAN traffic. This is the network in which
you will connect a VMkernel network adapter for each ESXi host. For non-
stretched vSAN clusters, the network should provide a maximum round-trip
NSX
When preparing to implement NSX, ensure that you address the hardware
and network latency requirements.
A typical NSX Data Center for vSphere (NSX-V) implementation involves
deploying NSX Manager, three NSX Controller instances, and one or more
NSX Edge instances. Table 1-15 lists the hardware requirements for these
NSX-V Version 6.4 devices.
Table 1-15 Hardware Requirements for NSX Appliances
Appliance Memory vCPUs Disk Space
NSX Manager 16 GB 4 or 8 60 GB
NSX 4 GB 4 28 GB
Controller
NSX Edge Compact: 512 Compact: 1 X-Large: 2.75
MB GB
Large: 2
Large: 1 GB Other: 1 GB
Quad Large:
Quad Large: 2 4
GB
X-Large: 6
X-Large: 8 GB
You should ensure that the network latency is no higher than 150 ms RTT for
NSX Manager connections with NSX Controller instances, vCenter Server,
and ESXi hosts.
vRealize Suite
vRealize Operations (vROps) is a tool that provides monitoring of and
analytics for a vSphere environment. It provides smart alerts and also
identifies undersized or oversized virtual machines. Many businesses use
Server Virtualization
VMware vSphere 7.0 is the industry-leading virtualization and cloud
platform. It provides virtualization (abstraction, pooling, and automation) of
x86-64 based server hardware and related infrastructure, such as network
switches. It provides live workload migrations, high availability, and efficient
management at scale in a secured infrastructure.
VMware SDDC
VMC on AWS
VMware Cloud (VMC) on AWS is an integrated cloud offering jointly
developed by AWS and VMware that provides a highly scalable, secure
service that allows organizations to seamlessly migrate and extend their on-
premises vSphere-based environments to the AWS cloud. You can use it to
deliver a seamless hybrid cloud by extending your on-premises vSphere
environment to the AWS cloud.
Cloud Automation
VMware Cloud Assembly and VMware Service Broker are software as a
service (SaaS) offerings that address similar use cases to the on-premises
cases that VMware vRealize Automation addresses.
Storage Infrastructure
This chapter covers the following topics:
This chapter provides details on the storage infrastructure, both physical and
virtual, involved in a vSphere 7.0 environment.
Foundation Topics
Virtual Disk
Virtual disks are sets of files that reside on a datastore that is deployed on
physical storage. From the standpoint of the virtual machine, each virtual disk
appears as if it were a SCSI drive connected to a SCSI controller. The
physical storage is transparent to the virtual machine guest operating system
and applications.
Local Storage
Local storage can be internal hard disks located inside an ESXi host and
external storage systems connected to the host directly through protocols
such as SAS or SATA. Local storage does not require a storage network to
communicate with the host.
Fibre Channel
Fibre Channel (FC) is a storage protocol that a storage area network (SAN)
uses to transfer data traffic from ESXi host servers to shared storage. It
packages SCSI commands into FC frames. The ESXi host uses Fibre Channel
host bus adapters (HBAs) to connect to the FC SAN, as illustrated in Figure
2-1. Unless you use directly connected Fibre Channel storage, you need Fibre
Channel switches to route storage traffic. If a host contains FCoE (Fibre
Channel over Ethernet) adapters, you can connect to shared Fibre Channel
devices by using an Ethernet network.
iSCSI
FCoE
If an ESXi host contains FCoE adapters, it can connect to shared Fibre
Channel devices by using an Ethernet network.
NAS/NFS
vSphere uses NFS to store virtual machine files on remote file servers
accessed over a standard TCP/IP network. ESXi 7.0 uses Network File
System (NFS) Version 3 and Version 4.1 to communicate with NAS/NFS
servers, as illustrated in Figure 2-1. You can use NFS datastores to store and
manage virtual machines in the same way that you use the VMFS datastores.
VMFS
The datastores that you deploy on block storage devices use the native
vSphere Virtual Machine File System (VMFS) format. VMFS is a special
high-performance file system format that is optimized for storing virtual
machines.
A raw device mapping (RDM) is a mapping file that contains metadata that
resides in a VMFS datastore and acts as a proxy for a physical storage device
(LUN), allowing a virtual machine to access the storage device directly. It
Virtual compatibility mode: The RDM acts much like a virtual disk
file, enabling extra virtual disk features, such as the use of virtual
machine snapshot and the use of disk modes (dependent, independent—
persistent, and independent—nonpersistent).
Physical compatibility mode: The RDM offers direct access to the
SCSI device, supporting applications that require lower-level control.
Virtual disk files are preferred over RDMs for manageability. You should
only use RDMs when necessary. Use cases for RDMs include the following.
Note
To support vMotion involving RDMs, be sure to maintain consistent
LUN IDs for RDMs across all participating ESXi hosts.
Note
To support vMotion for NPIV-enabled virtual machines, place the
RDM files, virtual machine configuration file, and other virtual
machines in the same datastore. You cannot perform Storage vMotion
when NPIV is enabled.
vSAN
vSAN is a layer of distributed software that runs natively on each hypervisor
in a cluster. It aggregates local or direct-attached capacity, creating a single
storage pool shared across all hosts in the vSAN cluster.
I/O Filters
I/O filters are software components that can be installed on ESXi hosts and
can offer additional data services to virtual machines. Depending on the
implementation, the services might include replication, encryption, caching,
and so on.
Datastore Types
In vSphere 7.0, you can use the datastore types described in the following
sections.
VMFS Datastore
You can create VMFS datastores on Fibre Channel, iSCSI, FCoE, and local
storage devices. ESXi 7.0 supports VMFS Versions 5 and 6 for reading and
writing. ESXi 7.0 does not support VMFS Version 3. Table 2-2 compares the
NFS
You can create NFS datastores on NAS devices. ESXi 7.0 supports NFS
Versions 3 and 4.1. To support both versions, ESXi 7.0 uses two different
NFS clients. Table 2-3 compares the capabilities of NFS Versions 3 and 4.1.
Table 2-3 Comparison of NFS Version 3 and Version 4.1 Characteristics
NFS Characteristics Version 3 Version 4.1
Security mechanisms AUTH_SYS AUTH_SYS and
Kerberos (krb5 and
krb5i)
Encryption algorithms with N/A AES256-CTS-HMAC-
Kerberos SHA1-96
AES128-CTS-HMAC-
SHA1-96
Multipathing Not supported Supported through the
session trunking
Locking mechanisms Propriety Server-side locking
vVols Datastores
vSAN Datastores
You can create a vSAN datastore in a vSAN cluster. vSAN is a
hyperconverged storage solution, which combines storage, compute, and
virtualization into a single physical server or cluster. The following section
describes the concepts, benefits, and terminology associated with vSAN.
VMware NVMe
NVMe storage is a low-latency, low-CPU-usage, and high-performance
alternative to SCSI storage. It is designed for use with faster storage media
equipped with non-volatile memory, such as flash devices. NVMe storage
can be directly attached to a host using a PCIe interface or indirectly through
different fabric transport (NVMe-oF).
In a NVMe storage array, a namespace represents a storage volume. An
NVMe namespace is analogous to a storage device (LUN) in other storage
arrays. In the vSphere Client, an NVMe namespace appears in the list of
storage devices. You can use a device to create a VMFS datastore.
(Load
(Load
Balan
ce—
Laten
cy)
HPP best practices include the following:
vSAN Characteristics
vSAN is like network-distributed RAID for local disks, transforming them
into shared storage. vSAN uses copies of VM data, where one copy is local
and another copy is on one of the other nodes in the cluster. The number of
copies is configurable. Here are some of the features of vSAN:
vSAN Terminology
Be sure to know the following terminology for the Professional VMware
vSphere 7.x (2V0-21.20) exam:
Note
The capacity disks contribute to the advertised datastore capacity. The
flash cache devices are not included as capacity.
Note
In vCenter Server 7.0.0a, vSAN File Services and vSphere Lifecycle
Manager can be enabled simultaneously on the same vSAN cluster.
Standard Cluster
A standard vSAN cluster, as illustrated in Figure 2-3, consists of a minimum
of three hosts, typically residing at the same location and connected on the
same Layer 2 network. 10 Gbps network connections are required for all-
flash clusters and are recommended for hybrid configurations.
Stretched Cluster
You can create a stretched vSAN cluster that spans two geographic sites and
continues to function if a failure or scheduled maintenance occurs at one site.
Stretched clusters, which are typically deployed in metropolitan or campus
environments with short distances between sites, provide a higher level of
availability and inter-site load balancing.
You can use stretched clusters for planned maintenance and disaster
avoidance scenarios, with both data sites active. If either site fails, vSAN uses
the storage on the other site, and vSphere HA can restart virtual machines on
the remaining active site.
Note
A link failure is a loss of network connection between two sites or
between one site and the witness host.
Each stretched cluster consists of two data sites and one witness host. The
witness host resides at a third site and contains the witness components of
virtual machine objects. It contains only metadata and does not participate in
storage operations. Figure 2-5 shows an example of a stretched cluster, where
the witness node resides at a third site, along with vCenter Server.
Note
The witness virtual appliance is an ESXi host in a VM, packaged as an
OVF or OVA, which is available in different options, depending on the
size of the deployment.
Note
Consider the following guidelines and best practices for stretched clusters:
vSAN Limitations
SCSI UNMAP
SCSI UNMAP commands, which are supported in vSAN Version 6.7 Update
1 and later, enable you to reclaim storage space that is mapped to deleted
vSAN objects. vSAN supports the SCSI UNMAP commands issued in a
guest operating system to reclaim storage space. vSAN supports offline
unmaps as well as inline unmaps. On Linux, offline unmaps are performed
with the fstrim(8) command, and inline unmaps are performed when the
mount -o discard command is used. On Windows, NTFS performs inline
unmaps by default.
Note
Deduplication and compression might not be effective for encrypted
VMs.
vSAN Encryption
You can use data at rest encryption in a vSAN cluster, where all data is
encrypted after all other processing, such as deduplication, is performed. All
files are encrypted, so all virtual machines and their data are protected. Only
administrators with encryption privileges can perform encryption and
decryption tasks. Data at rest encryption protects data on storage devices in
the event that a device is removed from the cluster.
vSAN encryption requires an external key management server (KMS), the
vCenter Server system, and ESXi hosts. vCenter Server requests encryption
keys from an external KMS. The KMS generates and stores the keys, and
vCenter Server obtains the key IDs from the KMS and distributes them to the
ESXi hosts. vCenter Server does not store the KMS keys but keeps a list of
key IDs.
vSAN uses encryption keys in the following manner:
vCenter Server requests an AES-256 key encryption key (KEK) from the
KMS.
Note
Each ESXi host uses the KEK to encrypt its DEKs and stores the
encrypted DEKs on disk. The host does not store the KEK on disk. If a
host reboots, it requests the KEK with the corresponding ID from the
KMS. The host can then decrypt its DEKs as needed.
vSAN Requirements
Prior to deploying a vSAN cluster, you should address the requirements
outlined in the following sections.
For example, say that you plan to use RAID 1 for a 500 GB virtual disk that
you expect to be completely filled. In this case, the required capacities are
1000 GB, 1500 GB, and 2000 GB for PFTT set to 1, 2, and 3, respectively.
Keep in mind the following guidelines for vSAN capacity sizing:
When selecting devices to use for vSAN cache hardware (such as PCIe vs.
SDD flash devices), in addition to cost, compatibility, performance, and
capacity, you should consider write endurance.
When selecting storage controllers for use in a vSAN cluster, in addition to
Hardware Requirements
You should examine the vSAN section of the VMware Compatibility Guide
to verify that all the storage devices, drivers, and firmware versions are
certified for the specific vSAN version you plan to use. Table 2-8 lists some
of the vSAN storage device requirements.
Table 2-8 vSAN Storage Device Requirements
Component Requirements
Cache One SAS or SATA SSD or PCIe flash device is required.
The memory requirements for vSAN depend on the number of disk groups
and devices that the ESXi hypervisor must manage. According to VMware
Knowledge Base (KB) article 2113954, the following formula can be used to
calculate vSAN memory consumption:
where:
DiskGroupFootprint = DISKGROUP_FIXED_FOOTPRINT +
DISKGROUP_SCALABLE_FOOTPRINT + CacheSize ×
CACHE_DISK_FOOTPRINT + NumCapacityDisks ×
CAPACITY_DISK_FOOTPRINT
The ESXi Installer creates a coredump partition on the boot device, whose
default size is typically adequate. If ESXi host memory is 512 GB or less,
you can boot the host from a USB, SD, or SATADOM device. When you
boot a vSAN host from a USB device or SD card, the size of the boot device
must be at least 4 GB. If ESXi host memory is more than 512 GB, consider
the following guidelines:
You can boot the host from a SATADOM or disk device with a size of at
least 16 GB. When you use a SATADOM device, use a single-level cell
(SLC) device.
If you are using vSAN 6.5 or later, you must resize the coredump
partition on ESXi hosts to boot from USB/SD devices.
Consider using at least 32 GB memory per host for full vSAN operations
based on five disk groups per host and seven capacity devices per disk group.
Plan for 10% CPU overhead for vSAN.
Cluster Requirements
You should verify that a host cluster contains a minimum of three hosts that
contribute capacity to the cluster. A two-host vSAN cluster consists of two
data hosts and an external witness host. It is important to ensure that each
host that resides in a vSAN cluster does not participate in other clusters.
Software Requirements
For full vSAN capabilities, the participating hosts must be version 6.7 Update
3 or later. vSAN 6.7.3 and later software supports all on-disk formats.
Maximum RTT between each main site and the witness host in a
stretched cluster is 200 ms.
License Requirements
You should ensure that you have a valid vSAN license that supports your
vSAN Policies
Storage policies are used in vSAN to define storage requirements for virtual
machines. These policies determine how to provision and allocate storage
objects within the datastore to guarantee the required level of service. You
should assign at least one storage policy to each virtual machine in a vSAN
datastore. Otherwise, vSAN assigns a default policy with Primary Level of
Failures to Tolerate set to 1, a single disk stripe per object, and a thin-
provisioned virtual disks.
Storage policies, including those specific to vSAN, are covered later in this
chapter.
VASA
Storage vendors or VMware can make use of VASA. Storage providers
(VASA providers) are software components that integrate with vSphere to
provide information about the physical storage capabilities. Storage providers
are utilized by either ESXi hosts or vCenter to gather information about the
storage configuration and status and display it to administrators in the
vSphere Client. There are several types of storage providers:
The information that storage providers offer may include the following:
Unless the storage provider is VMware, the vendor must provide the policy.
There are other requirements related to implementing storage providers as
well:
Contact your storage vendor for information about deploying the storage
provider and ensure that it is deployed correctly.
Ensure that the storage provider is compatible by verifying it with the
VMware Compatibility Guide.
Do not install the VASA provider on the same system as vCenter.
Upgrade storage providers to new versions to make use of new
functionalities.
Unregister and reregister a storage provider when upgrading.
VAAI
VAAI, also known as hardware acceleration or hardware offload APIs,
enable ESXi hosts to be able to communicate with storage arrays. They use
functions called storage primitives, which allow offloading of storage
operations to the storage array itself. The goal is to reduce overhead and
increase performance. This allows storage to be responsible for cloning
operations and zeroing out disk files. Without VAAI hardware offloading, the
VMkernel Data Mover service is used to copy data from the source datastore
to the destination datastore, incurring physical network latencies and
increasing overhead. The VMkernel always attempts to offload to the storage
array by way of VAAI, but if the offload fails, it employs its Data Mover
service.
Storage primitives were introduced in vSphere 4.1 and applied to Fibre
Channel, iSCSI, and FCoE storage only. vSphere 5.0 added primitives for
NAS storage and vSphere thin provisioning. The storage primitives discussed
in the following sections are available in vSphere 7.0.
Atomic Test and Set (ATS): Replaces the use of SCSI reservations on
VMFS datastores when updating metadata. With SCSI reservations, only
one process can establish a lock on the LUN at a time, leading to
contention and SCSI reservation errors. Metadata updates occur
whenever a thin-provisioned disk grows, a VM is provisioned, or a
vSphere administrator manually grows a virtual disk. With ATS, a lock
is placed on a sector of the VMFS datastore when updating metadata.
ATS allows larger datastores to be used without running into such
contention issues. On storage arrays that do not support VAAI, SCSI
Full File Clone: Works the same way as XCOPY but applies to NAS
devices as opposed to block storage devices.
Fast File Clone/Native Snapshot Support: Allows snapshot creation to
be offloaded to the storage device for use in linked clones used in
VMware Horizon View or in vCloud Director, which leverage reading
from replica disks and writing to delta disks.
Extended Statistics: Allows an ESXi host to have insight into space
utilization on a NAS device. For example, when a NAS device is using
thin provisioning without the Extended Statistics primitive, the ESXi
host lacks visibility into the actual storage usage, leading you to run out
Config-vVol: Metadata
Data-vVol: VMDKs
Mem-vVol: Snapshots
Swap-vVol: Swap files
Other-vVol: Vendor solution specific
Multipathing Overview
VMware NMP
VMware NMP supports all storage arrays listed on the VMware storage HCL
and provides a default path selection algorithm based on the array type. It
Note
You do not need to obtain or download any SATPs. ESXi
automatically installs an appropriate SATP for any array you use.
Beginning with vSphere 6.5 Update 2, VMW_SATP_LOCAL provides
multipathing support for the local devices, except the devices in 4K
native format. You are no longer required to use other SATPs to claim
multiple paths to the local devices.
PSA Summary
To summarize, the PSA performs the following tasks:
The following process occurs when VMware NMP receives an I/O request
for one of its managed storage devices:
Step 1. The NMP calls the appropriate PSP.
Step 2. The PSP selects an appropriate physical path.
Step 3. The NMP issues the I/O request on the selected path.
Step 4. If the I/O operation is successful, the NMP reports its completion.
Step 5. If the I/O operation reports an error, the NMP calls the appropriate
SATP.
Step 6. The SATP interprets the errors and, when appropriate, activates the
inactive paths.
Step 7. The PSP selects a new path for the I/O.
When coordinating the VMware native modules and any installed third-party
MPPs, the PSA performs the following tasks:
Storage Policies
Storage policies can be used to define which datastores to use when placing
virtual machines disk. The following storage policies can be created:
Eager zeroed thick: The disk space for the virtual disk files is allocated
and erased (zeroed out) at the time of creation. If the storage device
supports VAAI, this operation can be offloaded to the storage array.
Otherwise, the VMkernel writes the zeros, and this process could be
slow. This method is the slowest for virtual disk creation, but it is the
best for guest performance.
Lazy zeroed thick: The disk space for the virtual disk files is allocated
at the time of creation but not zeroed. Each block is zeroed, on demand
at runtime, prior to being presented to the guest OS for the first time.
This increases the time required for disk format operations and software
installations in the guest OS.
Thin provisioned: The disk space for the virtual disk files is not
For If set to yes, this policy forces provisioning of objects, even when
ce policies cannot be met. The default setting for this policy is no.
Pro
visi
oni
ng
Obj This policy defines the percentage of VMDK objects that must be
ect thick provisioned on deployment. The options are as follows:
Spa
ce
Res
erv
Thin provisioning (default value)
atio
n
25% reservation
50% reservation
75% reservation
Thick provisioning
You can control the behavior of SDRS by specifying thresholds. You can use
the following standard thresholds to set the aggressiveness level for SDRS:
SDRS Recommendations
For datastore clusters, where SDRS automation is set to No Automation
(manual mode), SDRS makes as many recommendations as necessary to
enforce SDRS rules, balance the space, and balance the I/O resources of the
datastore cluster. Each recommendation includes the virtual machine name,
the virtual disk name, the data-store cluster name, the source datastore, the
destination datastore, and a reason for the recommendation.
SDRS makes mandatory recommendations when the datastore is out of space,
Anti-affinity Rules
To ensure that a set of virtual machines are stored on separate datastores, you
can create anti-affinity rules for the virtual machines. Alternatively, you can
use an affinity rule to place a group of virtual machines on the same
datastore.
By default, all virtual disks belonging to the same virtual machine are placed
on the same datastore. If you want to separate the virtual disks of a specific
virtual machine on separate datastores, you can do so with an anti-affinity
rule.
Review Questions
1. You are deploying datastores in a vSphere environment and want to
use the latest VMFS version that supports ESXi 6.5 and ESXi 7.0.
Which version should you use?
a. VMFS Version 3
b. VMFS Version 4
c. VMFS Version 5
d. VMFS Version 6
2. You are preparing to manage and troubleshoot a vSAN
environment. Which of the following is a command-line interface
that provides a cluster-wide view and is included with the vCenter
Server deployment?
a. VMware PowerCLI
b. vSAN Observer
c. Ruby vSphere Console
d. esxcli
3. You want to integrate vSphere with your storage system. Which of
the following provides software components that integrate with
vSphere to provide information about the physical storage
capabilities?
a. VASA
b. VAAI
c. SATP
d. NMP
Network Infrastructure
This chapter covers the following topics:
This chapter provides details for the network infrastructure, both physical and
virtual, involved in a vSphere 7 environment.
Foundation Topics
Virtual NICs
Much as a physical server may have multiple NICs to connect to physical
networks, a virtual machine may have multiple virtual NICs (vNICs) to
connect to virtual networks. Much like a physical NIC, each vNIC has a
unique MAC address. The vNIC appears as a traditional NIC to a virtual
machine’s guest OS. The guest OS can assign IP addresses to vNICs.
In addition to requiring network connectivity for virtual machine networking,
ESXi requires network connectivity for host management activities and other
purposes. To accommodate this need, you should configure one or more
VMkernel virtual network adapters on each host. For example, when
connecting the vCenter Server or the vSphere Host Client to an ESXi host,
you provide the address (IP address or fully qualified host name) of a
VMkernel virtual network adapter that is enabled for management traffic.
Much as a virtual machine can use multiple virtual network adapters, each
ESXi host may use multiple VMkernel network adapters.
VLANs
A virtual LAN (VLAN) is a logical partition of a physical network at the data
link layer (Layer 2). A VLAN is typically associated with a broadcast domain
and is used to isolate the traffic from other networks. A broadcast domain is a
collection of network devices that can receive traffic destined to a broadcast
address. A physical switch, by default, adheres to this behavior. With VLAN
Note
IEEE 802.1Q is the networking standard that supports VLANs on an
Ethernet network.
Each virtual machine typically has one or more vNICs to allow network
communication. To connect a virtual machine to a vSS, you should connect
one of its vNICs to a virtual machine port group on the vSS. To allow the
virtual machines to communicate with virtual machines on other hosts,
connect the port group to one or more physical NIC uplinks in the vSS. The
physical NIC should be connected to a physical Ethernet switch. The inbound
and outbound Ethernet frames travel through the physical NIC uplink on the
vSS. Virtual machines in a port group that do not have a physical NIC uplink
can only communicate with other vNICs on the same host and port group.
The vSS provides features such as VLAN tagging, NIC teaming, network
security policies, and traffic shaping. The feature set provided by a vSS is
802.1q tagging attacks: A vSS does not perform the dynamic trunking
required for this type of attack.
Double-encapsulation attacks: A vSS drops any double-encapsulated
frames that a virtual machine attempts to send on a port configured for a
specific VLAN.
Multicast brute-force attacks: A vSS does not allow frames to leave
their correct broadcast domain (VLAN).
Spanning tree attacks: A vSS does not participate in a spanning tree
protocol.
MTU
The standard size for Ethernet packets, or frames, is 1500 bytes. Using larger
(jumbo) frames can provide better utilization of a fast network link. To allow
jumbo frames on a vSS or vDS, you must set the virtual switch’s Maximum
Transmission Unit (MTU) setting to a value larger than 1500 bytes, such as
9000 bytes. To use jumbo frames, you must configure the network to support
it end to end, including physical NICs and physical switches. To allow a
virtual machine to use jumbo frames, you must configure the virtual machine
to use the VMXNET3 virtual network adapter. (E1000 and E1000E adapters
You can set the policies directly on a vSS. To override a policy at the port
group level, just set a different policy on the port group.
A vDS supports additional policies. See the “vDS Network Policies” section,
later in this chapter, for details.
The vDS has additional teaming options that are addressed later in this
chapter.
Table 3-2 lists some advantages and disadvantages for selecting Route Based
on IP Hash.
Table 3-2 Advantages and Disadvantages of IP Hash NIC Teaming
Advantages Disadvantages
A more even distribution of the load Highest resource
compared to Route Based on Originating consumption compared to
Virtual Port and Route Based on Source the other load-balancing
MAC Hash algorithms
Promiscuous Mode: For a vSS port group, the default value is Reject.
By default, the vNIC receives only those frames that match the effective
MAC address. If this option is set to Accept, the virtual switch sends all
frames on the wire to the vNIC, allowing virtual machines to receive
packets that are not destined for them. This setting allows the use of tools
such as tcpdump and Wireshark inside a guest operating system.
MAC Address Changes: For a vSS port group, the default value is
Accept. By default, ESXi accepts the effective MAC address change. If
this option is set to Reject, the behavior changes such that ESXi does not
honor requests to change the effective MAC address to an address that is
different from the initial MAC address. Instead, it disables the virtual
switch port until the effective MAC address matches the initial MAC
address. The guest OS is unaware that the request was not honored.
Forged Transmits: For a vSS port group, the default value is Accept.
By default, ESXi does not compare source and effective MAC addresses
and does not drop the packet due to a mismatch. If this option is set to
Reject, ESXi compares the source and effective MAC addresses and
drops the packet if the addresses do not match.
Note
VLAN Policies
You can apply a VLAN policy to a vSS, such that all port groups on the vSS
You can define a custom name for each vDS, distributed port group, and
uplink port group using the vSphere Client. At the switch level, you can make
several more settings and take more actions with a vDS than with a vSS, such
as creating private VLANs and configuring port mirroring sessions. vDS
offers many advantages over vSS but requires Enterprise Plus licensing.
Table 3-3 provides a side-by-side comparison of the features that are
available in vSS and vDS.
Table 3-3 Comparison of vSS and vDS Features
Feature vSS vDS
Layer 2 switch X X
VLAN segmentation (802.1q tagging) X X
IPv6 support X X
NIC teaming X X
Outbound traffic shaping X X
Cisco Discovery Protocol (CDP) X X
Inbound traffic shaping X
As mentioned earlier, you can apply these policies at the distributed port
group and distributed port levels.
Monitoring
Traffic Filtering and Marking
Resources Allocation
Port Blocking
Port-Blocking Policies
When needed, you can block traffic to specific distributed ports. For
example, if a virtual machine is broadcasting a lot of traffic due to a broken
or hacked application and starts consuming a large portion of the network
bandwidth, you may want to temporarily block traffic to its distributed port.
This is particularly useful if you are a network administrator who has
permission to modify the vDS but do not have permission to modify the
virtual machine.
As with other policies, to allow individual port blocking, you first need to
allow port blocking policy override on the distributed port group. Optionally,
you can block all ports in a port group.
When you apply a resource allocation policy to a distributed port group, you
can assign a network resource pool to the port group. Network resource pools
leverage Network I/O Control (NIOC) to allocate resources for network
traffic, as explained in the following sections.
With NIOC Version 3, a vSphere DRS cluster places the virtual machine on a
host that can fulfill the reserved bandwidth for the virtual machine, according
to the active teaming policy. In the following situations, vSphere DRS
migrates a virtual machine to another host to satisfy the virtual machine’s
bandwidth reservation:
The reservation is changed to a value that the initial host can no longer
satisfy.
A physical adapter that carries traffic from the virtual machine is offline.
Action: Tag
DSCP Value: 26
Traffic Direction: Egress
Traffic Qualifiers: IP Qualifier
Protocol: UDP
Destination Port: 5060
Source Address: IP address matches 192.168.2.0 with prefix length 24
Private VLANs
Private VLANs (PVLANs) are an extension of the VLAN standard that is not
double encapsulated but that allows a VLAN to effectively be subdivided into
other VLANs. This is useful for a hosting provider that has run out of
VLANs or in any environment where 4094 VLANs are not enough.
A VLAN that is to be subdivided becomes known as the primary private
VLAN. This primary PVLAN is then carved up into one or multiple
secondary PVLANs that exist only within the primary. When a virtual
machine or VMkernel port sends a packet, that packet is tagged at the
distributed port group level on the vDS. Because this is not double
encapsulation, packets travel with only one VLAN tag at a time. However,
physical switches could be confused by seeing MAC addresses tagged with
more than one VLAN tag, unless the physical switches are PVLAN aware
and have their PVLAN tables configured appropriately. If the physical
network is configured correctly, it identifies that the secondary PVLAN
exists as part of the primary.
There are three different types of secondary PVLANs:
Create a vDS
Attach hosts to the vDS
Create distributed port groups
Assign policies to port groups
Migrate virtual machines and VMkernel virtual network adapters to the
vDS
Monitor alerts, tasks, and events
Monitor port state
Manage network resources
Port Mirroring
The session properties are dependent on the session type and include the
following settings:
Static binding: With static binding (which is the default), when a vNIC
attaches to a port in a distributed port group, the connection is static,
which means the virtual machine remains attached to the port, regardless
of the power state of the virtual machine. This binding is performed and
controlled by vCenter Server.
Ephemeral binding: Ephemeral means there is no binding of the vNIC
to a specific virtual switch port. With this setting, virtual switch ports are
created and deleted on demand by the host. At any moment, the number
of ports for an ephemeral distributed port group is equivalent to the
number of running vNICs connected to the port group.
Note
Having an available ephemeral port group is useful in cases where
vCenter Server is down and you need to assign a virtual machine to a
port group. For example, if a vCenter Server Appliance (VCSA) device
is connected to a distributed port group with static binding, you may
fail to reconnect the VCSA device to the network after restoring the
VCSA device because vCenter is required to assign the port. In this
case, you should be successful in connecting the restored VCSA device
to the ephemeral distributed port group because the ESXi host will
You can control the number of ports and the port allocation in a distributed
port group. The port allocation can be fixed or elastic:
Elastic: By default, ports in the port group are created and removed on
demand. For example, if the port group is configured for eight ports and
elastic port allocation, you can connect nine vNICs to the port group
because when you connect the eighth vNIC to the port group, eight more
ports are automatically added.
Fixed: The number of ports in the port group is static. Ports are not
automatically created or removed. For example, if the port group is
configured for eight ports and fixed port allocation, you cannot connect
9nine vNICs to the port group. When you attempt to connect the ninth
vNIC to the port group, you get the error “no free port is available.”
In vSphere 7.0, the default settings for a distributed port group are static
binding, elastic port allocation, and eight ports.
In the past, the ephemeral setting seemed like the easiest way to go because it
required the least administrative effort to address an ever-growing
environment. That changed in vSphere 5.1, when static port binding became
“elastic” by default.
LACP Support
In vSphere 7.0, a vDS supports LACP. This means you can connect ESXi
hosts to physical switches by using dynamic link aggregation. You can create
multiple link aggregation groups (LAGs) on a distributed switch to aggregate
the bandwidth of physical NICs on ESXi hosts that are connected to LACP
port channels. This enables you to increase the network bandwidth,
redundancy, and load balancing to the port groups. You need to configure
each LAG with two or more ports and connect physical NICs to the ports.
Within a LAG, the ports are teamed, such that the network traffic is load
balanced between the ports using an LACP hashing algorithm.
For each LAG on a vDS, a LAG object is created on each associated host
On a host proxy switch, a physical NIC can connect to just one LAG port. On
a distributed switch, a LAG port can connect to multiple physical NICs from
A virtual machine may receive packets from the wrong groups because
the switch forwards packets based on the multicast group’s destination
MAC address, which can potentially be mapped to up to 32 IP multicast
groups.
Due to a limitation of the forwarding model, a virtual machine that is
subscribed for traffic from more than 32 multicast MAC addresses may
receive packets from the wrong groups.
The switch does not filter packets based on source address, as defined in
IGMP Version 3.
Multicast Snooping
vDS 6.0.0 and later support multicast snooping, which forwards multicast
traffic based on the Internet Group Management Protocol (IGMP) and
Multicast Listener Discovery (MLD) messages from virtual machines.
Multicast snooping supports IGMP Version 1, IGMP Version 2, and IGMP
Version 3 for IPv4 multicast group addresses and MLD Version 1 and MLD
Version 2 for IPv6 multicast group addresses. The switch dynamically detects
Discovery Protocol
Switch discovery protocols help vSphere administrators identify the physical
switch ports to which a vSS or vDS are connected. Cisco Discovery Protocol
(CDP) support was introduced with ESX 3.x. CDP is available for standard
switches and distributed switches that are connected to Cisco physical
switches. Link Layer Discovery Protocol (LLDP) is supported in vSphere 5.0
and later for vDS (5.0.0 and later) but not for vSS.
CDP enables you to determine which Cisco switch port is connected to a vSS
or a vDS. When CDP is enabled for a vDS, you can view the properties of the
Cisco switch, such as device ID, software version, and timeout. You can set
CDP Type to any of the following values:
Listen: ESXi collects and displays details about the associated Cisco
switch port but does not share information about the vDS with the Cisco
switch.
Advertise: ESXi shares information about the vDS with the Cisco switch
but does not collect or display details about the associated Cisco switch
port.
Both: ESXi collects and displays information about the associated Cisco
switch port and shares information about the vDS with the Cisco switch.
DirectPath I/O
DirectPath I/O allows a virtual machine to access physical PCI functions on
platforms that have an I/O memory management unit (IOMMU). You can
enable DirectPath I/O passthrough for a physical NIC on an ESXi host to
enable efficient resource usage and to improve performance. After enabling
DirectPath I/O on the physical NIC on a host, you can assign it to a virtual
machine, allowing the guest OS to use the NIC directly and bypassing the
virtual switches.
Note
Do not enable DirectPath I/O passthrough for the USB controller for an
ESXi host that is configured to boot from a USB device or an SD card
attached to a USB channel.
The following NICs are supported for virtual machines configured with SR-
IOV:
Each NIC must have SR-IOV-supported drivers and may require SR-IOV to
Non SR-IOV Mode: The NIC is not used to provide VFs to virtual
machines.
SR-IOV Only Mode: The NIC provides VFs to virtual machines but
does not back other virtual machine traffic. In the vSphere Client, the
NIC appears in a separate list (External SR-IOV Adapters) in the switch
topology page.
Mixed Mode. The NIC services virtual machines with and without SR-
IOV.
DirectPath I/O and SR-IOV offer similar performance benefits and trade-offs,
but you use them to accomplish different goals. You can use SR-IOV in
workloads with extremely high packet rates or very low latency requirements,
where you want multiple virtual machines to share the same physical NIC
(with the same physical function). With DirectPath I/O, you can map only
one physical NIC to one virtual machine.
When you create a VMkernel virtual network adapter, you should configure
the settings described in Table 3-6.
Table 3-6 VMkernel Adapter Settings
Setting Description
IP Settings Provide IPv4 or IPv6 configuration details, such as IPv4
address, mask, and gateway.
MTU Set this option as described in the “MTU” section in this
chapter.
TCP/IP Select a standard or custom stack, as described in this
Stack section.
Available Select which of the following system services to enable for
Services the adapter:
Review Questions
1. You are configuring EVC Mode in a vSphere cluster that uses Intel
hardware. Which of the following values should you choose to set
the EVC Mode to the lowest level that includes the SSE4.2
instruction set?
a. Merom
b. Penryn
c. Nehalem
d. Westmere
2. In vSphere 7.0, you want to configure the DRS migration threshold
such that it is at the minimum level at which the virtual machine
happiness is considered. Which of the following values should you
choose?
a. Level 1
b. Level 2
c. Level 3
d. Level 4
e. Level 5
3. Which of the following is not a good use for resource pools in
DRS?
a. To delegate control and management
b. To impact the use of network resources
c. To impact the use of CPU resources
d. To impact the use of memory resources
4. You need your resource pool to use a two-pass algorithm to
allocate reservations. In the second pass, excess pool reservation is
Note
Do not confuse a vSphere cluster with a datastore cluster. In vSphere,
datastore clusters and vSphere (host) clusters are separate objects.
Although you can directly enable a vSphere cluster for vSAN, DRS,
and vSphere HA, you cannot directly enable it for datastore clustering.
You create datastore clusters separately. See Chapter 2, “Storage
Infrastructure,” for details on datastore clusters.
EVC ensures that all hosts in a cluster present the same CPU feature set to
virtual machines, even if the actual CPUs on the hosts differ. If you enable
the EVC cluster setting, you can configure the EVC Mode with a baseline
CPU feature set. EVC ensures that hosts in a cluster use the baseline feature
set when presenting an instruction set to a guest OS. EVC uses AMD-V
Extended Migration technology for AMD hosts and Intel FlexMigration
technology for Intel hosts to mask processor features; this allows hosts to
present the feature set of an earlier generation of processor. You should
configure EVC Mode to accommodate the host with the smallest feature set
in the cluster.
The EVC requirements for hosts include the following.
Note
You can apply a custom CPU compatibility mask to hide host CPU
features from a virtual machine, but VMware does not recommend
doing so.
You can configure the EVC settings by using the Quickstart > Configure
Cluster workflow in the vSphere Client. You can also configure EVC directly
in the cluster settings. The options for VMware EVC are Disable EVC,
Enable EVC for AMD Hosts, and Enable EVC for Intel Hosts.
Network-Aware DRS
In vSphere 6.5, DRS considers the utilization of host network adapters during
initial placement and load balancing, but it does not balance the network
load. Instead, its goal is to ensure that the target host has sufficient available
network resources. It works by eliminating hosts with saturated networks
from the list of possible migration hosts. The threshold used by DRS for
network saturation is 80% by default. When DRS cannot migrate VMs due to
network saturation, the result may be an imbalanced cluster.
In vSphere 7.0, DRS uses a new cost modeling algorithm that is flexible and
balances network bandwidth along with CPU and memory usage.
DRS Rules
You can configure rules to control the behavior of DRS.
A VM–host affinity rule specifies whether the members of a selected virtual
machine DRS group can run on the members of a specific host DRS group.
Unlike a virtual machine–to–virtual machine (VM–VM) affinity rule, which
specifies affinity (or anti-affinity) between individual virtual machines, a
VM–host affinity rule specifies an affinity relationship between a group of
virtual machines and a group of hosts. There are required rules (designated
by “must”) and preferential rules (designated by “should”).
A VM–host affinity rule includes the following components:
Note
A VM–VM rule does not allow the “should” qualifier. You should
consider these as “must” rules.
Resource Pools
Resource pools are container objects in the vSphere inventory that are used to
compartmentalize the CPU and memory resources of a host, a cluster, or a
parent resource pool. Virtual machines run in and draw resources from
resource pools. You can create multiple resource pools as direct children of a
standalone host or a DRS cluster. You cannot create child resource pools on a
host that has been added to a cluster or on a cluster that is not enabled for
DRS.
You can use resource pools to organize VMs. You can delegate control over
each resource pool to specific individuals and groups. You can monitor
resources and set alarms on resource pools. If you need a container just for
organization and permission purposes, consider using a folder. If you also
need resource management, then consider using a resource pool. You can
assign resource settings such as shares, reservations, and limits to resource
pools.
Use Cases
You can use resource pools to compartmentalize a cluster’s resources and
then use the resource pools to delegate control to individuals or
A resource pool uses its shares to compete for the parent’s resources
and is allocated a portion based on the ratio of the pool’s shares
compared with its siblings. Siblings share the parent’s resources
according to their relative share values, bounded by the reservation
and limit.
Note
The relative priority represented by each share changes with the
addition and removal of virtual machines in a resource pool or cluster.
It also changes as you increase or decrease the shares on a specific
virtual machine or resource pool.
Scalable Shares
If you want to change the resource allocation such that each virtual machine
Minimal configuration
Reduced hardware cost
Increased application availability
DRS and vMotion integration
When you enable vSphere HA on a cluster, the cluster elects one of the hosts
to act as the primary host. The primary host communicates with vCenter
Server to report cluster health. It monitors the state of all protected virtual
machines and secondary hosts. It uses network and datastore heartbeating to
detect failed hosts, isolation, and network partitions. vSphere HA takes
appropriate actions to respond to host failures, host isolation, and network
partitions. For host failures, the typical reaction is to restart the failed virtual
machines on surviving hosts in the cluster. If a network partition occurs, a
primary host is elected in each partition. If a specific host is isolated, vSphere
HA takes the predefined host isolation action, which may be to shut down or
power down the host’s virtual machines. If the primary host fails, the
surviving hosts elect a new primary host. You can configure vSphere to
monitor and respond to virtual machine failures, such as guest OS failures, by
Note
Although vCenter Server is required to implement vSphere HA, the
health of an HA cluster is not dependent on vCenter Server. If vCenter
Server fails, vSphere HA still functions. If vCenter Server is offline
when a host fails, vSphere HA can fail over the affected virtual
machines.
vSphere HA Requirements
When planning a vSphere HA cluster, you need to address the following
requirements:
The cluster must have at least two hosts, licensed for vSphere HA.
Hosts must use static IP addresses or guarantee that IP addresses
assigned by DHCP persist across host reboots.
Each host must have at least one—and preferably two—management
networks in common.
To ensure that virtual machines can run any host in the cluster, the hosts
must access the networks and datastores.
To use VM Monitoring, you need to install VMware Tools in each
virtual machine.
IPv4 or IPv6 can be used.
Note
The Virtual Machine Startup and Shutdown (automatic startup) feature
is disabled and unsupported for all virtual machines residing in a
vSphere HA cluster.
Note
Heartbeats
The primary host and secondary hosts exchange network heartbeats every
second. When the primary host stops receiving these heartbeats from a
secondary host, it checks for ping responses or the presence of datastore
heartbeats from the secondary host. If the primary host does not receive a
response after checking for a secondary host’s network heartbeat, ping, or
datastore heartbeats, it declares that the secondary host has failed. If the
primary host detects datastore heartbeats for a secondary host but no network
heartbeats or ping responses, it assumes that the secondary host is isolated or
in a network partition.
If any host is running but no longer observes network heartbeats, it attempts
to ping the set of cluster isolation addresses. If those pings also fail, the host
declares itself to be isolated from the network.
Proactive HA
Proactive High Availability (Proactive HA) integrates with select hardware
partners to detect degraded components and evacuate VMs from affected
vSphere hosts before an incident causes a service interruption. Hardware
partners offer a vCenter Server plug-in to provide the health status of the
system memory, local storage, power supplies, cooling fans, and network
adapters. As hardware components become degraded, Proactive HA
determines which hosts are at risk and places them into either Quarantine
Mode or Maintenance Mode. When a host enters Maintenance Mode, DRS
evacuates its virtual machines to healthy hosts, and the host is not used to run
virtual machines. When a host enters Quarantine Mode, DRS leaves the
current virtual machines running on the host but avoids placing or migrating
virtual machines to the host. If you prefer that Proactive HA simply make
evacuation recommendations rather than automatic migrations, you can set
Predictive DRS
Predictive DRS is a feature in vSphere 6.5 and later that leverages the
predictive analytics of vRealize Operations (vROps) Manager and vSphere
DRS. Together, these two products can provide workload balancing prior to
the occurrence of resource utilization spikes and resource contention. Every
night, vROps calculates dynamic thresholds, which are used to create
forecasted metrics for the future utilization of virtual machines. vROps passes
the predictive metrics to vSphere DRS to determine the best placement and
balance of virtual machines before resource utilization spikes occur.
Predictive DRS helps prevent resource contention on hosts that run virtual
machines with predictable utilization patterns.
The following prerequisites are needed to run Predictive DRS:
Note
Do not disconnect a host that is in Standby Mode or remove it from a
DRS cluster without first powering it on. Otherwise, vCenter Server is
not able to power the host back on.
To configure IPMI or iLO settings for a host, you can edit the host’s Power
Management settings. You should provide credentials for the Baseboard
Management Controller (BMC) account, the IP address of the appropriate
NIC, and the MAC address of the NIC.
Using WOL with DPM requires that the following prerequisites be met:
Before enabling DPM, use the vSphere Client to request the host to enter
Standby Mode. After the host powers down, right-click the host and attempt
to power on. If this is successful, you can allow the host to participate in
DPM. Otherwise, you should disable power management for the host.
You can enable DPM in a DRS cluster’s settings. You can set Automation
Level to Off, Manual, or Automatic. When this option is set to Off, DPM is
disabled. When it is set to Manual, DPM makes recommendations only.
When it is set to Automatic, DPM automatically performs host power
operations as needed.
Much as with DRS, with DPM you can control the aggressiveness of DPM
(that is, the DPM threshold) with a slider bar in the vSphere Client. The DRS
threshold and the DPM threshold are independent of one another. You can
override automation settings per host. For example, for a 16-host cluster, you
might want to set DPM Automation to Automatic on only 8 of the hosts.
The following vSphere features are not supported for FT-protected virtual
machines:
In vSphere 6.5, FT is supported with DRS only when EVC is enabled. You
can assign a DRS automation to the primary VM and let the secondary VM
assume the same setting. If you enable FT for a virtual machine in a cluster
where EVC is disabled, the virtual machine DRS automation level is
automatically disabled. Starting in vSphere 6.7, EVC is not required for FT to
support DRS.
To enable FT, you first create a VMkernel virtual network adapter on each
host and connect to the FT Logging network. You should enable vMotion on
a separate VMkernel adapter and network.
When you enable FT protection for a virtual machine, the following events
occur:
Legacy FT VMs can exist only on ESXi hosts running on vSphere versions
earlier than 6.5. If you require legacy FT, you should configure a separate
vSphere 6.0 cluster.
Note
Do not confuse VMware Service Lifecyle Manager with VMware
vSphere Lifecycle Manager, which provides simple, centralized
lifecycle management for ESXi hosts through the use of images and
baselines.
Review Questions
1. You are configuring EVC. Which of the following is not a
requirement?
a. A vSphere cluster
b. A DRS cluster
c. CPUs in the same family
d. CPUs with the same base instruction set
2. In vSphere 7.0, you want to configure the DRS Migration
Threshold such that it is at the maximum level at which resource
contention is considered, but virtual machine happiness is not.
Which of the following values should you choose?
a. Level 1
b. Level 2
c. Level 3
d. Level 4
e. Level 5
3. In a vSphere cluster, which of the following statements is true if the
primary host detects datastore heartbeats for a secondary host but
no network heartbeats or ping responses?
a. The primary host declares that the secondary host is isolated.
b. The primary host assumes that the secondary host is isolated
or in a network partition.
This chapter provides details on vCenter Server features that have not been
covered in previous chapters. It covers virtual machine features such as file
structure, migrations, and cloning. Chapters 13, “Managing vSphere and
vCenter Server,” and 14, “Virtual Machine Management/Provision, Migrate,
and Replication,” provide details on managing vCenter Server, vSphere, and
virtual machines.
1. You just installed a new vCenter Server. Using the vSphere Client,
which of the following objects can be the first object that you
create in the inventory pane?
a. A cluster
b. A host
c. A virtual machine
d. A data center
e. A datastore
f. A virtual machine folder
2. You want to create a content library for your vCenter Server.
Which type of content library cannot be modified directly?
a. A library backed by vSAN
b. A local library
c. A published library
d. A subscribed library
Foundation Topics
Note
Many systems that rely on vCenter Server, such as VMware Horizon,
also refer to vCenter objects according to their names. Take care when
renaming vCenter inventory objects such as data centers, folders, and
datastores if you have deployed any external systems that rely on
vCenter Server.
Data Centers
In the vSphere inventory, a data center is a container object that is an
aggregation of all the different types of objects used to work in virtual
infrastructure. Other than an optional folder to contain data centers, you
cannot create any object in the inventory until you create a data center.
Data centers are often used to contain all the objects in a physical data center.
For example, if you use a single vCenter Server to manage vSphere assets in
San Francisco and Chicago, you might want to use corresponding virtual data
centers to organize each city’s assets. You could create data center objects
named San Francisco and Chicago and place each ESXi host, virtual
machine, and other object in the appropriate data center.
Within each data center, there are four separate hierarchies:
A data center is a namespace for networks and datastores. The names for
these objects must be unique within a data center. You cannot use identical
datastore names within the same data center, but you can use identical
datastore names within two different data centers. Virtual machines,
templates, and clusters do not need to have unique names within the data
center but must have unique names within their folder.
Folders
Clusters
A cluster is a set of ESXi hosts that are intended to work together as a unit.
When you add a host to a cluster, the host’s resources become part of the
cluster’s resources. vCenter Server manages the resources of all hosts in a
cluster as one unit. In addition to creating a cluster, assigning a name, and
adding ESXi objects, you can enable and configure features on a cluster, such
as VMware EVC, vSphere DRS, and vSphere HA.
If you enable VMware EVC on a cluster, you can ensure that migrations with
vMotion do not fail due to CPU compatibility errors. If you enable vSphere
DRS on a cluster, you can allow automatic resource balancing by using the
pooled host resources in the cluster. If you enable vSphere HA on a cluster,
you can allow rapid virtual machine recovery from host hardware failures by
using the cluster’s available host resource capacity.
Cluster features are covered in detail in Chapter 4, “Clusters and High
Availability.”
Resource Pools
In the vSphere inventory, resource pools are container objects that are used
to compartmentalize the CPU and memory resources of a host or cluster.
Virtual machines run in resource pools, using resources provided by the
resource pools. You can create multiple resource pools as direct children of a
Hosts
In the vSphere inventory, hosts are objects that represent your ESXi servers.
After installing an ESXi host, you can choose to add it to the vSphere
inventory, which requires you to provide credentials for a user who is
assigned the administrator role directly on the host.
The vpxa agent in the ESXi server maintains communication with vCenter
Server. It is an interface between the vCenter Server and the ESXi hostd
service, which drives the main operations on the host, such as powering on a
virtual machine.
For maintenance and troubleshooting activities, you can disconnect a host
from the vCenter Server, which does not remove it from vCenter Server but
suspends related vCenter Server monitoring activities. You can connect hosts
that are disconnected. If you choose to remove a host from inventory, the host
and all its associated virtual machines are removed.
If the SSL certificate used by vCenter Server is replaced or changed, the
vCenter Server is unable to decrypt the host passwords. You need to
reconnect the certificate and resupply the host credentials.
To remove a host from the vSphere inventory, you must first enter
Maintenance Mode.
Networks
Datastores
In the vSphere inventory, datastores are objects that represent physical
storage resources in the data center. A datastore is the storage location for
virtual machine files. The physical storage resources can come from local
SCSI disks of the ESXi host, Fibre Channel SAN disk arrays, iSCSI SAN
disk arrays, or network attached storage (NAS) arrays. VMFS datastores can
be backed by local SCSI, Fibre Channel, or iSCSI. NFS datastores can be
backed by NAS. vSAN datastores can be built in VSAN clusters.
Chapter 2, “Storage Infrastructure,” provides details on datastores.
Virtual Machines
In the vSphere inventory, virtual machines are represented in a manner that
reflects the current inventory view. For example, in the Hosts and Clusters
view, each virtual machine is a descendant of the ESXi host on which it runs.
In the Networks view, each virtual machine is a descendant of the network to
which it connects.
Templates
In the vSphere inventory, templates are objects that are effectively non-
executable virtual machines. A template is a master copy of a virtual machine
that can be used to create and provision new virtual machines. A template can
have a guest operating system and application software installed. Templates
are often customized during deployment to ensure that each new virtual
vApps
A vApp is a container object in vSphere that provides a format for packaging
and managing applications. Typically, a vApp is a set of virtual machines that
runs a single application and allows you to manage the application as a single
unit. You can specify a unique boot order for the virtual machines in a vApp,
which allows you to gracefully start an application that spans multiple virtual
machines. You can apply resource management settings to a vApp in a
similar manner as you would to a resource pool.
Host Profiles
A host profile is a feature that enables you to encapsulate the configuration of
one host and apply it to other hosts. A host profile is especially helpful in
environments where administrators manage multiple hosts and clusters with
vCenter Server. The following are characteristics of host profiles:
Note
If you want a host profile to use directory services for authentication,
the reference host must be configured to use a directory service.
In previous releases, vSphere requires that the reference host be available for
certain tasks, such as editing, importing, and exporting the host profile.
Starting with vSphere 6.0, a dedicated reference host is no longer required for
these tasks.
Auto Deploy uses host profiles to configure ESXi.
Content Libraries
A content library is a repository that can be used to share files such as virtual
machine templates, vApps, and image files among a set of vCenter Servers.
Content libraries, which were introduced in vSphere 6.0, address the fact that
multiple vCenter Servers do not directly share associated files such as Open
Virtualization Format (OVF) and image (ISO) files. A great use case is
companies having multiple sites, each managed by a dedicated vCenter
Server, where the OVF files and ISO files that are used at one site are not
Note
Do not directly change, move, or delete virtual machine files without
guidance from a VMware Technical Support representative.
Configuration File
A virtual machine’s configuration file is a text file that contains all of the
virtual machine’s settings, including a description of the virtual hardware.
For example, a portion of the contents of a VMX file for a CentOS virtual
machine named server1 could include the following text:
Click here to view code image
displayName = "server1"
guestOS = "centos-64"
nvram = "server1.nvram"
If this virtual machine is sized with two virtual CPUs and 1024 GB memory,
the contents of the VMX file may also include the following text:
numvcpus = "2"
memSize = "1024"
The VMDK metadata file also contains the names of other files associated
with the virtual disk, such as data (extent) files, as shown in the following
sample content:
# Extent description
RW 20971520 VMFS "server1-flat.vmdk"
Snapshot Files
When you take a snapshot of a virtual machine, the system creates a few
files. For example, if you take a snapshot for a powered-off virtual machine
named server1 that has only one virtual disk and no previous snapshots, the
following files may be created:
Parent Snapshots
The first virtual machine snapshot that you create is the base snapshot.
Taking a snapshot creates a delta disk file for each disk attached to the virtual
machine and, optionally, a memory file. The delta disk files and memory file
are stored with the base VMDK file. The parent (current) snapshot is always
the snapshot that appears immediately above the You Are Here icon in the
Snapshot Manager. If you revert to a snapshot, that snapshot becomes the
parent of the You Are Here current state. When you have multiple snapshots,
each child snapshot has a parent snapshot.
Note
The parent snapshot is not always the snapshot that you took most
recently.
Snapshot Behavior
Taking a snapshot preserves the disk state by creating a series of delta disks
for each attached virtual disk or virtual raw device mapping (RDM). Taking a
snapshot creates a snapshot object in the Snapshot Manager that represents
the virtual machine state and settings. Each snapshot creates a delta disk for
each virtual disk. When you take a snapshot, the system prevents the virtual
machine from writing to the current data (VMDK) file and instead directs all
writes to the delta disk. The delta disk represents the difference between the
current state of the virtual disk and the state that existed at the time that you
took the parent snapshot. Delta disk files can expand quickly and can become
as large as the configured size of the virtual disk if the guest operating system
writes to every block of the virtual disk.
When you take a snapshot, the state of the virtual machine, virtual disks, and
(optionally) virtual memory is captured in a set of files, such as the delta,
database, and memory files. By default, the delta disks are stored with the
corresponding virtual disk files, and the memory and database files are stored
Flat File
A virtual disk involves a metadata file and a data file, each with the .vmdk
extension. The metadata VMDK file contains information about the virtual
disk, such as geometry and child–parent relationship information. The data
VMDK file is called the flat file, and its name contains the word flat. Only
the names of the metadata files appear in the vSphere Client Datastore
Browser. In normal circumstances, the virtual machine’s guest OS and
applications write to the flat file.
Database File
The database file is a file with the .vmsd extension that contains snapshot
details required by the Snapshot Manager. It contains details on the
relationships between snapshots and child disks.
Memory File
The memory file is a file with the .vmsn extension that includes the active
state of the virtual machine’s memory. Capturing the memory state of the
virtual machine lets you revert to a powered-on state. Memory snapshots take
longer to create than nonmemory snapshots. The size of the memory impacts
the amount of time required to create the snapshot.
Limitations
The use of snapshots can impact a virtual machine’s performance and can be
limited in some scenarios, as summarized in the following list:
VM Hardware/Compatibility
You can configure a virtual machine’s compatibility setting to control which
ESXi host versions can be used to run the virtual machine. In the vSphere
Client, you can set the Compatible With option for a virtual machine to a
compatible ESXi version, such as ESXi 7.0 and later or ESXi 6.7 Update 2
DV One by default.
D/C
D- You can configure the virtual DVD/CD-ROM device to connect to
RO client devices, host devices, or datastore ISO files.
M
driv
e You can add and remove virtual DVD/CD-ROM devices.
Hard A virtual disk is backed by a set of files, as discussed earlier in this
disk chapter.
IDE Two virtual Integrated Drive Electronics (IDE) interfaces are
0, present by default.
IDE
1
Key The virtual keyboard is mapped to the user keyboard when you
boar connect to the virtual machine console.
d
Me The size of the virtual memory becomes the size of memory that
mor the guest OS perceives to be physical memory.
y
Net You can configure the number of virtual network adapters (NICs)
wor and the adapter type used by each virtual machine.
k
With thin provisioning, storage blocks are not allocated during disk
creation, which allows fast provisioning but requires allocation and
zeroing during runtime.
With thick eager zeroed, storage blocks are allocated and zeroed during
provisioning, which allows fast runtime.
With thick lazy zeroed provisioning, storage blocks are pre-allocated but
not pre-zeroed.
Your choice for the provisioning type depends on each virtual machine’s use
case. For example, if you want to minimize the virtual machine startup time
and minimize its risk, you may choose thick provision lazy zeroed.
VMware Tools
VMware Tools is a set of software modules and services, including services
that can communicate with the VMkernel. This communication allows
integration with vSphere for activities such as customizing the guest OS,
running scripts in the guest OS, and synchronizing time. If you use guest
operating systems without VMware Tools, many VMware features are not
available. VMware Tools enhances the performance of the guest OS by
enabling the latest drivers for virtual devices, enabling memory functions
(such as ballooning), and more. It includes drivers such as SVGA, Paravirtual
SCSI, VMXNet NIC, mouse, audio, guest introspection, and memory control
drivers. Prior to upgrading the hardware for a virtual machine, you should
upgrade VMware Tools.
VMware Tools includes the VMware user process named vmtoolsd, which
enables copy and paste and mouse control and automatically sets screen
resolution for some non-Windows guests. It enhances the performance of the
virtual machine’s guest operating system and improves management of the
virtual machine. It includes device drivers and other software that is essential
for the VM. With VMware Tools, you have more control over the virtual
Note
To migrate virtual machines with disks larger than 2 TB, the source
and destination ESXi hosts must be Version 6.0 and later.
Cold Migrations
Moving a powered-off or suspended virtual machine to a new host, new
datastore, or both is considered a cold migration. The required privilege is
Resource.Migrate Powered Off Virtual Machine.
Cross-Host Migrations
Moving a virtual machine, whether hot or cold, to a new host is considered a
cross-host migration. In vSphere Client wizards that involve cross-host
migrations, you can choose a destination host. Alternatively, when available
and properly configured, you can choose a DRS cluster, resource pool, or
vApp as the destination.
The cross-host migration wizards include a Compatibility panel to identify
any compatibility issues or warnings. If the panel displays the message
“Compatibility Checks Succeeded,” you can proceed with no concern. If the
panel displays an error, the migration is disabled for the associated hosts. If it
displays a warning message, the migration is not disabled, and you can
proceed, bearing in mind the warning. For hot migrations, the compatibility
check accommodates vMotion CPU compatibility checking.
For a virtual machine using an NVDIMM device and PMem storage, the
destination host or cluster must have available PMem resources to pass the
compatibility check. For a cold migration involving a virtual machine that
does not have an NVDIMM device but uses PMem storage, you can choose a
target host or cluster without available PMem resources. The hard disks use
the storage policy and data-store selected for the virtual machine’s
configuration files.
Cross-Datastore Migrations
Moving a virtual machine, whether hot or cold, to a new datastore is
considered a cross-datastore migration.
The associated vCenter Servers and ESXi hosts must be 6.0 or later.
The cross-vCenter Server and long-distance vMotion features require an
Enterprise Plus license.
The vCenter Server instances must be time-synchronized with each other
for correct vCenter Single Sign-On token verification.
For migration of compute resources only, both vCenter Server instances
must be connected to the shared virtual machine storage.
When using the vSphere Client, both vCenter Server instances must be in
Enhanced Linked Mode, and they must be in the same vCenter Single
Sign-On domain.
Note
If the vCenter Server instances exist in separate vCenter Single Sign-
On domains, you can use vSphere APIs/SDK to migrate virtual
machines.
For costing purposes, a hot migration that is both a cross-host and cross-
datastore migration (vMotion migration without shared storage) is considered
to be a combination of a vMotion and Storage vMotion migration and applies
the associated network, host, and datastore costs. vMotion migration without
shared storage is equivalent to Storage vMotion migration with a network
cost of 1.
Consider the following examples for a four-node DRS cluster with a 10 GigE
vMotion network:
vMotion Details
This section provides details on the vMotion feature in vSphere.
vMotion Overview
A hot cross-host migration is called a vMotion migration. A hot migration
across hosts and datastores is often called a vMotion migration without
shared storage. A hot cross-vCenter Server migration is often called a cross-
vCenter Server vMotion migration. Although the term vMotion migration
may be used to describe any hot cross-host migration, this section provides
details on just the traditional vMotion migration, in which shared storage is
used and cross-datastore migration does not occur.
During a vMotion migration, the entire state of the virtual machine is moved
to the new host. The state includes the current memory content and all the
information that defines and identifies the virtual machine. The memory
content includes the components of the operating system, applications, and
transaction data that are in the memory. The state includes all the data that
maps to the virtual machine hardware elements, such as BIOS, devices, CPU,
MAC addresses for the Ethernet cards, chipset states, and registers. The
associated virtual disk remains in the original location on storage that is
shared between the source and destination hosts. After the virtual machine
state is migrated to the destination host, the virtual machine continues
vMotion Requirements
Note
Hot migrations that are cross-host and cross-datastore migrations,
which are often called vMotion migrations without shared storage, do
not required shared storage.
For vMotion migration, you must configure each host with a VMkernel
virtual network interface connected to a virtual switch with an uplink that
uses at least one physical network interface card (NIC). VMware
recommends that the network connection be made to a secured network. The
vMotion network must provide at least 250 Mbps of dedicated bandwidth per
concurrent vMotion session. For long-distance migrations, the maximum
supported network round-trip time for vMotion migrations is 150
Note
During a vMotion migration without shared storage, the virtual disk
data is transferred over the vMotion network.
The stun time (the time at which the virtual machine is not running
anywhere) is typically between 100 ms and 200 ms.
Note
Only ESXi Versions 6.5 and later use encrypted vSphere vMotion. To
use vMotion to migrate encrypted virtual machines across vCenter
Server instances, you must use the vSphere API.
Note
Clones
When you clone a virtual machine, vCenter Server creates a virtual machine
that is a copy of the original virtual machine. The virtual disk files,
configuration file, and other files are copied from the original virtual machine
to the new virtual machine. The new virtual machine is commonly referred to
as a clone. The new virtual machine files are named and stored based on
parameters you provide during the deployment. You can choose to make
some configuration changes and customizations during the cloning process.
The contents of some of the files, such as the configuration file, are modified.
At the end of the operation, you can manage both the original virtual machine
and the new virtual machine as inventory objects in vCenter Server.
Cold Clones
A cold clone occurs when the source virtual machine is powered down prior
to starting the clone operation. In this case, vCenter Server does not have to
worry about interrupting the execution of the source virtual machine.
Linked Clones
A linked clone is a virtual machine that is cloned in such a manner that it
shares its virtual disk files with the original virtual machine (parent). The
shared files are static. Much like a virtual machine that has a snapshot, a
linked clone writes its virtual disk changes to separate data files. Compared to
a full clone, a linked clone operation is faster and conserves disk space. You
cannot use the vSphere Client to directly create linked clones. You can use
PowerCLI (via the -LinkedClone parameter with the New-VM command) or
other VMware products to create linked clones. For example, in VMware
Horizon you can create desktop pools based on linked clones, and in vCloud
Director you can use fast provisioning.
Instant Clones
Starting with vSphere 6.7, you can use the instant clone technology to hot
clone a running virtual machine in a manner that is like a combination of
vMotion and linked clone technology. The result of an instant clone operation
is a new virtual machine (destination virtual machine) that is identical to the
source virtual machine. The processor state, virtual device state, memory
state, and disk state of the destination virtual machine match those of the
source virtual machine. To avoid network conflicts, you can customize the
MAC addresses of the virtual NICs, but the guest customization feature is not
supported for instant clones. You cannot use the vSphere Client to perform an
instant clone operation.
A common use case for instant clones is just-in-time deployment in a
VMware Horizon virtual desktop infrastructure (VDI). Instant clones enable
you to perform large-scale deployments by creating virtual machines from a
controlled point in time. For example, VMware Horizon uses Instant Clone to
improve the provisioning process for virtual desktops. Compared to View
Composer, which uses linked clones, instant clones eliminate some steps
(such as reconfiguration and checkpoints) and replace other steps to greatly
reduce the provisioning time. Other use cases are large deployments of
identical virtual servers in the cloud and situations where you want to reduce
boot storms and provisioning times.
During an instant clone (vmFork) operation, the system quiesces and stuns
the source virtual machine, creates and transfers a checkpoint, customizes the
destination MAC address and UUID, and forks the memory and disk. The
Review Questions
1. Which of the following is not a valid use case for virtual machine
vSphere Add-ons
vRealize Suite
Desktop and Application Virtualization
Replication and Disaster Recovery
Private Public and Hybrid Clouds
Networking and Security
Foundation Topics
vSphere Add-ons
This section addresses the following products that are directly related to
vSphere but are not covered in other chapters of this book:
vCenter Converter
VMware vCenter Converter (also called Converter Standalone) is a free
solution that automates the process of converting existing Windows and
Linux machines into virtual machines running in a vSphere environment. The
source machines can be physical servers or virtual machines in non-ESXi
environments. You can use Converter to convert virtual machines running in
VMware Workstation, VMware Fusion, Hyper-V, and Amazon EC2
Windows to virtual machines running in vSphere.
With Converter, you can hot clone Windows servers without disrupting users
of the source Windows Server. With hot cloning, you can minimize
downtime when converting existing Windows and Linux servers to virtual
machines running in vSphere.
Converter offers a centralized management console that allows users to queue
and monitor multiple simultaneous remote and local conversions.
VMware SkyLine
VMware Skyline is a proactive support technology, developed by VMware
Global Services, that is available to customers with an active Production
Support or Premier Services agreement. Skyline helps you avoid problems
before they occur and reduces the amount of time spent on support requests.
The Skyline architecture includes a standalone on-premises virtual appliance
(Skyline Collector) for secure, automatic data collection. It also includes a
self-service web portal (Skyline Advisor) for accessing your VMware
inventory, proactive findings, recommendations, and risks. You can segment
data by factors, such as region and lines of business. You can use VMware
Cloud Services Console to control user access and permissions. With a
Premier Services agreement, you can access executive summary reports and
view more powerful recommendations.
You can use Skyline Advisor to access Skyline Log Assist, which
automatically (with your permission) uploads support log bundles to VMware
Technical Support and eliminates manual procedures for log gathering and
uploading. If you approve the request in Skyline Advisor, the requested logs
are automatically uploaded to VMware Support. Likewise, you can choose to
proactively push log files to VMware Support by using Log Assist within
Skyline Advisor.
vRealize Suite
This section covers the vRealize Suite, which is a set of products that
provides a layer for operations, automation, and analysis for software-defined
data centers and hybrid clouds.
vROps Integration
In the vROps user interface, you can use the Solutions page to add a vCenter
Server adapter instance (cloud account). You configure the instance by
providing the address and user credentials for connecting to vCenter Server.
At a minimum, the user account must have Read privileges assigned at the
data center or vCenter Server level. To collect virtual machine guest OS
metrics, the credential must have Performance > Modify Intervals permission
enabled in the target. Additional requirements exist to allow vROps to
perform automated actions in vSphere.
vRLI Integration
To collect alarms, events, and tasks data from a vSphere environment, you
must connect vRealize Log Insight to one or more vCenter Server systems.
vRLI can collect events, tasks, alerts, and other structured data directly from
the vCenter Server. It can also collect unstructured data from ESXi hosts and
the vCenter Server via syslog.
When connecting the vCenter Server to vRLI, you must provide a service
account with appropriate privileges. To collect structured data from the
vCenter Server, the service account must have the System.View privilege. To
collect syslog data from ESXi hosts, the account must have the following
privileges:
Host.Configuration.Change settings
Host.Configuration.Network configuration
Host.Configuration.Advanced Settings
Host.Configuration.Security Profile and Firewall
See the “vRealize Log Insight (vRLI)” section in Chapter 10 for instructions
on configuring vRLI to integrate with vCenter Server.
vRA Integration
To begin using vRA, you need to deploy a vRA instance to a management
vSphere cluster. A vRA 8.x deployment typically involves three vRA virtual
appliances and three VMware Identity Manager (vIDM) appliances. To
facilitate the deployment of these appliances, you can deploy and use the
vRealize Lifecycle Manager (LCM) appliance.
To provide vSphere automation using vRA 8.x, you need to add at least one
vCenter cloud account. (In vRA 7.x, you create a vSphere endpoint.) The
vCenter Server that you use for a cloud account manages the user workload
vSphere clusters. The cloud account provides the credentials that vRA uses to
connect to vCenter Server. Table 6-2 lists the required permissions for the
vCenter cloud account.
Table 6-2 Required Permissions for the vCenter Cloud Account
Object Permissions
Datastore
Allocate space
Browse datastore
Folder
Create folder
Delete folder
Global
Manage custom attributes
Network
Assign network
Permissions
Modify permission
Resource
Assign VM to resource pool
Download files
Read storage
Type introspection
Update files
Update library
Tags
Assign or unassign vSphere tag
vApp
Import
Create new
Move
Console interaction
Device connection
Power off
Power on
Reset
Suspend
Tools install
Add or remove
Advanced
Change resource
Memory
Rename
Set annotation
Settings
Swapfile placement
Clone template
Deploy template
Remove snapshot
Revert to snapshot
Shut down the virtual machines, one by one, in a specific order, ensuring
that each shutdown operation completes prior to beginning the next
shutdown.
Create a snapshot of each virtual machine.
Power on the virtual machines, one by one, in a specific order, ensuring
that the guest OS and application services for each one are running prior
to beginning the next power on.
Inform the application team that the application is ready for update.
Following a successful update, delete the snapshots.
With vRO, you can build workflows to automate all or portions of such an
operation. For example, vRO provides out-of-the-box workflows for virtual
machine power and snapshot operations. You can build a custom workflow
that leverages the existing workflows as nested workflows. In the custom
workflow, you can add data input, conditional paths, looping, and
monitoring.
vRO Integration
You can configure vRO 8.x to use vRA authentication or vSphere
authentication. To use vSphere authentication, in the vRO Control Center, set
Configure Authentication Provider > Authentication Mode to vSphere and
configure it to use the credentials of the local administrator account of the
vCenter Single Sign-On (SSO) domain ([email protected] by
vRNI Integration
You can add VMware managers, such as vCenter Server, VMware NSX
Manager, and VMware NSX-T Manager, to vRNI for data collection. To add
a vCenter Server to vRNI as a data source, you need to have the following
privileges applied and propagated at the root level:
To support IPFIX, you also need the Modify and Port Configuration
Operation privilege on the distributed switches and Modify and Policy
Operation on the distributed port groups.
To identify VM-to-VM paths, you must install VMware Tools in the virtual
machines.
VMware Horizon
VMware Horizon is a platform for securely delivering virtual desktops and
applications in private clouds and hybrid clouds. It enables provisioning and
management of desktop pools that have thousands of virtual desktops each. It
streamlines the management of images, applications, profiles, and policies for
desktops and their users. It integrates with VMware Workspace ONE Access,
which establishes and verifies end-user identity with multifactor
authentication and serves as the basis for conditional access and network
microsegmentation policies for Horizon virtual desktops and applications.
Horizon includes instant clones which work with VMware Dynamic
Environment Manager and VMware App Volumes to dynamically provide
just-in-time (JIT) delivery of user profile data and applications to stateless
desktops.
Horizon provisions large pools of virtual desktops from a small set of base
virtual desktops by integrating with vCenter Server. Horizon makes the
provisioning requests, which are carried out by vCenter Server in the
appropriate vSphere clusters. vSphere provides the environment, including
the compute, storage, and network resources for running the virtual desktops.
The following list identifies common use cases for VMware Horizon.
Remote users
Kiosk and task users
Call center
Bring-your-own-device (BYOD) deployments
Graphics-intensive applications
Datastore
Allocate space
Advanced
In Interaction:
Power off
Power on
Reset
Suspend
In Inventory:
Create new
Remove
In Provisioning:
Customize
Deploy template
Read customization
specifications
Clone template
App Volumes
VMware App Volumes is a set of application and user management solutions
for VMware Horizon, Citrix Virtual Apps and Desktops, and Remote
Desktop Services Host (RDSH) virtual environments. It streamlines your
ability to deliver, update, assign, and manage applications and users across
virtual desktop infrastructure (VDI) and published application environments.
With App Volumes, you install an application once, using a provisioning
computer, collect the application components in AppStacks, and centrally
control the mapping of AppStacks to desktops.
AppStacks and companion writable volumes are stored in virtual disk files
and attached to virtual machines to deliver applications. Updates to
applications involve updating or replacing AppStacks or their mappings to
desktops.
In RDSH environments, applications are installed on servers and delivered
via Remote Desktop. Using App Volumes with RDSH simplifies the
installation and management of the application on the server. Instead of
attaching AppStacks to desktops, you attach AppStacks to RDSH servers and
allow RDSH to deliver the application to the user.
Browse datastore
Remove file
Change resource
Remove disk
Settings
Advanced
In Inventory:
Move
Register
Remove
Unregister
In Provisioning:
Promote disks
vSphere Replication
vSphere Replication is an extension to VMware vCenter Server that provides
hypervisor-based virtual machine replication and recovery. It provides virtual
machine replication between the following source and destination
combinations:
SRM Integration
Prior to installing SRM, you should implement a supported replication
technology, such as EMC RecoverPoint or vSphere Replication. You need to
deploy SRM to both the source and target sites. You can install a Windows-
based version of SRM in a supported Windows server, or you can deploy the
SRM virtual appliance. In most cases, you should deploy the SRM appliance,
which includes an embedded vPostgreSQL database that supports a full-scale
SRM environment.
At each site, you need to deploy an SRM server and register it with a vCenter
Server. SRM requires a separate vCenter Server at the source site and at the
target site.
SRM uses Transport Layer Security (TLS) and solution user authentication
for secured connections with vCenter Server. It assigns a private key and a
certificate to the solution user and registers it with the vCenter Single Sign-
On service. When you pair SRM instances across vCenter Servers that do not
use Enhanced Linked Mode, Site Recovery Manager creates an additional
solution user at the remote site.
The following are the main components in a private cloud powered by VCF
4.0:
Cloud Builder
SDDC Manager
vSphere
vSAN
NSX-T Data Center
vRealize Suite
Cloud Builder is the VCF component that automates the deployment of the
entire software-defined stack. SDDC Manager is the VCF component that
VCF Integration
To get started with VCF, you should prepare ESXi hosts for the
implementation of the management domain, address network and
environment prerequisites, fill in the deployment parameter workbook,
deploy the VMware Cloud Builder appliance, and use Cloud Builder to
deploy the management domain, including vCenter Server.
VMware on AWS
VMware Cloud (VMC) on Amazon Web Services (AWS) is an integrated
cloud offering jointly developed by AWS and VMware. You can migrate and
extend your on-premises VMware vSphere-based environments to the AWS
Cloud running on Amazon Elastic Compute Cloud (Amazon EC2). With
VMC on AWS, you can deploy a software-defined data center (SDDC) on
demand. You configure the network and security to suit your needs and then
begin deploying virtual machines. VMware provides support for VMC on
AWS. You can open the VMware Cloud Services console to get support.
VMC on AWS provides workloads with access to more than 175 AWS
services, including database, AI/ML, and security services. It provides
simplicity for hybrid cloud operations by enabling you to use the same VCF
technologies (vSphere, vSAN, NSX, vCenter Server) across the on-premises
environment and the AWS cloud. It does not require custom, on-premises
hardware. It improves availability and accelerates cloud migration by
enabling workloads to be directly migrated between an on-premises
environment and AWS. To migrate virtual machines from an on-premises
vSphere environment to VMC on AWS, you can perform a live migration via
vMotion or use VMware HCX.
AppDefense
VMware AppDefense provides data center endpoint security that protects
applications running in a virtualized environment. It learns good behavior for
each of your virtual machines and applications so it can detect and respond to
deviations from that good behavior. It can respond with actions on the virtual
machine, such as blocking networking, suspending, quarantining,
snapshotting, powering off, or killing a suspicious process in the guest OS.
AppDefense is a SaaS product that works with an on-premises virtual
appliance and a vCenter Server plug-in. The on-premises virtual appliance
connects to vCenter Server, NSX Manager, and other optional components.
You can deploy an AppDefense module to each protected host. Likewise, you
can deploy an AppDefense agent to guest operating systems. AppDefense can
tie into provisioning systems such as vRealize Automation or Puppet to
define appropriate and allowed behaviors.
NSX
VMware NSX Data Center (NSX) is a network virtualization and security
platform that enables a software-defined approach to networking that extends
across data centers, clouds, and application frameworks. NSX enables you to
provision and manage networks independently of the underlying hardware,
much as you do with virtual machines. You can reproduce a complex
network in seconds and create multiple networks with diverse requirements.
NSX provides a new operational model for software-defined networking and
extends it to the virtual cloud network. It provides a complete set of logical
networking, security capabilities, and services, such as logical switching,
routing, firewalling, load balancing, virtual private networking, quality of
service (QoS), and monitoring.
VMware NSX-T Data Center (NSX-T) is the recommended product for
practically all new virtualized networking use cases. Although it was
originally developed for non-vSphere environments, it now supports vSphere.
Most NSX customers are migrating or starting to consider migrating to NSX-
T. The NSX-T platform provides the following components:
NSX-T managers
NSX-T edge nodes
NSX-T distributed routers
NSX-T service routers
NSX-T segments (logical switches)
Guest Module uses a data plane, a control plane, and a management plane.
The following list identifies the common uses cases for NSX.
NSX Integration
To prepare for an NSX-T installation, you need to meet the requirements for
deploying its components, such as the NSX-T managers and edge nodes.
Typically, a three-node NSX-T Manager cluster is deployed to a management
vSphere cluster, and the NSX-T edges are deployed in a shared edge and
compute cluster.
After deploying the required virtual appliances from OVF, you log in to
NSX-T Manager and add a vCenter Server as a compute manager. When
adding the vCenter Server compute manager, you should use the
administrator account of the Single Sign-On domain
([email protected] by default) or use a custom account configured
with the appropriate privileges. Next, you deploy NSX-T edges to vSphere
clusters managed by the vCenter Server and create the transport zones and
transport nodes.
With NSX-T, you implement NSX-T Virtual Distributed Switches (N-VDS),
which are logical switches that are decoupled from the vCenter Server to
provide cross-platform support. They function much like a vSphere
Distributed Switch (vDS), in that they provide uplinks to host physical NICs,
multiple teaming policies, VLAN support, and more, but they can reside in a
non-vSphere environment.
With vSphere 7.0 and NSX-T 3.0, you can run NSX-T directly on a vDS 7.0.
This provides simpler integration in vCenter Server as well as some other
benefits. When creating transport zone nodes on ESXi hosts, you can choose
between N-VDS and VDS as the host switch type.
Review Questions
1. You want to build custom workflows to support XaaS. Which
product should you use?
a. vRLI
b. vRO
c. vROps
d. App Volumes
2. You need to provide virtual desktops and applications to remote
users and call centers. Which product should you implement?
a. VCF
b. vRealize Suite
c. AppDefense
d. Horizon
3. You want to configure vSphere Replication using the vSphere
Client. Which of the following is the correct navigation path?
a. Home > vCenter Server > vSphere Replication
b. Home > Site Recovery > Open Site Recovery
c. Home > Host and Clusters > Replications
d. Home > Administration > Replication
vSphere Security
This chapter covers the following subjects:
vSphere Certificates
vSphere Permissions
ESXi and vCenter Server Security
vSphere Network Security
Virtual Machine Security
Available Add-on Security
Foundation Topics
vSphere Certificates
This section describes the use of certificates in a vSphere environment.
Certificate Requirements
The following requirements apply to all imported certificates:
Note
Do not use CRL distribution points, authority information access, or
certificate template information in any custom certificates.
Note
Do not confuse the machine solution user certificate with the machine
SSL certificate. The machine solution user certificate is used for
SAML token exchange. The machine SSL certificate is used for secure
SSL connections for a machine.
Note
If you apply custom certificates to hosts but do not change the
certificate mode to Custom Certificate Authority, VMCA might replace
custom certificates when you select Renew in the vSphere Client.
You can use the vSphere Client to view expiration data for certificates,
whether they are signed by VMCA or a third party. The vCenter Server raises
vSphere Permissions
This section describes the permissions model in vSphere.
An object might have multiple permissions but only one permission for each
user or group. In other words, you cannot assign to an object two permissions
that specify the same group. If multiple permissions are applied to a specific
object using multiple groups and if a specific user belongs to more than one
Clusters
Data centers
Datastores
Datastore clusters
Folders
Hosts
Networks (except vSphere Distributed Switches)
Distributed port groups
Resource pools
Templates
Virtual machines
vSphere vApps
Note
Changes to roles take effect immediately, even for users who are
currently logged in to vCenter Server. One exception is with searches,
where a change is not realized until the next time the user logs in to
vCenter Server.
To get familiar with the privileges in a sample role, you can edit the role and
explore the privileges that are included in the role. For example, if you edit
the virtual machine console user role, you see that it only includes some
privileges in the Virtual Machine > Interaction category and no other
privileges. Specifically, it includes only these privileges:
Answer Question
Configure CD media
Configure floppy media
Connect devices
Console interaction
Install VMware tools
Power off
Power on
Reset
Suspend
Permissions
The permissions model for vCenter Server systems relies on assigning
permissions to objects in the object hierarchy. A permission is the assignment
of a user (or group) and a role to an inventory object. A permission is set on
an object in the vCenter object inventory. Each permission associates the
object with a group (or user) and a role, as illustrated in Figure 7-3. For
example, you can select a virtual machine object, add one permission that
gives the read-only role to Group 1, and add a second permission that gives
the administrator role to User 2.
Global Permissions
Most entities that appear in the vCenter Server inventory are managed objects
whose access can be controlled using permissions. You cannot modify
Custom fields
Licenses
Roles
Statistics intervals
Sessions
The global root object is used to assign permissions across solutions. The
vCenter Server is an example of a solution, and it is attached as a child to the
global root object in the hierarchy. The content library and tag category
objects are also attached as children to the global root object. Global
permissions are permissions that are applied to the global root object and
span solutions. For example, a global permission can be applied to both
vCenter Server and vRealize Orchestrator. Each solution has its own root
object in the hierarchy, whose parent is the global root object. You can give a
group of users read permissions to all objects in both object hierarchies.
Note
Changes to licenses propagate to all linked vCenter Server systems in
the same vCenter Single Sign-On domain.
Table 7-10 shows the required privileges for a few common tasks.
Virtual Machine.Configuration.Add
Existing Disk
Virtual Machine.Configuration.Raw
Device
On the network:
Network.Assign Network
Virtual Machine.Provisioning.Deploy
Template
Datastore.Allocate Space
Network.Assign Network
Virtual Machine.Snapshot
Management.Create Snapshot
Datastore.Allocate Space
Virtual Machine.Inventory.Move
Virtual Machine.Interaction.Answer
Question
Virtual Machine.Interaction.Console
Interaction
Virtual Machine.Interaction.Device
Connection
Virtual Machine.Interaction.Power On
Virtual Machine.Interaction.Reset
Virtual Machine.Interaction.Configure CD
Media
Virtual Machine.Interaction.Configure
Floppy Media
Datastore.Browse Datastore
Datastore.Browse Datastore
Datastore.Allocate Space
Datastore.Allocate Space
Host.Inventory.Modify. cluster
One cluster exists in the inventory, and it contains host-01 and host-02.
The user account User-A is a member of groups Group-01 and Group-
02.
The user account User-B is a member of group Group-01.
The user account User-C is a member of group Group-02.
The user account User-D is a member of groups Group-01 and Group-
03.
The user account User-E is a member of groups Group-02 and Group-04.
User-A:
Can perform all tasks on the cluster object
Can perform all tasks on the host-01 object
Can only view the host-02 object
User-B:
Can perform all tasks on the cluster object
Can perform all tasks on the host-01 object
Can perform all tasks on the host-02 object
User-C:
Cannot view or perform any task on the cluster object
Can perform all tasks on the host-01 object
Can only view the host-02 object
User-D
Can only view the cluster object
Can only view the host-01 object
Cannot view or perform any task on the host-02 object
Security Profiles
You can customize many of the essential security settings for a host through
the Security Profile panel in the vSphere Client. You can use security profiles
to customize services and configure the ESXi firewall. Table 7-11 describes
the services that are available to you to view and manage using the vSphere
Client for a default vSphere installation, along with the default state for each
of them. You can use the vSphere Client to start, stop, and restart individual
services.
Table 7-11 ESXi Security Profile Services
Service Defau Description
lt
State
Direct Console Run Allows you to interact with an ESXi host
User Interface ning from the local console host using text-based
(DCUI) menus
ESXi Shell Sto Is available from the DCUI or from SSH
ppe
d
User Access
The user accounts defined in the local operating system (localos) of the
Linux-based vCenter Server Appliance have no permissions defined in the
vCenter Server environment. The localos user accounts—such as root, sshd,
and vdtc—are not members of any SSO domain (vsphere.local) group to
which permissions are applied. No one should attempt to use these accounts
to log in to the vSphere Client. You should not use these accounts when
configuring permissions or group memberships. Do not allow users to log in
directly to the localos of the vCenter Server appliance. Log in only locally
when required.
By default, the only accessible user account in the SSO domain is
administrator, which has full control of the environment. If you use the
default SSO domain name, the user account is [email protected].
Ideally, you should integrate vSphere with a supported enterprise directory
service, such as Active Directory, to allow users seamless access without
requiring additional user accounts. Alternatively, you can create other user
accounts in the SSO domain for your users. You should ensure that each user
can access the environment with a unique account that is assigned the
minimally required privileges.
Note
Do not confuse the administrator (root) of the localos with the SSO
administrator ([email protected] by default). By default, no
localos user account has full administrator privileges in vCenter Server.
For users who require the administrator role, you should assign the role to the
appropriate user accounts or group accounts to avoid using the SSO
administrator account.
The vCenter Server connects to each ESXi host with the vpxuser account
defined on the host. By default, vCenter Server changes the vpxuser
password automatically every 30 days on each connected ESXi host. To
In addition, the password cannot use more than 20 characters and cannot
contain non-ASCII characters. SSO administrators can change the default
password policy.
Time Synchronization
You should ensure that all systems, such as vCenter Server, ESXi, and
supporting services, use the same relative time source. The time source must
be in sync with an acceptable time standard, such as Coordinated Universal
Time (UTC). Time synchronization is critical for many vSphere features,
such as vSphere HA. It is also critical for securing vSphere.
Time synchronization is essential for certificate validation. Time
synchronization simplifies troubleshooting and auditing. Incorrect time
settings make it difficult to analyze and correlate log files related to detecting
attacks and conducting security audits.
Firewalls
You can use traditional (physical) firewalls, virtual machine–based firewalls,
and hypervisor-based firewalls (such as NSX Distributed Firewall) to protect
traffic to and from the vCenter Server, ESXi hosts, virtual machines, and
other vSphere components. Ideally, you could use firewalls to allow only the
required traffic between specific vSphere components, virtual machines, and
network segments.
You should isolate the vSphere management network, which provides access
to the management interface on each component. In most cases, you should
place the vSphere management port group in a dedicated VLAN and ensure
that the network segment is not routed except to other management-related
networks. Likewise, you should isolate IP-based storage traffic and vMotion
traffic.
To add a security association, you can use the esxcli network ip ipsec sa add
command with one or more of the options listed in Table 7-13.
Table 7-13 IPsec Options
Option Description
--sa-source=source Required. Specify the source address.
address
--sa- Required. Specify the destination address.
destination=destinatio
n address
--sa-mode=mode Required. Specify the mode: either transport or
tunnel.
--sa-spi=security Required. Specify the security parameter index,
parameter index in hexadecimal.
--encryption- Required. Specify the algorithm as one of the
algorithm=encryption following parameters:
algorithm
3des-cbc
aes128-cbc
null
Starting with vSphere 6.5, if the operating system supports UEFI Secure
Boot, you can configure your VM to use UEFI boot. Prerequisites are UEFI
firmware virtual hardware version 13 or later, VMware Tools version 10.1 or
later, and an operating system that supports UEFI Secure Boot. For Linux
virtual machines, the VMware host guest file system is not supported in
Secure Boot mode and should be removed from VMware Tools before you
enable Secure Boot. If you turn on Secure Boot for a virtual machine, you
can load only signed drivers into that virtual machine.
In a guest operating system that supports UEFI Secure Boot, each piece of
boot software is signed, including the bootloader, the operating system
isolation.tools.unity.push.update.disable
isolation.tools.ghi.launchmenu.change
isolation.tools.memSchedFakeSampleStats.disable
isolation.tools.getCreds.disable
isolation.tools.ghi.autologon.disable
isolation.bios.bbs.disable
isolation.tools.hgfsServerSet.disable
isolation.tools.diskShrink.disable = "TRUE"
Copying and pasting: Copy and paste operations are disabled by default
in new virtual machines. In most cases, you should retain this default to
ensure that one user of the virtual machine console cannot paste data that
was originally copied from a previous user. Ensure that the following
lines remain in the VMX files:
Click here to view code image
isolation.tools.copy.disable = "TRUE"
isolation.tools.paste.disable = "TRUE"
isolation.device.edit.disable = "TRUE"
Alternatively, to limit the number of log files for virtual machines on an ESXi
host, add the previous line to the host’s /etc/vmware/config file. A more
aggressive measure is to disable virtual machine logging with the following
statement in the VMX file:
logging = "FALSE"
For vSphere 6.7, the vSphere Hardening Guide is replaced with the vSphere
6.7 Update 1 Security Configuration Guide. The risk profiles are removed,
primarily because the only remaining Risk Profile 1 setting is ESXi.enable-
strict-lockdown-mode. Instead of identifying risk profiles, the new guide
simply lists the current 50 guideline IDs alphabetically and includes a
vulnerability discussion for each guideline. Because no vSphere 7.0 Security
Configuration Guide is available as of July 2020, you should get familiar
with the risk profile data described in this section.
isolation.device.edit.disable = "TRUE"
If these parameters are set to FALSE, then in a guest operating system, any
user or process, with or without root or administrator privileges, could use
VMware Tools to change device connectivity and settings. The user or
process could then connect or disconnect devices, such as network adapters
and CD-ROM drives and modify device settings. This functionality could
allow the user or process to connect a CD-ROM with sensitive data or
disconnect a network adapter, which could lead to denial of service for other
users.
Data encryption keys (DEKs): DEKs are internal keys generated by the
ESXi host and used to encrypt virtual machines and disks. DEKs are
XTS-AES-256 keys.
Key encryption key (KEKs): KEKs are the keys that vCenter Server
requests from the KMS. KEKs are AES-256 keys. vCenter Server stores
only the ID of each KEK and not the key itself. These keys are used to
encrypt the DEKs as they are written to an encrypted virtual machine’s
VMX file.
You can encrypt an existing virtual machine or virtual disk by changing its
storage policy. Encryption works with any guest OS because encryption
occurs at the hypervisor level. Encryption keys and configuration are not
contained in the virtual machine’s guest OS. Encryption works with any
supported storage type, including VMware vSAN.
You can encrypt virtual disks only for encrypted virtual machines. You
cannot encrypt the virtual disk of an unencrypted VM. You can encrypt
virtual machine files (NVRAM, VSWP, and VMSN files), virtual disk files,
and coredump files. Log files, virtual machine configuration files, and virtual
disk descriptor files are not encrypted. For each virtual machine, you can use
the vSphere Client to encrypt and decrypt virtual disks independently.
Coredumps are always encrypted on ESXi hosts where encryption mode is
enabled. Coredumps on the vCenter Server system are not encrypted. To
perform cryptographic operations, you must be assigned the cryptographic
operations privilege.
ESXi uses KEKs to encrypt the internal keys and stores the encrypted
internal keys on disk. ESXi does not store the KEK on disk. If a host reboots,
vCenter Server requests the KEK with the corresponding ID from the KMS
The vCenter Server requests a new key from the default KMS to use as
the KEK.
The vCenter Server stores the key ID and passes the key to the ESXi
host. If the host is part of a cluster, vCenter Server sends the KEK to
each host in the cluster.
The key itself is not stored on the vCenter Server system. Only the key
ID is known.
The ESXi host generates internal keys (DEKs) for the virtual machine
and its disks. It uses the KEKs to encrypt internal keys and keeps the
internal keys in memory only (never on disk). Only encrypted data is
stored on disk.
The ESXi host uses the encrypted internal keys to encrypt the virtual
machine.
Any hosts that can access the encrypted key file and the KEK can
perform operations on the encrypted virtual machine or disk.
Note
Only ESXi Versions 6.5 and later use encrypted vSphere vMotion.
The destination host must be configured with vTA and must be attested.
Encryption cannot change on migration.
You can migrate a standard encrypted virtual machine onto a trusted
host.
You cannot migrate a vTA encrypted virtual machine onto a non-trusted
host.
You can add a vTPM as you create a virtual machine by selecting Customize
Hardware > Add New Device > Trusted Platform Module. Likewise, you can
add a vTPM to an existing (powered-down) virtual machine. In the vSphere
Client, you can identify which virtual machines are enabled with vTPM by
using Show/Hide Column for a selected object, such as a host or cluster.
When vSGX is enabled on a virtual machine, the following features are not
supported for that machine:
vMotion/DRS migration
Virtual machine suspend and resume
Memory snapshots (Virtual machine snapshots are supported without
snapshotting the memory.)
Fault Tolerance
Guest Integrity (GI) (the platform foundation for VMware AppDefense
10)
VMware NSX
You can implement VMware NSX Data Center for vSphere (NSX) to add a
distributed logical firewall, microsegmentation, and additional security
measures to your vSphere environment.
NSX provides Distributed Firewall (DFW), which runs in the VMkernel as a
VIB package on all NSX-prepared ESXi hosts. DFW offers near-line-rate
NSX provides other security features, such as Service Composer, which you
can use to configure security groups and security policies. A security policy
AppDefense
You can secure your vSphere environment further by using VMware
AppDefense, which is a data center endpoint security product that protects
applications running in vSphere. AppDefense understands an application’s
intended state and behavior, and it monitors for changes to that intended state
that indicate a threat. When a threat is detected, AppDefense automatically
responds based on the implemented policies. You can use AppDefense to
define “good behavior” and to trigger automated custom actions when other
behavior is detected. For vSphere 7.0, AppDefense is available only as a
separate product. For vSphere 6.7, AppDefense is included in the vSphere
Platinum edition.
Key features of AppDefense include the following:
It understands the intended state of each application and runs inside the
hypervisor, where it has an authoritative understanding of how data
center endpoints are meant to behave. This means it is the first to know
when changes are made.
It is hypervisor based, and so it runs in an isolated, protected
environment, reducing the likelihood that it will be compromised.
When a threat is detected, it takes the action that you preconfigure,
leveraging vSphere and NSX, such as:
Block VM network communication
Snapshot a VM
Suspend or shut down a VM
Review Questions
1. You are preparing to implement certificates in your vSphere
environment. Which of the following does VCMA support in
custom certificates when it is used as a subordinate CA?
a. CRL distribution points
b. Authority information access
c. CRT format
d. Certificate template information
2. On which of the following items can you set permissions in
vCenter Server?
a. Licenses
b. Datastores
c. Roles
vSphere Installation/Configuration
vSphere Installation
This chapter covers the following topics:
Foundation Topics
Step 1. Verify that all the target machine hardware is supported and meets
minimum requirements.
Step 2. Gather and record the information that will be required during the
installation (see Table 8-2).
Table 8-2 Information Required for ESXi Installation
Information Required or Optional Details
Keyboard layout Required Default: US English
VLAN ID Optional Range: 0–4094
Default: None
IP address Optional Default: DHCP
Subnet mask Optional Default: Based on the
configured IP address
Gateway Optional Default: Based on the
configured IP address
and subnet mask
Default: None
Migrate existing Required if you are Default: None
ESXi settings; installing ESXi on a drive
preserve VMFS with an existing ESXi
datastore installation
Root password Required Must contain at least 8
to 40 characters and
meet other
requirements
Default: None
Step 3. Verify that the server hardware clock is set to UTC. This setting is
in the system BIOS.
Step 4. Download the ESXi installer ISO and prepare the hardware system
to boot from it.
Step 5. Start the machine so that it boots from the ESXi installer.
Step 6. On the Select a Disk page, select the drive on which to install ESXi
and press Enter.
Step 7. Select the keyboard type and language for the host.
Step 8. Enter a password to be used by the root account.
Step 9. When prompted to do so, remove the bootable media and press
Enter to reboot the host.
Note
It is important for the IP address of the management network to remain
You can use the DCUI to configure DNS by following this procedure:
Step 1. Select Configure Management Network and press Enter.
Step 2. Select DNS Configuration and press Enter.
Step 3. Select Use the Following DNS server Addresses and Hostname.
Step 4. Enter the primary server, an alternative server (optional), and the
host name.
After ESXi is installed and the management network is configured, you can
manage the host and make other configuration changes by using the vSphere
Host Client.
FTP server
HTTP/HTTPS server
NFS server
USB flash drive
CD-ROM drive
To start the installation script, you can enter boot options at the ESXi installer
boot command line. At boot time, you can press Shift+O in the boot loader
netdevic
e=device
nameser Specifies the domain name server to be used for downloading
ver=ip the installation script and installation media.
address
netmask= Specifies the subnet mask used for downloading the
subnet installation script.
mask
vlanid=v Specifies the VLAN used for downloading the installation
lanid script.
There is a default installation script included with the ESXi installer, and it
can be used to install ESXi onto the first disk that is detected. The default
ks.cfg installation script is in the initial RAM disk at
/etc/vmware/weasel/ks.cfg. The location of the default ks.cfg file can be
defined with the ks=file://etc/vmware/weasel/ks.cfg boot option. When
using the ks.cfg script for the installation, the default root password is
myp@ssw0rd. The installation script on the installation media can’t be
modified. After the ESXi host has been installed, the vSphere Host Client or
You can see that this default script sets the root password to myp@ssw0rd,
installs on the first disk, overwrites any existing VMFS datastore, and sets the
network interface to use DHCP. When creating your own script, you can
specify many options, a few of which are shown in Table 8-4.
Table 8-4 Sample Options for ESXi Installation Script
Comma Optio Descript
nd ns
clear -- Removes partitions on all drives except those specified.
part igno
(optio redr
nal) ives
=
-- Allows overwriting of VMFS partitions on the specified
--disk=/vmfs/devices/disks/mpx.vmhba1:C0:T0:L0
MPX name:
--disk=mpx.vmhba1:C0:T0:L0
VML name:
--disk=vml.000000034211234
vmkLUN UID:
--disk=vmkLUN_UID
-- Excludes solid-state disks from eligibility for partitioning.
igno
ress
d
-- Used to install ESXi on a disk—either SSD or HDD
over (magnetic)—that is already in a vSAN disk group.
writ
VMwareAccepted
Partner Supported
CommunitySupported
You control the behavior of the vSphere Auto Deploy server by using rules.
The rules engine checks the rule set for matching host patterns to decide
which items (image profile, host profile, vCenter Server location, or script
object) to use to provision each host. Rules can assign image profiles and
host profiles to a set of hosts. A rule can identify target hosts by boot MAC
address, Basic Input/Output System (BIOS), universally unique identifier
(UUID), System Management BIOS (SMBIOS) information, vendor, model,
or fixed DHCP IP address. You can create rules by using the vSphere Web
Client or vSphere Auto Deploy cmdlets with the PowerCLI. For example, to
create a new deployment rule named Rule-01 that places all hosts in a folder
named Auto-deployed Hosts, you can use the following PowerCLI command:
Click here to view code image
New-DeployRule -Name Rule-01 -Item "Auto-deployed Hosts" -allhosts
Table 8-6 describes some of the common Auto Deploy PowerCLI cmdlets.
Table 8-6 Common Auto Deploy PowerCLI cmdlets
cmdlet Description
Get- Returns a list of Auto Deploy cmdlets.
Depl
oyCo
mma
nd
New- Creates a new rule with the specified items and patterns.
Depl
oyRu
Get- Retrieves rules that match a pattern. For example, you can
VM retrieve all rules that apply to a host or hosts. Use this cmdlet
Host primarily for debugging.
Matc
hing
Rule
s
Test- Checks whether the items associated with a specified host are in
Depl compliance with the active rule set.
oyRu
leset
Com
plian
ce
Repa Given the output of Test-DeployRulesetCompliance, this cmdlet
ir- updates the image profile, host profile, and location for each host
Depl in the vCenter Server inventory. The cmdlet might apply image
oyRu profiles, apply host profiles, or move hosts to the prespecified
leset folders or clusters on the vCenter Server system.
Com
plian
ce
Appl Associates the specified image profile with the specified host.
y-
EsxI
mage
Profi
le
Get- Retrieves the image profile in use by a specified host. This cmdlet
VM differs from the Get-EsxImageProfile cmdlet in the Image
Host Builder PowerCLI.
Repa Deploys a new image cache. Use this cmdlet only if the Auto
ir- Deploy image cache is accidentally deleted.
Depl
oyIm
ageC
ache
Get- Retrieves the attributes for a host that are used when the Auto
VM Deploy server evaluates the rules.
Host
Attri
butes
Get- Returns a string value that Auto Deploy uses to logically link an
Depl ESXi Host in vCenter to a physical machine.
oyM
achin
eIde
ntity
Set- Logically links a host object in the vCenter Server database to a
Depl physical machine. Use this cmdlet to add hosts without specifying
oyM rules.
achin
eIde
ntity
Get- Retrieves the Auto Deploy global configuration options. This
Depl cmdlet currently supports the vlan-id option, which specifies the
oyOp default VLAN ID for the ESXi Management Network of a host
tion provisioned with Auto Deploy. Auto Deploy uses the value only
if the host boots without a host profile.
Set- Sets the value of a global configuration option. Currently supports
Depl the vlan-id option for setting the default VLAN ID for the ESXi
oyOp Management Network.
1. The host starts a PXE boot sequence. The DHCP server assigns an IP
address and redirects the host to the TFTP server.
2. The host downloads and executes the iPXE file (configured by the
DHCP server) and applies the associated configuration file.
3. The host makes an HTTP boot request to the vSphere Auto Deploy
server. The HTTP request includes hardware and network information.
4. The vSphere Auto Deploy server queries the rules engine and streams
data (the ESXi image) from the image profile and the host profile.
5. The host boots using the image profile. If the vSphere Auto Deploy
server provided a host profile, the host profile is applied to the host.
6. vSphere Auto Deploy adds the host to the proper inventory location and
cluster in the vCenter Server system.
7. If the host is part of a DRS cluster, virtual machines from other hosts
might be migrated to the host.
Note
If a host profile requires a user to specify certain information, such as a
static IP address, the host is placed in maintenance mode when the host
is added to the vCenter Server system. You must reapply the host
profile and update the host customization to have the host exit
maintenance mode.
Note
The vCenter installation program allows migration from a Windows-
based vCenter Server to the vCenter Server Appliance, including
migration from Oracle or Microsoft SQL to the embedded PostgreSQL
database.
Photon OS 3.0
vSphere Authentication Services
PostgreSQL
The VMware vSphere Lifecycle Manager extension for the vSphere
Client
VMware vCenter Lifecycle Manager
Windows 2012 R2
x86-64 bit
Note
vCenter 7 incorporates all services that were part of the PSC to a single
vCenter VM.
Using the GUI installer involves two stages. In the first stage, you navigate
through the installation wizard, choose the deployment type, provide the
Step 17. Optionally, choose the option to join the VMware Customer
Experience Improvement Program (CEIP).
Step 18. On the Ready to Complete page, click Finish and then click OK.
Step 2. Copy the templates from the install subfolder to your desktop.
Step 3. Use a text editor to modify the JSON template for your use case.
Modify the default parameter values with your appropriate values
and add additional parameters, as necessary. For example, to use an
IPv4 DHCP assignment, in the network subsection of the template,
change the value of the mode parameter to dhcp and remove the
default configuration parameters that are used for a static
assignment, as shown here:
Note
When using the CLI installer, you must strictly use only ASCII
characters for the command-line and JSON configuration file values,
including usernames and passwords.
Machine
vpxd
vpxd-extension
vsphere-webclient
You can let VMCA operate in a default manner, so that it uses a self-
signed root certificate, issues certificates to the vSphere components, and
serves as the certificate authority (CA) to vSphere.
You can configure VMCA to operate as a subordinate CA on behalf of
the enterprise’s CA and to use a subordinate CA signing certificate.
You can bypass VMCA and use only third-party certificates, which you
need to store in the VECS, except for ESXi host certificates. When
necessary, you can use vecs-cli commands to explicitly manage
certificates and keys.
Note
The VMCA in vSphere 7.x does not support the use of CRLs, and it
does not have the concept of certificate revocation. If you suspect that
one certificate was compromised, you should remove it and consider
replacing all certificates.
When you use VMCA in the default manner, so that it acts as the CA for
vSphere, no real configuration is required other than to configure web
browsers to trust VMCA. The VMCA can handle all certificate management
in vSphere environments, where historically the administrator has elected not
to replace certificates. During an upgrade to vSphere 6.0, all self-signed
certificates are replaced with certificates signed by VMCA.
Using VMCA in a subordinate CA manner requires you to replace the
VMCA root certificate with a certificate signed by a third-party CA, making
When adding an Active Directory over LDAP identity source, you need to
provide information for the following parameters:
You can add additional user accounts from other identity sources to the SSO
administrators group. To add additional user accounts from other identity
Note
See Chapter 13, "Managing vSphere and vCenter Server," for more
details on vSphere Lifecycle Manager.
Ensure that the appropriate data center and (optionally) folder objects are
created in the vCenter Server inventory.
Obtain the root account credentials for the host.
Verify that the host and vCenter Server can communicate via port 902 or
a custom port.
Verify that any NFS mounts on the host are active.
For a host with more than 512 LUNs and 2048 paths, verify that the
vCenter Server instance is set to support a Large or X-Large
environment.
Implementing vCenter HA
You can use this procedure to attach a profile to ESXi hosts and clusters:
Step 1. From the host profiles main view, select the host profile to be
applied to the host or cluster.
Step 2. Click Attach/Detach Hosts and Clusters, select the host or cluster
from the expanded list, and click Attach.
Step 4. Optionally, enable Skip Host Customization; if you do, you do not
need to customize hosts during this process.
Step 6. Click Next.
Step 7. Optionally, update or change the user input parameters for the host
profiles policies by customizing the host.
Step 8. Click Finish to finish attaching the host or cluster to the profile.
VMware Tools
Ideally, you should install VMware Tools in all your virtual machines. When
deploying a new vSphere environment, you should install VMware Tools in
any virtual machines deployed as part of the virtual infrastructure and
management. For example, if you use virtual machines to run Active
Directory domain controllers, DNS servers, or DHCP servers, consider
installing VMware Tools.
VMware Tools is a suite of utilities that you install in the operating system of
a virtual machine. VMware Tools enhances the performance and
management of the virtual machine. You can use the following procedure to
install VMware Tools in a virtual machine using the VMware Host Client:
Step 1. Click Virtual Machines in the VMware Host Client inventory.
Step 2. Select a powered-on virtual machine from the list. (The virtual
machine must be powered on to install VMware Tools.)
Step 3. Open a console to the virtual machine and log in with administrator
or root privileges.
Step 4. Click Actions, select Guest OS from the drop-down menu, and
select Install VMware Tools.
Step 5. Use the guest OS to complete the installation.
This procedure is useful for installing VMware Tools in a DNS, Active
Directory domain controller, database server, or other virtual machine that
you may deploy prior to deploying vCenter Server.
You need to issue boot options at the time of boot, either by defining the
kernel options in the ESXi boot.cfg file or by manually entering the boot
options after pressing Shift+O in the ESXi boot loader. Table 8-11 lists the
boot options.
Table 8-11 ESXi 7.0 Kernel Options
Kernel Description
Option
autoP This option, if set to TRUE, defines automatic partitioning of the
Local VMFS
--no-auto-partition
autoPartitionCreateUSBCoreDumpPartition
autoPartitionDiskDumpPartitionSize
Review Questions
1. You are using the GUI installer for vCenter Server 7.0. Which of
the following statements is true?
a. In the first stage, you choose the deployment type. In the
second state, you navigate through the installation wizard.
b. In the first stage, you provide the appliance settings. In the
second stage, you navigate through the installation wizard.
c. In the first stage, you choose the deployment type. In the
second stage, you deploy the OVA.
Foundation Topics
You can use the following procedure to create a vSS that provides network
connectivity for hosts and virtual machines:
Step 1. In the vSphere Client, select an ESXi host in the inventory pane and
navigate to Configure > Networking > Virtual Switches.
Step 2. Click Add Networking.
Step 3. Select a connection type (VMkernel Network Adapter, Physical
Network Adapter, or Virtual Machine Port Group for a Standard
Switch) for which you want to use the new standard switch and
click Next.
Step 4. Select New Standard Switch, optionally change the MTU setting
(from the default 1500), and click Next.
Step 5. Carry out the appropriate steps for the selection you made in Step 3:
On the Create a Standard Switch page, to add physical network
adapters to the standard switch, do the following steps. Otherwise,
click Next.
a. In the Assigned Adapters window, click the Add Adapter
(green plus sign) button.
b. From the list of available network adapters, select one or more
adapters.
c. Click OK and then click Next.
If you created a new standard switch with a VMkernel adapter, use
the Port Properties page to configure the adapter:
a. Provide a network label that indicates its purpose, such as
vMotion or NFS.
b. Optionally, set a VLAN ID.
c. Select IPv4, IPv6, or IPv4 and IPv6.
d. Set MTU to a custom size for the VMkernel adapter or choose
Note
If you create a standard switch without physical network adapters, all
traffic on that switch is confined to that switch. You can create a
standard switch without physical network adapters if you want a group
of virtual machines to be able to communicate with each other but with
nothing else.
You can make vSS configuration settings, including settings that control
switch-wide defaults for ports. Such settings can be overridden by port group
settings. To modify the settings of a vSS, select the host in the vSphere Client
inventory pane and click Edit. You can then adjust the following settings:
To change or add physical adapters that are assigned to a vSS, you can use
the following procedure:
Step 1. In the vSphere Client, select the ESXi host in the inventory pane
and navigate to Configure > Networking > Virtual Switches.
Step 2. Navigate to the appropriate standard switch and select Manage
Physical Adapters.
Step 3. In the Manage Physical Adapters window, click the Add Adapter
(green plus sign) button.
Step 4. In the Add Physical Adapters to Switch window, select one or more
adapters to assign to the vSS and click OK.
Step 5. In the Manage Physical Adapters window, use the up and down
buttons to set each assigned vSS adapter to Active, Standby, or
Unused. Click OK.
To view the MAC address and other characteristics of a host’s physical NICs,
you can select the host and navigate to Configure > Networking > Physical
Adapters. To change the speed and duplexing of an adapter, select the
adapter, click Edit, and made the change.
When configuring networks for the virtual machines in your vSphere
environment, consider whether you want to migrate the virtual machines
among a set of hosts. If so, be sure that the hosts are in the same broadcast
domain (that is, the same Layer 2 subnet). ESXi does not support migration
of virtual machines between hosts in different broadcast domains as a virtual
Step 4. On the Connection Settings page, set a network label for the port
group and, optionally, set a VLAN ID. Click Next.
Click Next.
Step 5. On the Ready to Complete page, review the settings you selected
and click Finish.
If you plan on using NSX-T, set the vDS version to 7.0 and use NSX-T 3.0 or
later.
Upgrading a vDS
You can upgrade a vDS from Version 6.x to a later version, but you cannot
revert a vDS to an earlier version. As a rollback plan, you should export the
distributed switch configuration prior to upgrading. In the export wizard,
choose the option to include the distributed port groups. If an issue emerges,
you can re-create the vDS by importing the switch configuration file and
choosing the Preserve Original Distributed Switch and Port Group Identifiers
option.
The following list provides information for exporting and importing vDS
configuration.:
Upgrading a distributed switch causes the hosts and virtual machines attached
to the switch to experience brief downtime. VMware recommends
performing the upgrade during a maintenance window and changing the DRS
Note
If some ESXi hosts are incompatible with the selected target version,
you should upgrade (or remove) the incompatible hosts or select
another distributed switch version.
You can use the following procedure to add a distributed port group to a vDS
to create a network for connecting virtual machines and VMkernel adapters:
Step 1. In the vSphere Client, right-click a distributed switch in the
inventory pane and select Distributed Port Group > New
Distributed Port Group.
Step 2. In the wizard, provide a name for the new distributed port group or
accept the generated name and click Next.
Step 3. On the Configure Settings page, optionally change any of the
following properties:
Port Binding: Choose Static or Ephemeral.
Port Allocation: Choose Elastic or Fixed.
Number of Ports: Increase or decrease the value from the default
(which is 8).
Network Resource Pool: Select an available pool.
VLAN: Set VLAN Type to none, VLAN, VLAN Trunking, or
Private VLAN and provide the corresponding settings.
Advanced: Select the Customize Default Policy Configuration
checkbox.
Click Next.
Step 4. If you selected the Customize Default Policy Configuration
checkbox in step 4, you can use the following pages to customize
policies:
On the Security page, provide your choices for accepting or
rejecting Promiscuous Mode, MAC Address Changes, and Forged
Transmits and click Next.
On the Traffic Shaping page, enable ingress traffic shaping or
egress traffic shaping, or both. If you enable traffic shaping, you
Step 5. On the Monitoring page, enable or disable NetFlow and click Next.
Step 6. On the Miscellaneous Settings page, click Next.
Step 7. On the Ready to Complete page, review the settings and click
Finish.
VMkernel Networking
This section describes the procedures for configuring VMkernel networking.
To view and edit the configuration of existing TCP/IP stacks on a host, you
can use the following procedure:
Step 1. In the vSphere Client, select the host in the inventory pane and
navigate to Configure > Networking > TCP/IP Configuration.
Step 2. Select any of the stacks in the table, such as Default, vMotion,
Provisioning, or a custom stack.
Step 3. Examine the details pane, which may include DNs, routing,
IPv4/IPv6 routing tables, a control algorithm, and the maximum
number of allowed connections.
Step 4. Click Edit and use the following pages to modify the selected stack.
Step 5. On the DNS Configuration page, choose one of the following
methods:
Obtain Settings Automatically from a VMkernel Network
Adapter: Select an existing VMkernel adapter.
Enter Settings Manually: Provide the host name, domain name,
preferred DNS server, alternate DNS server, and search domains.
To create a custom TCP/IP stack, you can use the following command in the
After creating a custom stack, you can use the previous procedure to
configure the stack. When creating a VMkernel virtual network adapter, you
can select any existing custom stack or predefined stack (default, vMotion, or
provisioning).
By default, NIOC applies shares to each network traffic type as shown in the
following list:
To configure resource allocation for system traffic, you can use the following
procedure:
Step 1. In the vSphere Client, select the distributed switch in the inventory
pane.
Step 2. On the Configure tab, expand Resource Allocation.
Step 3. Click System Traffic.
Step 4. Select the appropriate traffic type and click Edit.
Step 5. Set the desired values for Shares, Reservation, and Limit.
Step 6. In the Reservation text box, enter a value for the minimum
bandwidth that must be available for the traffic type.
Step 7. In the Limit text box, set the maximum bandwidth that system
traffic of the selected type can use.
Step 8. Click OK to apply the allocation settings.
Note
The maximum quota that you can assign to the pool is equal to the
aggregated reservation for virtual machine system traffic minus the
quotas of the other network resource pools.
After creating a network resource pool, you can assign a distributed port
group to the resource pool by using the following procedure:
Step 1. In the vSphere Client, right-click a distributed port group in the
inventory pane and select Edit Settings.
Step 2. In the settings, click General.
Step 3. In the Network Resource Pool drop-down menu, select the network
resource pool and click OK.
Finally, you can set the network shares, reservation, and limit settings for
individual virtual machines that are connected to the distributed port group in
a network resource pool by using the following procedure:
Step 1. In the vSphere Client, select a virtual machine in the inventory pane
and navigate to Actions > Edit Settings.
Step 2. Expand the Network Adapter section of the VM network adapter.
Step 3. Either add and configure a new network adapter or select an
existing network adapter.
Step 4. Configure the network adapter’s Shares, Reservation, and Limit
settings.
Step 5. Click OK.
You can use the following vCLI command to examine a host’s virtual
functions:
esxcli network sriovnic
You can use the following procedure to implement SR-IOV for a virtual
machine:
Step 1. In the vSphere Client, select the virtual machine in the inventory
pane.
Step 2. Power off the virtual machine.
Step 3. Select Actions > Edit Settings.
Step 4. Select the Virtual Hardware tab.
Step 5. From the Add New Device drop-down menu, select Network
Adapter.
Step 6. Expand the New Network section and connect the virtual machine
to a port group. (The virtual NIC does not use this port group for
data traffic. The port group is used to identify the networking
properties, such as VLAN tagging, to apply on the data traffic.)
Step 7. Select Adapter Type > SR-IOV Passthrough.
Step 8. From the Physical Function drop-down menu, select the physical
NIC.
Step 9. To allow changes in the MTU of packets from the guest operating
system, use the Guest OS MTU Change drop-down menu.
Step 10. Expand the Memory section, select Reserve All Guest Memory
(All Locked) and click OK.
Step 11. Power on the virtual machine.
Note
The step to reserve all the guest memory is required to allow the I/O
memory management unit (IOMMU) and the passthrough device to
access the memory using direct memory access (DMA).
Optionally, you can use the virtual switch, port group, or port to set the MTU
size, security policy for VF traffic, and VLAN tagging mode.
You can enable SR-IOV with host profiles. In a host profile, expand General
System Settings > Kernel Module. Select the appropriate physical function
driver and provide the number of virtual functions that you want to provide
for each physical function. The details depend on your hardware.
Click Next.
Step 6. Identify the traffic source by using the following options:
Add Existing Ports from a List: Click Select Distributed Ports,
select each port, and click OK.
Add Existing Ports by Port Number: Click Add Distributed
Ports, enter the port number, and click OK.
Set Traffic Direction: Select ingress, egress, or ingress/egress.
Specify the Source VLAN: If you selected a remote mirrored
destination, click Add and provide a VLAN ID.
Click Next.
Step 7. Select the destination by using the following information:
Select a destination distributed port: Click either Select
Distributed Ports or Add Distributed Ports to add by port
number.
Select an uplink: Select an uplink and click Add.
Select ports or uplinks: Select distributed ports and uplinks.
Specify IP address: Click Add and provide an IP address.
Click Next.
You can use a similar procedure to edit port mirroring sessions; however, in
step 2, you should select a session and click Edit. To remove a session, click
Remove.
The number of ports in each port channel must match the number of
physical NICs that will be aggregated on the host (a minimum of two).
The same hashing algorithm must be used for the port channel and the
associated LAG on the vDS.
All the NICs in a LAG must be configured with the same speed and
duplexing.
Before creating the LAG on a vDS in vSphere 7.0, you should address the
following requirements:
Destination IP address
Destination IP address and TCP/UDP port
To change the LACP feature state from Basic Support to Enhanced Support,
you can use the following procedure:
Step 1. In the vSphere Client, select the vDS in the inventory pane and
navigate to Summary > Features.
Step 2. Verify that Link Aggregation Control Protocol is set to Basic
Support.
Step 3. Select Actions > Upgrade.
Step 4. Select Enhance LACP Support.
To prepare for adding ESXi hosts to a vDS, you should do the following.:
Step 1. Create distributed port groups for virtual machines.
Step 2. Create distributed port groups for VMkernel networking, such as
management, vMotion, and Fault Tolerance.
Step 3. Configure uplinks on the distributed switch for physical NICs that
you want to connect to the switch.
Step 4. Configure the vDS to support the hosts’ VMs. For example, set the
vDS’s MTU and discovery protocols.
You can use the Add and Manage Hosts wizard to add multiple hosts at a
time. To do so, follow these steps:
Step 1. In the vSphere Client, select the distributed switch in the inventory
pane and navigate to Actions > Add and Manage Hosts.
Step 2. On the Select Task page, select Add Hosts and click Next.
Step 3. On the Select Hosts page, click New Hosts.
Step 4. Select the appropriate hosts in your data center, click OK, and then
click Next.
Step 5. On the next page, select the tasks for configuring network adapters
to the distributed switch and click Next.
Note
In the vSphere inventory, the hosts that you add must reside in the
same data center as the vDS.
Note
If you migrate or create VMkernel adapters for iSCSI, verify that the
teaming and failover policy of the target distributed port group meets
the requirements for iSCSI:
Verify that only one uplink is active, the standby list is empty, and the
rest of the uplinks are unused.
Verify that only one physical NIC per host is assigned to the active
uplink.
Review Questions
1. You want to use VLAN guest tagging with your vSphere Standard
Switch. What setting should you make on the standard port group?
a. Set VLAN ID to 0.
b. Set VLAN ID to 4095.
c. Set VLAN Type to Trunking.
d. Set VLAN Type to Guest Tagging.
2. You are preparing to upgrade a vDS from Version 6.x to 7.0. What
step should you take prior to upgrading?
a. Copy the vDS.
b. Back up vCenter Server.
c. Export the vDS configuration, including the distributed port
group configuration.
d. Export the vDS configuration, excluding the distributed port
group configuration.
3. You enabled NIOC, reserved virtual machine system traffic, and
created a network resource pool. Which of the following steps do
you need to take to allow a virtual machine to use the network
This chapter introduces vSphere 6.7, describes its major components, and
identifies its requirements.
1. In a cluster that you initially created using Quickstart and for which
you chose the option Configure Network Settings Later, you now
want to add a host. Which of the following is a true statement?
a. You cannot use Quickstart to add more hosts to the cluster.
b. You can use Quickstart to add hosts to the cluster and
configure the host networking.
c. You can use Quickstart to add hosts to the cluster but must
manually configure the host networking.
d. You can edit the cluster and change the Configure Networking
Settings Later option.
2. You are creating a resource pool in a DRS cluster. Which of the
following statements is not true?
a. When you create a child resource pool, the system applies
admission control.
b. If you choose Scale Descendant’s Shares, child pools use
scalable share.
c. The default CPU reservation is 0.
d. The default memory limit is 0.
3. You are configuring a vSphere HA cluster. Which of the following
is not a valid setting for Define Host Failover Capacity?
Foundation Topics
Creating a Cluster
To create a vSphere cluster that you plan to configure using Quickstart, you
should ensure that the hosts have the same ESXi version and patch level. If
you are adding hosts to the vCenter Server inventory, you need the
credentials for the root user account for the hosts. You must have the
Host.Inventory.Create Cluster privilege. To create a cluster that you manage
with a single image, verify that you have a supported ESXi 7.0 or later image
available in the vSphere Lifecycle Manager depot. You can use the following
procedure to create the cluster:
Step 1. In the vSphere Client, right-click a data center in the inventory pane
and select New Cluster.
Step 2. Enter a name for the cluster.
Step 3. Optionally, for each of the following services, slide the switch to the
right to enable the service:
DRSv
Sphere HA
vSAN
Step 1. In the vSphere Client, select a cluster in the inventory pane and
navigate to Configure > Configuration > Quickstart > Add Hosts
> Add.
Step 2. Click New Hosts > Add and provide the name (or IP address) and
credentials for each host that you want to add that is not already in
the vCenter Server inventory.
Step 3. Optionally, select the Use the Same Credentials for All Hosts
option.
Step 4. Click Existing Hosts > Add and select each host that you want to
add that is already in the vCenter Server inventory.
Step 5. Click Next.
Step 6. On the Host Summary page, click Next.
EVC Mode
Note
When you create a child resource pool, the vSphere Client prompts you
for resource pool attribute information. The system uses admission
control to ensure that you do not allocate resources that are not
available. If you choose Scale Descendant’s Shares, each descendant
pool will also use scalable shares. You cannot change this behavior for
each child pool.
To configure admission control for a vSphere HA cluster, you can use the
following procedure:
Step 1. In the vSphere Client, select the vSphere HA cluster in the
inventory pane and navigate to Configure > vSphere Availability
> Edit.
Step 2. Click Admission Control and set Host Failures Cluster Tolerates to
Configuring VMCP
To configure Virtual Machine Component Protection (VMCP) in a vSphere
HA cluster, you can use the following procedure:
Step 1. In the vSphere Client, select the cluster in the inventory pane and
navigate to Configure > vSphere Availability > Edit.
Step 2. Select Failures and Responses > Datastore with PDL and choose
one of the following:
Issue Events
Power Off and Restart VMs
Step 3. Select Failures and Responses > Datastore with APD and choose
one of the following:
Issue Events
Power Off and Restart VMs–Conservative Restart Policy
Power Off and Restart VMs–Aggressive Restart Policy
Configuring Proactive HA
Step 2. In the vSphere Client, select the cluster in the inventory pane and
navigate to Configure > vSphere Availability > Edit.
Step 3. Select Turn on Proactive HA.
Step 4. Click Proactive HA Failures and Responses.
Metrics
Performance metrics are organized into logical groups based on the object or
object device, as shown in Table 10-3.
Table 10-3 Metrics
Metric Description
Group
Cluster Performance metrics on vSphere host clusters.
Services
CPU CPU utilization metrics for hosts, virtual machines, resource
pools, or compute resources.
Datastore Datastore utilization metrics.
Disk Disk utilization metrics for hosts, virtual machines, or
datastores.
Memory Memory utilization metrics for hosts, virtual machines,
resource pools, or compute resources.
Network Network utilization metrics for physical NICs, virtual NICs,
and other network devices.
Power Energy and power utilization metrics for hosts.
Overview and advanced performance charts are available for data center,
cluster, host, resource pool, vApp, and virtual machine objects. Overview
performance charts are also available for datastores and datastore clusters.
Performance charts are not available for network objects. Charts are
organized into views, which you can use to see related data together on one
screen. You can specify the time range or data collection interval. Advanced
charts contain more information than overview charts. You can print,
configure, and export advanced charts (PNG, JPEG, or CSV formats).
You can use the vSphere Client to examine the overview performance charts
for data centers, clusters, datastores (and datastore clusters), hosts, resource
pools, vApps, and virtual machines.
To view a performance chart, you can use the following procedure:
Step 1. In the vSphere Client, select an appropriate object in the inventory
pane and navigate to Monitor > Performance.
Step 2. Select a view.
Step 3. Select a predefined or custom time range.
Table 10-5 lists the available performance chart views by object type.
Table 10-5 Views by Object Type
Object View List Items
Type
Data Clusters: Thumbnail CPU and memory charts for each cluster
center and stacked charts for total data center CPU and memory.
Hosts: Thumbnail charts for each host and stacked charts for
total cluster CPU, memory, disk usage, and network usage.
Host Home: CPU, memory, disk, and network charts for the host.
Note
When Storage I/O Control is disabled, the values for the Storage I/O
Normalized Latency metrics are zeros.
Note
Pop-up charts are useful for maximizing the available real estate for a
chart and for comparing two separate charts side by side.
Note
For the stacked graph type, you can use only one measurement unit. In
addition, per-virtual-machine stacked graphs are available only for
After you create a custom chart, the chart is added to the View drop-down
list. You can then use the chart in the same manner that you would any
prebuilt view.
You can use the following procedure to delete a custom chart:
Step 1. In the vSphere Client, select an appropriate object in the inventory
pane and navigate to Monitor > Performance.
Step 2. Select Advanced > Chart Options.
Step 3. Select the chart and click Delete Options.
You can use the following procedure to save data from an advanced
performance chart to a file either in a graphic format or in a comma-separated
values (CSV) format:
Step 1. In the vSphere Client, select an object in the inventory pane and
navigate to Monitor > Performance.
Step 2. Click Advanced.
Step 3. Optionally, select a view or change chart options until you are
satisfied with the chart.
Step 4. Click the Export icon.
Step 5. Select one of the following options:
To PNG: Exports a bitmap image to PNG format.
To JPEG: Exports a bitmap image to JPEG format.
To CSV: Exports text data to CSV format.
To SVG: Exports a vector image to SVG format.
Upgrade ESXi to
the latest version.
Enable CPU-
saving features
such as TCP
segmentation
offload, large
memory pages,
Increase the
amount of
memory allocated
to the virtual
machines, which
may improve
cached I/O and
reduce CPU
utilization.
Reduce the
number of virtual
CPUs assigned to
virtual machines.
Ensure that
VMware Tools is
installed.
Compare the
CPU usage of
troubled virtual
machines with
that of other
virtual machines
on the host or in
the resource pool.
(Hint: Use a
stacked graph.)
Migrate one or
more virtual
machines to other
hosts.
Add physical
memory to the
host.
Virtual The guest OS is not provided sufficient Increase the
machine: memory by the virtual machine. memory size of
Memory the virtual
usage is machine.
high.
Guest OS:
Memory
usage is
high.
Paging is
occurring.
Virtual The guest OS is not provided sufficient Increase the
machine: CPU resources by the virtual machine. number of CPUs
CPU ready for the virtual
is low. machine.
Migrate one or
more virtual
machines (or
virtual disks) to
other datastores.
Add datastores
with available
space to the
datastore cluster.
Configure the
queue depth and
cache settings on
the RAID
controllers.
Adjust the
Disk.SchedNumR
eqOutstanding
parameter.
Configure
multipathing.
Ensure that no
virtual machine
swapping or
ballooning is
occurring.
Defragment guest
file systems.
Assign additional
physical adapters
as uplinks for the
associated port
groups.
Replace physical
network adapters
with high-
bandwidth
adapters.
Place sets of
virtual machines
that communicate
with each other
regularly on the
Performan Some metrics are not available for pre- Upgrade hosts to
ce charts ESXi 5.0 hosts. a later version of
are empty. ESXi.
Data is deleted when you remove
objects to vCenter Server or remove Allow time for
them. data collection on
objects that were
recently added,
Performance chart data for inventory migrated, or
objects that were moved to a new site recovered to the
by VMware vCenter Site Recovery vCenter Server.
Manager is deleted from the old site
and not copied to the new site.
Power on all
hosts and allow
Performance charts data is deleted time for real-time
when you use VMware vMotion across statistics to
vCenter Server instances. collect.
To examine the CPU and memory usage more closely, you can navigate to
Monitor > vSphere DRS and select CPU Utilization or Memory Utilization.
Each of these pages shows a bar graph, where each bar represents the total
resource (CPU or memory) usage of a specific host and each bar is split into
sections representing the resource usage of individual virtual machines.
Likewise, you can select Monitor > vSphere DRS > Network Utilization to
examine the network utilization of each host in the cluster.
The Summary tab shows the vSphere DRS score, the number of DRS
recommendations, and the number of DRS faults, as shown in Figure 10-3.
Increase the CPU shares on the first pool by using a custom value.
Change the CPU shares on the second pool to Low.
Set an appropriate CPU reservation on the first pool.
Set an appropriate CPU limit on the second pool.
Change the configuration to use scalable shares.
The host health monitoring tool presents data gathered using Systems
Management Architecture for Server Hardware (SMASH) profiles. The
information displayed depends on the sensors available on the server
hardware.
Note
You can also set alarms to trigger when the host health status changes.
Step 3. Expand the following categories and examine the related health
warnings:
Compute Health Checks
Network Health Checks
Security Health Check
Storage Health Checks
General Health Checks
Note
The default CPU and memory reservation for a virtual machine is zero,
meaning that its guest OS is not guaranteed any specific amount of
either resource. Instead, with default settings, shares would be applied
during periods of compute resource contention.
You can set limits for CPU, memory, and storage I/O for a virtual machine to
establish an upper bound (maximum) amount of resources that can be
allocated to the virtual machine. The host never allocates more than the limit,
even when there are unused resources on the system. By default, the limits
are set to Unlimited, which means the virtual machine’s configured memory
becomes its effective limit. Using limits has both benefits and drawbacks:
Note
If you want to reduce the risk that a virtual machine may consume
excessive resources and impact the performance of other virtual
machines, you can consider setting low shares on the virtual machine.
Low shares decrease the virtual machine’s access to the resource
during periods of resource contention but also do not prevent the
virtual machine from using idle resources.
Admission Control
When you power on a virtual machine, the system checks the amount of
available unreserved CPU and memory resources. The system determines
whether it can guarantee the reservation for the virtual machine. This process
is called admission control. If enough unreserved CPU and memory are
available (or if there is no reservation), the virtual machine is powered on.
Otherwise, an “Insufficient Resources” warning appears.
Note
Each virtual machine, including those with no user-specified memory
reservation, may have some reservation for its memory overhead. The
memory overhead reservation is considered by admission control.
Note
When the vSphere Distributed Power Management (DPM) feature is
enabled and some hosts are in standby mode, their unreserved
resources are considered available for admission control. If a virtual
machine cannot be powered on without these resources, vSphere DPM
makes a recommendation to power on one or more standby hosts.
Latency Sensitivity
If you have a latency-sensitive application, such as voice over IP (VOIP) or a
media player application, you can edit the virtual machine’s settings and set
VM Options > Advanced >Latency Sensitivity to High. With this setting, you
should ensure that all the virtual machine’s configured CPU and memory are
reserved. With this setting, the system effectively gives exclusive physical
The specific settings you make for a virtual machine can impact its
performance, as summarized in Table 10-8.
Table 10-8 The Impact of Virtual Machine Configurations
Configur Impact
ation
Compu An oversized compute size for a virtual machine may result in
te wasted resources. With an undersized compute size, the virtual
oversiz machine may experience poor performance.
e/under
size
Virtual An oversized virtual disk may result in wasted resources. With
disk an undersized virtual disk, the virtual machine may experience
oversiz denial of service.
e/under
size
VMDK If a virtual disk is thin provisioned, then you may be
provisi maximizing the use of your storage space while decreasing the
oning virtual machine’s performance and increasing its risk of denial
types of service.
Resour If a resource is reserved, you may be improving and
ce guaranteeing the guest OS performance while reducing the
reserva density of virtual machines on the resource.
tions
Indepe If a virtual disk is set to independent mode, then you are
ndent prevented from taking snapshots of it. If it is set to
disks Independent–Nonpersistent, all changes are discarded when you
power off or reset the virtual machine.
ESXTOP
ESXTOP is a utility that provides a detailed real-time look at resource usage
from the ESXi Shell. You can run ESXTOP in Interactive, Batch, or Replay
mode. You must have root user privileges. RESXTOP is a similar tool that
can be installed and run from a Linux server and connected to ESXi hosts.
By default, when you issue the command esxtop, the utility opens in
interactive mode to show the CPU panel, where statistics for each virtual
machine and other groups are displayed in separate rows. To see just virtual
machines statistics, you can press Shift+V. Each column provides CPU
statistics, such as %USED, %WAIT, %RDY, %CSTP, and %SWPWT. To
see statistics for the multiple worlds (processes) that comprise a virtual
machine, you can press the E key and enter the virtual machine’s ID. Figure
10-4 shows an example of an ESXTOP CPU panel, displaying virtual
machine statistics with one virtual machine (GID 33791) expanded.
You can change the view from the CPU panel to other panels by using
keystrokes. For example, you can press M Key for the memory panel, V Key
for the virtual machine storage panel, or N Key for the network panel. Table
10-9 describes some of the key statistics available for each panel.
Table 10-9 Key ESXTOP Panels and Metrics
Panel Stati Description
stic
CPU % Percentage of physical CPU core cycles used by the
U virtual machine.
S
E
D
CPU % Percentage of total time scheduled for the virtual machine
R without accounting for hyperthreading, system time, co-
U stopping, and waiting:
N
%RUN = 100% – %RDY – %CSTP – %WAIT
CPU % Percentage of time the virtual machine was ready to run
R but was not provided CPU resources on which to execute.
Note
The Network panel contains a row for each NIC in a virtual machine
rather than a row for each virtual machine. The E and Shift+V
keystrokes are not applicable to the Network panel.
You can use the -b argument to run ESXTOP in batch mode, in which you
collect statistics in a CSV file. You can later manipulate this file with other
tools, such as Microsoft Perfmon or Excel. For example, you can use the
following command to collect statistics in a file named mydata.csv:
esxtop -b > mydata.csv
After collecting the data, you must unpack and decompress the resulting tar
file. Then you can run ESXTOP in Replay mode, providing the path to the
data file, as shown here:
esxtop -R vm-support_dir_path
VIMTOP
VIMTOP is a tool you can run in vCenter Server Appliance to see resource
usage for the services that are running. It is like ESXTOP but displays
services, such as vCenter Server, Certificate Manager, vPostgres, and ESXi
Agent Manager, rather than virtual machines and ESXi worlds (processes).
You can use VIMTOP to identify which service is using the most compute,
disk, or network resources whenever vCenter Server is running poorly.
Events
Events are simply recorded incidents, such as user actions or system actions,
that occurred involving a host or any object managed by vCenter Server. The
following are a few examples:
Event data includes details such as who generated it, when it occurred, and
what type of event it was. Table 10-10 describes the types of events
Table 10-10 Event Types
Eve Description
nt
Typ
e
A Provides data concerning events that are tracked because that data is
u crucial for the security framework. The data includes action details,
di such as who did it, when it occurred, and the IP address of the user.
t
In Indicates that the operation completed successfully.
fo
r
m
at
io
n
W Indicates a potential risk to the system that needs to be addressed.
ar This event does not terminate the process or operation.
Messages that are longer than 1024 characters are split into multiple syslog
messages.
Note
In an environment with no more than 30 hosts, you can configure hosts
to send log files to a vCenter Server rather than store them to a local
disk. This option is intended for smaller environments with stateless
ESXi hosts. For all other cases, VMware recommends that you use a
dedicated log server.
Alarms
An alarm is a notification that is activated in response to an event, a set of
conditions, or the state of an inventory object. Table 10-11 describes the
elements that are used in an alarm definition
Table 10-11 Alarm Definition Elements
Element Description
Name A name (label) that is used to identify the alarm
Description Text that is useful for understanding the purpose of the
alarm
Targets The type of object that is monitored by the alarm
Alarm A set of rules that define the alarm’s triggers, severity, and
Rules actions
Last The date of the most recent change to the alarm definition
Modified
For example, you might want to monitor the memory usage of all virtual
machines in a specific vSphere cluster. In the vSphere Client, you can select
the cluster in the inventory, create an alarm for the cluster, set the alarm’s
Targets value to virtual machine, and configure rules with triggers based on
memory usage.
Note
You can enable, disable, and modify alarms only from the object at
which the alarm is defined. For example, if you define a virtual
machine memory alarm on a cluster, you cannot change the alarm at
Note
After you acknowledge an alarm in the vSphere Client, its alarm
actions are discontinued. Alarms are not cleared or reset when
acknowledged.
To clear an alarm (that is, reset its state to normal), you need the Alarm.Set
Alarm Status privilege. You can select a triggered alarm and choose Reset to
Green.
Alarm Actions
Alarm actions are operations that are automatically triggered by alarms.
Table 10-12 provides details on available alarm actions.
Table 10-12 Alarm Actions
Acti Details
on
Se Indicates the recipient email address.
nd
E
ma Requires that you first configure the mail settings for your vCenter
il Server. You must set the primary receiver URL to the DNS name or
No IP address of your SNMP receiver. You should set the receiver port
tifi to an appropriate value between 1 and 65535 and set the community
cat string to an appropriate community identifier.
io
n
Logging in vSphere
ESXi Logs
Table 10-13 provides details on most of the ESXi log files, including the
location and purpose of each of them. You should become familiar with each
of them and learn which logs are useful for various troubleshooting scenarios.
For example, when troubleshooting virtual machine issues, the only directly
useful logs are vmkernel, vmkwarning, hostd, and the specific virtual
machine’s log files. When troubleshooting issues related to the connection
between an ESXi host and the vCenter Server, the vpxa log is most useful.
Table 10-13 ESXi Log Files
Comp Location Description
onent
VM /var/log/vmkernel. Data related to virtual machines and ESXi
kern log
el
VM /var/log/vmkwarni Data related to virtual machines
kern ng.log
el
warn
ings
VM /var/log/vmksum Data related to uptime and availability
kern mary.log statistics for ESXi
el
sum
mar
y
ESX /var/log/hostd.log Data related to the agent that manages and
i configures the ESXi host and its virtual
host machines
agen
t
Note
In step 3, you can select or deselect entire categories, such as System,
Virtual Machines, and Storage. You can also select or deselect specific
objects within each category, such as logs and coredumps.
You can collect ESXi log files by using the /usr/bin/vm-support command,
which generates a file named using the following format:
esx-date-unique-xnumber.tgz
Log Levels
The default log level setting is Info; this is where errors, warnings, and
informational level are logged. You can change the log level to lower levels,
such as Verbose, which is useful for troubleshooting and debugging but is not
recommended for normal use in production environments. You can use the
vSphere Client to change the logging level by selecting the vCenter Server,
selecting Configure > Settings > General > Edit, and setting the logging
settings to the appropriate level, as described in Table 10-14.
Table 10-14 vCenter Server Logging Options
Logging Option Description
None (Disable No vCenter Server logging occurs.
Logging)
Error (Errors The vCenter Server collects only error entries in its log
Only) files.
Warning The vCenter Server collects warning and error entries
(Warning and in its log files.
Errors)
Info (Normal The vCenter Server collects information, warning, and
Logging) error entries in its log files.
Verbose The vCenter Server collects verbose, information,
(Verbose) warning, and error entries in its log files.
Trivia The vCenter Server collects trivia, verbose,
config.log.level
config.log.maxFileNum
config.log.maxFileSize
config.log.compressOnRoll
Note
By default, vCenter Server vpxd log files are rolled up and compressed
into .gz files. You can turn off compression for vpxd log files by
adding the log.compressOnRoll key with the value false to the vCenter
Server advanced settings.
Step 5. Optionally, select specific log names and change the number of
rotations and log size for just that specific log.
Step 6. Click OK.
You can control how log files are maintained for virtual machines. A new log
file is created each time you power on or resume a virtual machine or
whenever the file size exceeds the vmx.log.rotateSize value, unless the value
is 0 (default). VMware recommends saving 10-log files, each one limited to
no less than 2 MB. If you need logs for a longer time span, you can set
vmx.log.keepOld to 20.
You can use the following procedure to change the number of log files for a
single virtual machine:
Step 1. In the vSphere Client, right-click a host or a virtual machine in the
inventory pane and click Edit Settings.
Step 2. Select VM Options > Advanced.
Step 3. Click Edit Configuration.
Note
To set the vmx.log.keepOld value for all virtual machines on a specific
host, edit the /etc/vmware/config file and add or edit a line like the
following:
vmx.log.keepOld = "10"
You can modify the /etc/vmware/logfilters file on a host to change its logging
behavior. In this file you can add an entry specifying the following options:
Add numLogs to specify the maximum number of log entries before the
specified log messages are filtered and ignored. Use 0 to filter and ignore
all the specified log messages.
Add Ident to specify one or more system components to apply the filter.
Add logRegexp to specify a case-sensitive phrase to filter the log
messages by their content.
Add the following line to the /etc/vmsyslog.conf file: enable_logfilters =
true.
Run the command esxcli system syslog reload.
Review Questions
1. You are creating a resource pool in a vSphere DRS cluster. Which
of the following is a default setting?
a. The Memory Limit is disabled.
b. CPU Shares is 0.
c. Memory Reservation is 0.
d. The CPU Reservation is normal.
2. You want to configure predictive DRS in your vSphere cluster.
Which of the following is a requirement?
a. Set DRS to Fully Automated.
b. In the cluster, set Provide Data to vSphere Predictive DRS to
True.
c. In the vRealize Operations, set Provide Data to vSphere
Managing Storage
This chapter covers the following topics:
It is important to ensure that you meet all the vSAN hardware, cluster,
software, and network requirements described in Chapter 2, “Storage
Infrastructure.”
Note
If you are running vCenter Server on a host, the host cannot be placed
into Maintenance Mode as you add it to a cluster using the Quickstart
workflow. The same host also can be running a Platform Services
Controller. All other virtual machines on the host must be powered off.
Note
Distributed switches with Network I/O Control (NIOC) 2 cannot be
used with vSAN Quickstart.
There must be at least three ESXi hosts in the vSAN cluster, and they
Step 2. In the inventory pane, right-click a data center and select New
Cluster.
Step 3. Provide a name for the cluster.
Step 4. Optionally, configure other cluster settings, such as DRS, vSphere
HA, and EVC.
Step 5. Add hosts to the cluster.
Step 6. Navigate to Configure > vSAN > Services and click Configure.
Step 7. Select one of the following configuration types:
Single Site Cluster
Two Host Cluster
Stretched Cluster
Click Next.
Click Next.
Step 9. On the Claim Disks page, select the disks for use by the cluster and
click Next.
Step 10. Follow the wizard to complete the configuration of the cluster,
based on the fault tolerance mode:
For a two-host vSAN cluster: Choose a witness host for the
cluster and claim disks for the witness host.
For a stretched cluster: Define fault domains for the cluster,
choose a witness host, and claim disks for the witness host.
If you selected fault domains: Define the fault domains for the
cluster.
Note
When claiming disks for each host that contributes storage to a vSAN
cluster, select one flash device for the cache tier and one or more
devices for the capacity tier.
Licensing vSAN
You need a vSAN license to use it beyond the evaluation period. The license
capacity is based on the total number of CPUs in the hosts participating in the
cluster. The vSAN license is recalculated whenever ESXi hosts are added to
or removed from the vSAN cluster.
The Global.Licenses privilege is required on the vCenter Server. You can use
the following procedure to assign a vSAN license to a cluster:
Step 1. In the vSphere Client, select the vSAN cluster in the inventory pane.
Step 2. On the Configure tab, right-click the vSAN cluster and choose
Assign License.
Step 3. Select an existing license and click OK.
Note
A vSAN datastore’s capacity depends on the capacity devices per host and
the number of hosts in the cluster. For example, if a cluster includes eight
hosts, each having seven capacity drives, where each capacity drive is 2 TB,
then the approximate storage capacity is 8 × 7 × 2 TB = 112 TB.
Some capacity is allocated for metadata, depending on the on-disk format
version:
The following networking differences apply when using vSAN and vSphere
HA together:
The vSphere HA traffic flows over the vSAN network rather than the
management network.
vSphere HA uses the management network only when vSAN is disabled.
Before you enable vSAN on an existing vSphere HA cluster, you must first
disable vSphere HA. After vSAN is enabled, you can re-enable vSphere HA.
Table 11-2 describes the vSphere HA networking differences between
clusters where vSAN is enabled and is not enabled.
Table 11-2 Network Differences in vSAN and non-vSAN Clusters
Factor vSAN Is Enabled vSAN Is Not Enabled
Network vSAN network Management network
used by
vSphere
HA
Heartbeat Any datastore, other than a Any datastore that is
datastore vSAN datastore, that is mounted mounted to multiple
s to multiple hosts in the cluster hosts in the cluster
Host Isolation addresses not pingable Isolation addresses not
isolation and vSAN storage network pingable and
Note
If you intend to use virtual machines while vSAN is disabled, make
sure you migrate the virtual machines from a vSAN datastore to
another datastore before disabling the vSAN cluster.
Step 1. Power off all virtual machines in the vSAN cluster except for the
vCenter Server, if it is running in the cluster.
Step 2. In the vSphere Client, select the cluster and navigate to Monitor >
vSAN > Resyncing Objects.
Step 3. When all resynchronization tasks are complete, on the Configure
tab, turn off DRS and HA.
Step 4. On each host, use the following command to disable cluster member
updates:
Step 5. If vCenter Server runs in the vSAN cluster, shut it down. (This
makes the vSphere Client unavailable.)
Step 6. On each host, use the following command to place the hosts in
Maintenance Mode with no data migration:
Click here to view code image
esxcli system maintenanceMode set -e true -m noAction
Note
When you plan to shut down a vSAN cluster, you do not need to
disable vSAN on the cluster.
After you perform maintenance activities, you can restart a vSAN cluster by
using the following procedure:
Step 1. Power on the hosts.
Step 2. Use the hosts’ consoles to monitor the ESXi startup
Step 3. Optionally, use a web browser to connect directly to the ESXi host
client to monitor the host’s status, events, and logs. You can ignore
misconfiguration status messages that appear temporarily when
fewer than three hosts have come online and joined the cluster.
Step 4. On each host, use the following commands to exit Maintenance
Mode and to ensure that each host is available in the cluster:
Click here to view code image
esxcli system maintenanceMode set -e false
esxcli vsan cluster get
Step 7. In the vSphere Client, select the vSAN cluster in the inventory pane.
Step 8. On the Configure tab, re-enable DRS and HA.
You can now start virtual machines in the cluster and monitor the vSAN
health service.
Step 3. Complete the wizard and click Finish on the final page.
Note
When adding a host to a vSAN cluster by using Quickstart, the vCenter
Server must not be running on the host.
If using Full Data Migration Mode, ensure that the cluster has enough
hosts and available capacity to meet the requirements of the Primary
Level of Failures to Tolerate policy.
Verify that remaining hosts have enough flash capacity to meet any flash
read cache reservations. To analyze this, you can run the following
VMware Ruby vSphere Console (RVC) command:
vsan.whatif_host_failures
Verify that the remaining hosts have devices with sufficient capacity to
handle stripe width policy requirements, if selected.
Make sure that you have enough free capacity on the remaining hosts to
handle the data that must be migrated from the host entering
Maintenance Mode.
You can use the Confirm Maintenance Mode dialog box to determine how
much data will be moved, the number of objects that will become
noncompliant or inaccessible, and whether sufficient capacity is available to
perform the operation. You can use the Data Migration Pre-check button to
determine the impact of data migration options when placing a host into
Maintenance Mode or removing it from the cluster.
To place a vSAN cluster member host in Maintenance Mode, you can use the
Step 3. Right-click the host and select Maintenance Mode > Enter
Maintenance Mode.
Step 4. Select one of the following data evacuation modes:
Ensure Accessibility: If hosts are powered off or removed from a
vSAN cluster, vSAN makes sure the virtual machines on the ESXi
host that is removed can still run those virtual machines. This
moves some of the virtual machine data off the vSAN cluster, but
replica data remains. If you have a three-host cluster, this is the
only evacuation mode available.
Full Data Migration: As its name implies, this mode moves all
the VM data to other ESXi hosts in the cluster. This option makes
sense if you are removing the host from the cluster permanently. If
a virtual machine has data on the host and that data is not migrated
off, the host cannot enter this mode.
No Data Migration: If this option is selected, vSAN does not
move any data from this ESXi host.
Click OK.
Two host groups must be created: one for the preferred site and another
for the secondary site.
Two VM groups must be created: one for the preferred site VMs and one
for the VMs on the secondary site.
Two VM-to-host affinity rules must be created for the VMs on the
preferred site and VMs on the secondary site.
VM-to-host affinity rules must be used to define the initial placement of
virtual machines on ESXi hosts in the cluster.
HA must be enabled.
HA rules should allow the VM-to-host affinity rules in the event of a
failover.
HA datastore heartbeats should be disabled.
Stretched clusters must use on-disk format Version 2.0 or higher. If your
vSAN cluster is not using on-disk format Version 2.0, it must be
upgraded before you configure the stretched vSAN cluster.
Failures to Tolerate must be set to 1.
Symmetric Multiprocessing Fault Tolerance (SMP-FT) VMs are
supported only when PFFT is at 0 and Data Locality is either Preferred
or Secondary. SMP-FT VMs with PFFT set to 1 or higher are not
supported.
If hosts are disconnected or fail in a not responding state, the witness
cannot be added or removed.
Adding ESXi hosts via esxcli commands on stretched clusters is not
supported.
Note
If you add a used device that contains residual data or partition
information, you must first clean the device. For example, you can run
the RVC command host_wipe_vsan_disks.
You can use the following procedure to remove specific devices from a disk
group or remove an entire disk group. However, you should typically do so
only when you are upgrading a device, replacing a failed device, or removing
a cache device. Deleting a disk group permanently deletes the data stored on
the devices. Removing one flash cache device or all capacity devices from a
disk group removes the entire disk group. Follow these steps to remove
specific devices from a disk group or remove an entire disk group:
Step 1. In the vSphere Cluster, select the vSAN cluster in the inventory
pane.
Step 2. Click Configure > vSAN > Disk Management.
Step 3. To remove a disk group, select the disk group, click Remove, and
select a data evacuation mode.
Step 4. To remove a device, select the disk group, select the device, click
Remove, and select a data evacuation mode.
Step 5. Click Yes or Remove.
If ESXi does not automatically identify your devices as being flash devices,
you can use the following procedure to manually mark them as local flash
devices. For example, flash devices that are enabled for RAID 0 Mode rather
than Passthrough Mode may not be recognized as flash. Marking these
devices as local flash makes them available for use as vSAN cache devices.
Before starting this procedure, you should verify that the device is local and
not in use.
Step 1. In the vSphere Cluster, select the vSAN cluster in the inventory
Note
Unmap capability is disabled by default. When you enable Unmap on a
vSAN cluster, you must power off and then power on all VMs. VMs
must use virtual hardware Version 13 or above to perform Unmap
operations.
To use RAID 6 erasure coding in a vSAN cluster, set the following options:
Note
RAID 5 and RAID 6 erasure coding do not support Primary Level of
Failures set to a value higher than 2.
To provide the encryption keys for the vSAN datastore, you must
implement a key management server (KMS) cluster server that is KMIP
1.1 compliant and is in the vSphere compatibility matrices.
You should not deploy the KMS server on the same vSAN datastore that
it will help encrypt.
Encryption is CPU intensive. Enable AES-NI in your BIOS.
In a stretched vSAN cluster, the Witness host only stores metadata and
does not participate in encryption.
You should establish a policy regarding the encryption of coredumps
because they contain sensitive information such as keys for hosts. In the
policy, consider the following:
You can use a password when you collect a vm-support bundle.
The password re-encrypts coredumps that use internal keys based on
the password.
To use encryption in a vSAN datastore, you must add a KMS to the vCenter
Server and establish trust with the KMS. You can use the following
procedure to add a KMS to vCenter Server:
Step 1. Ensure that the user has the Cryptographer.ManageKeyServers
privilege.
Step 2. In the vSphere Client, select the vCenter Server in the inventory
pane and navigate to Configure > Key Management Servers.
Step 3. Click Add and specify the following KMS information in the
wizard:
For KMS Cluster, select Create New Cluster.
Specify the cluster name, alias, and address (FQDN or IP address).
Specify the port, proxy, and proxy port.
Note
Connecting to a KMS through a proxy server that requires a username
or password is not supported. Connecting to a KMS by using only an
IPv6 address is not supported.
You can use the following procedure to establish a trusted connection for a
KMS:
Step 1. In the vSphere Client, select the vCenter Server in the inventory
pane and navigate to Configure > Key Management Servers.
Step 2. Select the KMS instance and click Establish Trust with KMS.
Root CA Certificate
Certificate
New Certificate Signing Request
Upload Certificate and Private Key
When multiple KMS clusters are used, you can use the following procedure
to identify a default KMS cluster:
Step 1. In the vSphere Client, select the vCenter Server in the inventory
pane and navigate to Configure > Key Management Servers.
Step 2. Select the KMS cluster and click Set KMS Cluster as Default.
Step 3. Click Yes.
Step 4. Verify that the word default appears next to the cluster name.
You can make vCenter Server trust the KMS by using the following
procedure:
Step 1. In the vSphere Client, select the vCenter Server in the inventory
pane and navigate to Configure > Key Management Servers.
Step 2. Select the KMS instance and do one of the following:
Select All Actions > Refresh KMS Certificate > Trust.
Select All Actions > Upload KMS Certificate > Upload File.
If you want to enable encryption on a vSAN cluster, you need the following
privileges:
Host.Inventory.EditCluster
Cryptographer.ManageEncryptionPolicy
Cryptographer.ManageKMS
Cryptographer.ManageKeys
Step 2. In the vSphere Client, select the vSAN cluster and select Configure
> vSAN > Services.
Step 3. In the File Service row, click Enable.
Step 4. In the wizard, click Next.
Step 5. On the next page, select either of the following options:
Automatic: Automatically searches for and downloads the OVF
Manual: Allows you to manually select an OVF and associated
files (CERT, VMDK, and so on)
Step 6. Continue the wizard to provide file service domain, DNS, and
networking information.
Step 7. On the IP Pool page, enter the set of available IPv4 addresses and
assign one as the primary IP address. To simplify this process, you
can use the Auto Fill or Look Up DNS options.
Note
vSAN stretched clusters do not support the file service.
You can use the following procedure to create a vSAN file service:
Step 1. In the vSphere Client, select the vSAN cluster in the inventory pane
and navigate to Configure > vSAN > File Service Shares.
Step 2. Click Add.
Step 3. In the wizard, enter the following general information:
Protocol: Select either NFS Version 3 or NFS Version 4.1.
Name: Specify a name.
Storage Policy: Select the vSAN default storage policy.
Storage space quotas: Set the share warning threshold and the
Click Next.
Step 4. In the Net Access Control page, select one of the following options:
No Access: Use this option to prevent access to the file share.
Allow Access from Any IP: Use this to allow access from any IP
address.
Customize Net Access: Use this to control whether specific IP
addresses can access, read, or modify the file share. You can
configure Root Squash based on IP address.
Click Next.
Step 5. In the Review page, click Finish.
Managing Datastores
This section provides information on managing datastores in a vSphere 7.0
environment.
Step 1. In the vSphere Client, right-click the datastore in the inventory pane
and select Increase Datastore Capacity.
Step 2. Select a device from the list of storage devices, based on the
Step 5. Set the capacity. (The minimum extent size is 1.3 GB.) Click Next.
Step 6. Click Finish.
Note
If a shared datastore becomes 100% full and has powered-on virtual
machines, you can increase the datastore capacity—but only from the
host where the powered-on virtual machines are registered.
To mount a VMFS datastore copy on an ESX host, you can use the following
procedure:
Step 1. In the vSphere Client, select the host in the inventory page and
navigate to Configure > Storage Adapters.
Step 2. Rescan storage.
Step 3. Unmount the original VMFS datastore, which has the same UUID
as the VMFS copy.
Step 4. Right-click the host and select Storage > New Datastore.
Step 5. Select VMFS as the datastore type.
Step 6. Enter the datastore name and placement (if necessary).
Step 7. In the list of storage devices, select the device that contains the
VMFS copy.
3. Click OK to confirm
the deletion.
In the vSphere Client, you can use the Datastore Browser to examine and
manage the datastore contents. To get started, right-click the datastore in the
inventory pane and select Browse Files. In the Datastore browser, select any
of the options listed in Table 11-4.
Table 11-4 Datastore Browser Options
Option Description
Upload Upload a local file to the datastore.
Files
Upload Upload a local folder to the datastore.
Folder
Downloa Download a file from the datastore to the local machine.
d
New Create a folder on the datastore.
Folder
Copy to Copy selected folders or files to a new location on the
datastore or on another datastore.
Move to Move selected folders or files to a new location on the
datastore or on another datastore.
(VMF
S
filter)
config. Hides storage devices (LUNs) that are used by an RDM on any
vpxd.fi host managed by vCenter Server.
lter.rd
mFilter
(RDM
filter)
(Same
Hosts
and
Transp
orts
filter)
config. Automatically rescans and updates VMFS datastores following
vpxd.fi datastore management operations. If you present a new LUN to
lter.hos a host or a cluster, the hosts automatically perform a rescan,
tResca regardless of this setting.
nFilter
(Host
Rescan
filter)
Note
You should consult the VMware support team prior to changing device
filters.
To modify the host, you can use the following command, where deviceID is
the device ID of the SCSI device:
Click here to view code image
On ESXi, the NFS Version 3 and NFS Version 4.1 clients use different
locking mechanisms. You cannot use different NFS versions to mount
the same data-store on multiple hosts.
ESXi hosts can make use of both NFS Version 3 and Version 4.1 if the
previous rule is observed.
ESXi hosts cannot automatically upgrade NFS Version 3 to NFS Version
4.1.
NFS datastores must have folders with identical names mounted on all
ESXi hosts, or functions such as vMotion may not work.
If an NFS device does not support internationalization, you should use
ASCII characters only.
How you configure an NFS storage device to use with VMware varies by
vendor, so you should always refer to the vendor documentation for specifics.
The following is the procedure to configure an NFS server (but refer to
vendor documentation for specifics on how to carry out this procedure):
Step 1. Use the VMware Hardware Compatibility List to ensure that the
NFS server is compatible. Pay attention to the ESXi version, the
NFS server version, and the server firmware version.
Step 2. Configure the NFS volume and export it (by adding it to
/etc/exports) using the following details:
NFS Version 3 or Version NFS 4.1 (only one protocol per share)
NFS over TCP
Step 3. For NFS Version 3 or non-Kerberos NFS Version 4.1, ensure that
Note
Multiple IP addresses or DNS names can be used with NFS Version
4.1 multipathing.
Step 1. In the vSphere Client, right-click a data center, cluster, or ESXi host
object in the inventory pane and select Storage > New Datastore.
Step 2. Select NFS as the new datastore type.
Note
In addition to share values, which are similar to shares defined for CPU and
memory, storage I/O limits can be defined on individual virtual machines to
limit the number of I/O operations per second (IOPS). By default, just as with
CPU and memory resources, there are no limits set for virtual machines. In a
virtual machine with more than one virtual disk, limits must be set on all of
the virtual disks for that VM. If you do not set a limit on all the virtual disks,
the limit won’t be enforced. To view the shares and limits assigned to virtual
machines, you can use the vSphere Client. To select a datastore, select the
Virtual Machines tab and examine the associated virtual machines. The
details for each virtual machine include its respective shares, the IOPS limit,
and the percentage of shares for that datastore.
SIOC Threshold
The default threshold for SIOC to begin prioritizing I/O based on shares is 30
ms and typically does not need to be modified. However, you can modify this
threshold if you need to. Be aware that SIOC will not function properly
unless all the data-stores that share drive spindles have the same threshold
defined. If you set the value too low, shares will enforce priority of resources
sooner but could decrease aggregated throughput, and if you set it too high,
the result might be higher aggregated throughput but less prioritization of
disk I/O.
The following procedure allows you to modify the threshold:
Step 1. In the vSphere Client Storage Inventory view, select a datastore and
select the Configuration tab.
Step 2. Select Properties and under Storage I/O Control, select Enabled if
it is not already.
Step 3. Click Advanced to modify the threshold for contention; this value
must be between 10 ms and 100 ms.
Step 4. Click OK and then click Close.
NVMe over PCIe: NVMe over PCIe is for local storage, and NVMe
over fabrics (NVMe-oF) is for connected storage.
NVMe over Remote Direct Memory Access (RDMA): NVMe over
RDMA is shared NVMe-oF storage using RDMA over Converged
Ethernet (RoCE) Version 2 transport.
NVMe over Fibre Channel (FC-NVMe): FC-NVMe is shared NVMe-
oF storage using Fibre Channel transport.
Configuring HPP
As described in Chapter 2, High-Performance Plug-in (HPP) is the default
plug-in that claims NVMe-oF targets. NVMe over PCIe targets default to the
VMware Native Multipathing Plug-in (NMP). You can use the esxcli storage
core claimrule add command to change the claiming plug-in in your
environment. For example, to set a local device to be claimed by HPP, use
the --pci-vendor-id parameter and set the --plugin parameter to HPP. To
change the claim rule based on an NVMe controller model, use the --nvme-
controller-model parameter.
To assign a specific HPP Path Selection Scheme (PSS) to a specific device,
you can use the esxcli storage hpp device set command with -pss parameter
to specify the scheme and the --device parameter to specify the device. The
available HPP PSS options are explained in Table 2-6 in Chapter 2. To create
a claim rule that assigns the HPP PSS by vendor and model, you can use
esxcli storage core claimrule add with the -V (vendor), -M (model), -P
(plug-in), and --config-string parameters. In the value for --config-string,
specify the PSS name and other settings, such as “pss=LB-Latency,latency-
eval-time=40000.”
Note
Enabling HPP on PXE-booted ESXi hosts is not supported.
After using these commands, you should reboot the hosts to apply the
changes.
Managing PMem
PMem devices are non-volatile dual in-line memory modules (NVDIMMs)
on the ESXi host that reside in normal memory slots. They are non-volatile
and combine the performance of volatile memory with the persistence of
Managing Multipathing
As explained in Chapter 2, ESXi uses the Pluggable Storage Architecture
(PSA), which allows plug-ins to claim storage devices. The plug-ins include
the Native Multipathing Plug-in (NMP), the High-Performance Plug-in
(HPP), and third-party multipathing modules (MPPs).
To see details for a specific device, you can provide the --device option with
the previous command. For example, if you have a device that is identified by
mpx.vmbha0:C0:T0:L0, you can use the following command to retrieve
details for just that device:
Click here to view code image
esxcli storage nmp device list --device=mpx.vmbha0:C0:T0:L0
Table 11-8 provides information on some other esxcli commands that you
can use with NMP.
Table 11-8 ESXLI Commands for NMP
Command Description
esxcli storage Provides information for each available SATP,
nmp satp list including the default PSP
esxcli storage Provides a description for each available PSP
nmp psp list
esxcli storage Changes the default PSP policy for an SATP named
nmp satp set -- satpname, where the policy is VMW_PSP_MRU,
default- VMW_PSP_FIXED, or VMW_PSP_RR, as
psp=policy -- explained in Table 2-11 in Chapter 2
satp=satpname
Note
In many cases, the storage system provides ESXi with the storage
device names and identifiers, which are unique and based on storage
standards. Each identifier uses a naa.xxx, eui.xxx, or t10.xxx format.
Otherwise, the host generates an identifier in the form mpx.path, where
path is the first path to the device, such as mpx.vmhba1:C0:T1:L3.
-g | --cfgfile
-d | --device=<device>
-I | --iops=
<max_iops_on_path>
-T | --latency-eval-time=
<interval_in_ms>
-M | --mark-device-ssd=
<value>
-p | --path=<path>
-S | --sampling-ios-per-
-P | --pss=<FIXED|LB-
Bytes|LB-IOPs|LB-
Latency|LB-RR>
esxcli storage hpp Lists devices that -d | --device=<device>
device someone marked
usermarkedssd list as SSD
Step 2. Select a storage provider and choose one of the following options:
Synchronize Storage Providers: Synchronizes vCenter Server
with information for all storage providers.
Rescan: Synchronizes vCenter Server with information from a
specific storage provider.
Remove: Unregisters a specific storage provider, which is useful
whenever upgrading a storage provider to a later VASA version
requires you to unregister and reregister.
Refresh Certificate: Refreshes a certificate before it retires.
Review Questions
1. You are implementing encryption for a vSAN cluster in vSphere
7.0. Which of the following options is a requirement?
a. Deploy KMIP 1.0.
b. Deploy the KMS as a virtual machine in the vSAN datastore.
Managing SSO
As explained in previous chapters, you can use the built-in identity provider
vCenter SSO and external identity providers for vSphere authentication. SSO
includes the Security Token Service (STS), an administration server, the
vCenter Lookup Service, and the VMware Directory Service (vmdir). The
VMware Directory Service is also used for certificate management.
Chapter 8, “vSphere Installation,” discusses the following procedures:
Note
The lockout policy applies only to user accounts and not to system
accounts such as [email protected].
Note
If you use federated authentication with Active Directory Federation
Services, the Enhanced Authentication Plug-in applies only if vCenter
Server is the identity provider.
Note
The certificate is not external facing, and it is valid for 10 years. You
should replace this certificate only if required by your company’s
security policy.
Note
Enhanced Linked Mode requires the vCenter Server Standard licensing
level.
Note
After creating a user or group, you cannot change its name.
Permissions
To set a permission using the vSphere Client, you can use the following
steps:
Step 1. Select the object in the inventory.
Step 2. Click the Permissions tab.
Step 3. Click the Add Permission icon.
Step 4. Select a user or group from the User drop-down menu.
Step 5. Select a role from the Role drop-down menu.
Global Permissions
In some cases, you might assign a global permission and choose not to
propagate to child objects. This may be useful for providing a global
functionality, such as creating roles. To assign a global permission, you
should use the vSphere Client with a user account that has the
Permissions.Modify privilege on the root object of all inventory hierarchies.
Select Administration > Global Permissions > Manage and use the Add
Permission icon (plus sign). Then use the dialog that appears to select the
desired user group (or user) and role.
Note
By default, the administrator account in the SSO domain, such as
[email protected], can modify global permissions, but the
vCenter Server Appliance root account cannot.
Note
Be careful when applying global permission. Decide whether you
genuinely want a permission to apply to all solutions and to all objects
in all inventory hierarchies.
Editing Permissions
To modify an existing permission, you can edit the permission and change
For each certificate management task, you should use the administrator
account in the SSO domain (which is vsphere.local by default).
Step 3. For more details, click View Details for the certificate type.
Step 4. For the machine SSL certificates, optionally choose from the
following actions:
Renew
Import and Replace Certificate
Generate CSR
Note
To replace all VMCA-signed certificates with new VMCA-signed
certificates, choose the Renew action for the machine SSL certificates.
If you replace an existing certificate, you can remove the old root certificate
(as long as you are sure it is no longer in use).
By default, vCenter Server monitors all certificates in VECS and raises an
alarm for any certificate that will expire in 30 days or less. You can change
the 30-day threshold by modifying vCenter Server’s advanced setting
vpxd.cert.threshold.
After your CA processes the CSR, you can use the following procedure to
add the custom certificates:
Step 1. In the vSphere Client, navigate to Home > Administration >
Certificates > Certificate Management.
Step 2. If the system prompts you to do so, enter the credentials for your
Note
Thumbprint Mode was used in vSphere 5.5 and should not be used in
later versions unless it is necessary because some services may not
work. Also, in Thumbprint Mode, vCenter Server checks only the
certificate format and not its validity. Even expired certificates are
accepted.
You can switch the certificate mode from VMCA to a different root CA by
using these steps:
Step 1. Obtain the certificates from the trusted CA.
Step 2. Place the host or hosts into Maintenance Mode and disconnect them
from vCenter Server.
Step 3. Add the custom CA’s root certificate to VECS.
Step 4. Deploy the custom CA certificates to each host and restart services
on that host.
Step 5. Change Certificate Mode to Custom CA Mode (as described in the
previous section).
Step 6. Connect the host or hosts to the vCenter Server system.
Certificate Expiration
For ESXi 6.0 and later, you can use the vSphere Client to view information,
including expiration, for all certificates that are signed by VMCA or a third-
party CA. In the vSphere Client, select the host and navigate to Configure >
System > Certificate. Here you can examine the Issuer, Subject, Valid From,
Valid To, and Status fields. The value of the Status field may be Good,
Expiring, Expiring Shortly, Expiration Imminent, or Expired.
A yellow alarm is raised if a certificate’s status is Expiring Shortly (that is, if
it expires in less than eight months). A red alarm is raised if the certificate’s
status is Expiration Imminent (that is, if it expires in less than two months).
By default, each time a host reconnects to vCenter Server, it renews any host
certificates whose status is Expired, Expiring Immediately, or Expiring. If a
certificate is already expired, you must disconnect the host and reconnect it.
To renew or fresh the certificates, you can use the following procedure:
Step 1. In the vSphere Client, select the host in the navigation pane.
Step 2. Navigate to Configure > System > Certificate.
Step 3. Click one of the following options:
Renew: Retrieves a fresh signed certificate for the host from
VMCA.
Refresh CA Certificates: Pushes all certificates in the VECS
TRUSTED_ROOTS store to the host.
Limit access to the Direct Console User Interface (DCUI), the ESXi
Shell, and Secure Shell (SSH). If you allow access to these items, which
have privileged access to certain ESXi components, you need to ensure
that only trusted users have access and that timeouts are set.
Do not directly access ESXi hosts that are managed by vCenter Server.
Although it may be possible to access a host via DCUI, SSH, ESXi
Shell, API, or vSphere Host Client, you should not normally do so.
Instead, you should use the vSphere Client (or vSphere Web Client) or
API connected to vCenter Server to manage the ESXi host.
Use the DCUI only for troubleshooting. Likewise, use root access to the
ESXi Shell only for troubleshooting.
When upgrading ESXi components, use only VMware sources. Although
a host runs several third-party packages, VMware supports upgrades to
those packages only from VMware sources. Check third-party vendor
sites and the VMware knowledge base for security alerts.
You should follow the VMware security advisories at
http://www.vmware.com/security/.
Configure ESXi hosts with host profiles, scripts, or some other
automation.
From the ESXi Shell, you can use the ESXCLI command set to configure the
host and to perform administrative tasks. ESXCLI provides a collection of
namespaces that allow an administrator to quickly discover the precise
command necessary for a specific task. For example, all the commands to
configure networking exist in the esxcli network namespace, and all the
commands to configure storage exist in the esxcli storage namespace. Each
namespace is further divided into child namespaces that comprise various
functions performed under the parent namespace. For example, the esxcli
storage parent namespace contains a core namespace that deals with storage
adapters and devices and an nmp namespace that deals with path selection
and storage array types. Therefore, a typical ESXCLI command is composed
of multiple namespaces, where each additional namespace is used to narrow
the scope of the command, ending with the actual operation to be performed.
To identify the proper ESXCLI command to perform a specific task, you can
begin by entering esxcli at the command prompt in the ESXi Shell. Because
it is not a command by itself, just the entry point to the namespace hierarchy,
the results will show the first level of the namespace hierarchy. The first level
of available namespaces includes device, esxcli, fcoe, graphics, hardware,
iscsi, network, nvme, rdma, sched, software, storage, system, vm, and vsan.
You can use the brief description of each namespace shown in the results to
identify which namespace is most likely to serve your need. You can press
the up-arrow key on the keyboard to retrieve the last entered namespace and
add the name for the next namespace. You can continue reviewing
namespaces until you discover the command you need.
For example, if you are seeking a command to list all standard virtual
switches, you could enter esxcli network to learn that it contains several
namespaces, including one named vswitch. You could then enter esxcli
network vswitch and learn that its namespaces are standard and dvs. Going
further, you could learn that the esxcli network vswitch standard namespace
Note
The default requirements for ESXi passwords can change from one
release to the next. You can check and change the default password
restrictions by using the Security.PasswordQualityControl advanced
option.
The first part of the value used for this parameter identifies the number of
retries allowed for the user following a failed logon attempt. In the default
value, retry=3 indicates that three additional attempts are permitted
following a failed logon. The remainder of the value can be abstracted as
follows:
min=N0,N1,N2,N3,N4
Note
The root user and users with the administrator role can access the ESXi
Shell. Users who are in the Active Directory group ESX Admins are
automatically assigned the administrator role. By default, only the root
user can run system commands (such as vmware -v) by using the ESXi
Shell.
You can use the following procedure to enable the ESXi Shell:
Step 1. In the vSphere Client, select the host in the navigation pane.
Step 2. Navigate to Configure > Services.
To upload an RSA key or root user authorized key files, use the same
command but change the target to /host/ssh_host_rsa_key or
/host/ssh_root_authorize_keys, respectively.
To enable passthrough for a network device on a host, you can use the
following procedure:
Step 1. In the vSphere Client, select the host in the navigation pane.
Step 2. Navigate to Configure > Hardware > PCI Devices and click Edit.
Step 3. Select a device with a green icon and click OK.
Note
An orange icon indicates that the status of the device has changed, and
you must reboot the host before you can use the device.
Do not use certificates that use passwords or passphrases. ESXi does not
support web proxies with passwords or passphrases, also known as
encrypted keys.
If you want to disable SSL for vSphere Web Services SDK connections,
you can change the connection from HTTPS to HTTP. You should
consider doing this only if you have a fully trusted environment, where
firewalls are in place and transmissions to and from the host are fully
isolated.
Most internal ESXi services are accessible only through port 443. Port
443 acts as a reverse proxy for ESXi. You can change the configuration
to allow direct HTTP connections but should consider this only for a
fully trusted environment.
During upgrades, the certificate remains in place.
You can use the API SDK of your choice to call AcquireCimServicesTicket
Step 1. In the vSphere Client, select the host in the inventory pane and
navigate to Configure > System > Firewall.
Step 2. Select the appropriate service name, such as the incoming SSH
server (TCP 22) or the outgoing DNS client (TCP/UDP 53), and
click Edit.
Step 3. Examine the rule set. Change the state of any rule by selecting the
rule (placing a check in the rule’s box) to enable the rule or
deselecting the rule to disable it.
Step 4. Optionally, for some services, you can deselect the Allow
Connections from Any IP Address box and enter specific IP
addresses in the accompanying text box to restrict use to only those
IP addresses.
Step 5. Click OK.
When specifying particular IP addresses in the firewall settings, you can use
the formats used in the following examples:
The NFS Client firewall rule set behaves differently than other rule sets.
ESXi configures NFS Client settings when you mount or unmount an NFS
datastore. When you mount an NFS Version 3 datastore, the following events
occur:
If the nfsClient rule set is disabled, ESXi enables the rule set, sets
allowedAll to FALSE, and adds the NFS server IP address to the list of
allowed IP addresses.
If the nfsClient rule set is enabled, ESXi adds the NFS server IP address
to the list of allowed IP addresses but does not change the state of the
rule set or allowedAll.
When you mount an NFS Version 4.1 datastore, ESXi enables the
nfs41client rule set and sets allowedAll to TRUE.
When you remove or unmount an NFS Version 3 datastore from a host, ESXi
removes the IP address from the list of allowed IP addresses. When you
remove or unmount the last NFS Version 3 datastore, ESXi stops the
nfsClient rule set. Unmounting an NFS Version 4.1 datastore does not impact
the firewall.
The ESXi software firewall is enabled by default. It should never be disabled
while running production virtual machines. In rare cases, such as temporarily
during troubleshooting, you can disable the ESXi firewall by using the esxcli
network firewall set --enabled false command.
vCloud vCloud
Director Director
(vslauser, if (vslauser, if
vCloud vCloud
Director Director
(vslauser, if (vslauser, if
available) available)
DCUI Users with administrator Users defined DCUI service
privileges on the host and in the is stopped
users defined in the DCUI.Access
DCUI.Access advanced advanced
option option
Exception
users with
administrator
privileges on
the host
ESXi Users with administrator Users defined Users defined
Shell privileges on the host in the in the
(if DCUI.Access DCUI.Access
enabl advanced advanced
ed) option option
Exception Exception
users with users with
administrator administrator
privileges on privileges on
Exception Exception
users with users with
administrator administrator
privileges on privileges on
the host the host
To change the host acceptance level, you can use the following command:
Click here to view code image
esxcli --server=<server_name> software acceptance set
In vSphere 6.0 and later, you can use ESXCLI to manage local user accounts
and to configure permissions on local accounts and on Active Directory
accounts. You can connect directly to an ESXi host by using the vSphere
Host Client and navigate to Manage > Security & Users > Users to create,
edit, and remove local user accounts.
The following user accounts exist on an ESXi host that is not added to a
vCenter System:
root: A user account that is created and assigned the administrator role
by default on each ESXi host.
Note
You can remove the access privileges for the root user. But you should
first create another user account at the root level and assign it the
administrator role.
Much as with vCenter Server, each ESXi host uses role-based permissions
for users who log on directly to the ESXi host rather than accessing the host
through vCenter Server. ESXi allows the creation of custom roles, but these
roles are applied only when a user directly logs on to the host, such as when
the user uses the vSphere Host Client to connect to the host directly. In most
cases, managing roles and permissions at the host level should be avoided or
minimized. To create, edit, and remove roles, you can connect directly to an
ESXi host by using the vSphere Host Client and navigate to Manage >
Security & Users > Roles.
Step 1. In the vSphere Client, select the host in the inventory pane and
navigate to Configure > Authentication Services.
Step 2. In the Smart Card Authentication panel, click Edit.
Step 3. In the dialog box, select the Certificates page.
Step 4. Add trusted certificate authority (CA) certificates, such as root and
intermediary CA certificates, in the PEM format.
Note
You cannot perform a Secure Boot on ESXi servers that were upgraded
by using ESXCLI commands because the upgrade does not update the
bootloader.
You can use the following command to run the Secure Boot validation script
on an upgraded ESXi host to determine if it supports Secure Boot:
Click here to view code image
/usr/lib/vmware/secureboot/bin/secureBoot.py -c
The output is either “Secure boot can be enabled” or “Secure boot CANNOT
be enabled.”
To resolve issues with Secure Boot, you can follow these steps:
Step 1. Reboot the host with Secure Boot disabled.
Step 2. Run the Secure Boot verification script.
Step 3. Examine the information in the /var/log/esxupdate.log file.
In addition, you should ensure that the TPM chip is configured in the ESXi
host’s BIOS to use the SHA-256 hashing algorithm and the TIS/FIFO (first-
in, first-out) interface and not CRB (Command Response Buffer).
During the boot of an ESXi host with an installed TPM 2.0 chip, vCenter
Server monitors the host’s attestation status. The vSphere Client displays the
hardware trust status in the vCenter Server’s Summary tab under Security
with the following alarms:
If the “Host secure boot was disabled” message appears in the vSphere
Client, you must re-enable Secure Boot to resolve the problem. If the “No
cached identity key loading from DB” message appears, you must disconnect
For details see Chapter 10, “Managing and Monitoring Clusters and
Resources.”
With vTA, you can run workloads in a secure environment where you detect
tampering, disallow unauthorized changes, prevent malware, and verify the
hardware and software stacks.
When you configure vTA, you enable the Attestation service and the Key
Provider service on the ESXi host in the Trust Authority cluster. The
Attestation service attests to the state of the trusted ESXi hosts, using a TPM
2.0 chip as the basis for software measurement and reporting. The Attestation
service verifies that the software measurement signature can be attributed to a
previously configured trusted TPM endorsement key (EK). The Key Provider
service removes the need for the vCenter Server and the ESXi hosts to
require direct key server credentials. The Key Provider service acts as a
gatekeeper for the key servers, releasing keys only to trusted ESXi hosts.
A trusted ESXi host must contain a TPM chip. A TPM chip is manufactured
with an EK, which is a public/private key pair that is built into the hardware.
You can configure the Attestation service to trust all CA certificates where
the manufacturer signed the TPM chip (the EK public key) or to trust the
host’s TOM CA certificate and EK public key.
Note
If you want to trust individual ESXi hosts, the TPM chip must include
an EK certificate. Some TPM chips do not.
You can use VMware PowerCLI to configure and manage vSphere Trust
Authority. Alternatively, you can use vSphere APIs or the vSphere Client for
at least some of the activities. To configure vTA, you can perform the
following high-level tasks:
Step 1. On a Windows system with access to the vTA environment, install
PowerCLI 12.0.0 and Microsoft .NET Framework 4.8 or greater,
and create a local folder.
Step 2. Add your user account to the TrustedAdmins groups on the vCenter
Server managing the Trust Authority cluster and on the vCenter
To enable vSGX, the virtual machine must be powered off. You can enable
vSGX as you provision a new virtual machine. To remove vSGX from a
virtual machine, uncheck the Security Devices > SGX > Enable checkbox.
Review Questions
1. You want to add a global permission. Which of the following
privileges do you need?
a. Permissions.Modify Permission privilege on the vCenter root
object
b. Permissions.Modify Permission privilege on the global root
object
c. Permissions.Add Permission privilege on the vCenter root
object
d. Permissions.Add Permission privilege on the global root
object
2. A yellow alarm is raised due to a host’s certificate expiration date.
Which of the following is a true statement concerning the state of
This chapter covers topics related to managing vCenter Server and vSphere
components.
Foundation Topics
If you have prepared a supported target server, you can use the following
procedure to schedule a file-based backup of the vCenter Server:
Step 1. Log on to the VAMI (https://vCenterFQDN:5480) as root.
Step 2. Click Backup > Configure.
Step 3. Enter the backup location details:
Backup Location: Provide the protocol, port, server address, and
folder.
Backup Server Credentials: Provide the username and password
with write privileges.
Note
If a restore fails, power off and delete the partially restored VM. Then
try to restore the VM again.
Note
You must power off the active, passive, and witness nodes in a vCenter
Server high-availability cluster prior to restoring. You must reconstruct
the cluster after a restore operation completes successfully.
If you prefer to use an image-based backup, you can leverage the vSphere
API. For image-based backups, you should consider the following:
You must ensure that the vCenter Server uses a fully qualified domain
name (FQDN) with correct DNS resolution or configure its hostname to
be an IP address.
If DHCP is used, you must configure the restored vCenter Server’s IP
address back to the original value.
Ensure that all vSphere component clocks are synchronized.
The set of restored configurations for image-based restoration is identical
to the file-based restoration.
The impact to the state of vSphere components following an image-
based restoration is nearly identical to the impact of a file-based
restoration.
Note
For vCenter Server 6.0 and earlier, you should upgrade to vSphere 6.5
or 6.7 and then upgrade to vSphere 7.0.
You should back up vCenter Server prior to upgrading it. For details, see the
section “vCenter Server Backup,” later in this chapter.
Upgrading your environment to use vCenter Server 7.0 requires you to either
upgrade an existing vCenter Server Appliance or migrate from an existing
Windows-based vCenter Server. When you upgrade or migrate a vCenter
Server that uses an external Platform Services Controller (PSC), you
converge the PSC into a vCenter Server Appliance.
Prior to upgrading to vCenter Server 7.0, you should consider its
compatibility with other vSphere components, as summarized in Table 13-2.
Note
The option to transfer data in the background following an upgrade is
applicable only in scenarios where the source vCenter Server uses an
external database.
You can monitor the background data transfer by using the VAMI. You can
pause and cancel the data transfer.
Ensure that the clocks of all the vSphere components are synchronized.
Ensure that the system has the minimum hardware and software
components.
Ensure that the target ESXi host is not in Lockdown, Maintenance, or
Standby Mode.
Ensure that the target ESXi host is not part of a fully automated DRS
cluster.
Verify that port 22 is open on the source vCenter Server Appliance and
that port 443 is open on the ESXi host on which the source vCenter
Server Appliance is running.
Verify that the source appliance has sufficient free space to
accommodate data that is used for the upgrade.
If the source vCenter Server uses an external database, determine its size
and ensure that you account for it in the size of the new appliance.
Ensure that network connectivity exists between the vCenter Server or
ESXi that hosts the source vCenter Server Appliance and the new
vCenter Server Appliance.
If you plan to set the system name to a FQDN, ensure that forward and
reverse DNS records are created.
Step 5. Follow the wizard prompts to accept the certificate and accept the
plan to converge the source vCenter Server and external PSC into a
single vCenter Server Appliance.
Step 6. Follow the wizard prompts to provide the following information for
the target environment that will host the new vCenter Server
Appliance.
If you are connecting to a vCenter Server, provide the address,
HTTPS port, SSO credentials, and root password for the vCenter
Server. Select a data center and an ESXi host (or cluster).
If you are connecting to an ESXi host, provide the address, HTTPS
port, and credentials for a user with administrative privileges for
the ESXi host.
Step 7. Follow the wizard to configure the new vCenter Server Appliance
with the following information:
Virtual machine name
Root user password
Deployment size (Tiny to X-Large, as described in Table 1-10 in
Chapter 1, “vSphere Overview, Components, and Requirements”)
Storage size (defaults to X-Large, as described in Table 1-11)
Datastore
Temporary network used to transfer data from the source vCenter
Note
The identical Stage 1 procedure can be used when upgrading a vCenter
Server Appliance with an embedded PSC, except the wizard does not
prompt you to accept the plan to converge an external PSC.
For a vCenter Server with an external PSC, you can use the following
procedure for Stage 2:
Step 1. Review the Stage 2 details and click Next.
Step 2. Wait for the pre-upgrade check to finish and respond to any of the
following messages:
Errors: Read the message, click Logs to obtain a support bundle,
and troubleshoot. You cannot proceed with the upgrade until errors
are corrected.
Warnings: Read the messages and click Close.
Step 4. On the Select Upgrade Data page, choose the type of data transfer,
as described in the section “vCenter Server Data Transfer,” earlier
in this chapter.
Step 5. Complete the wizard and wait for the transfer and setup operations
The following limitations apply when you migrate vCenter Server for
Windows to vCenter Server Appliance 7.0:
Local Windows OS users and groups are not migrated to the guest OS
(Photon OS) of the new appliance. You should remove any vCenter
Server permissions to local Windows users prior to the migration.
At the end of the migration, the source vCenter Server is turned off, and
any solutions that are not migrated become unavailable. You should
leave the source vCenter Server powered off to avoid network ID
conflicts with the target vCenter Server Appliance.
The migration of Windows-based vCenter Server instances that use
custom ports for services other than Auto Deploy, Update Manager,
vSphere ESXi Dump Collector, or HTTP reverse proxy is not supported.
Only one network adapter setting is migrated to the target vCenter Server
Appliance. If the source uses multiple IP addresses, you can select which
IP address and network adapter settings to migrate.
Note
If the Windows-based vCenter Server uses an external Update
Manager, run the Migration Assistant on the Update Manager machine
before running it on the vCenter Server.
Starting with vSphere 7.0, you can use vSphere Lifecycle Manager images to
perform the following tasks on a set of hosts at the cluster level:
You can start using Lifecycle Manager images as you create a cluster.
Otherwise, you can switch from using baselines to images later. After
switching a cluster to use images, you cannot revert the cluster back to using
baselines. However, you can move the hosts to another cluster that uses
baselines. If you set up an image for a cluster and remediate all the hosts in
the cluster, then all standalone VIB and non-integrated agents are deleted
from the hosts.
vSphere Lifecycle Manager has several components, including a service
Note
In vSphere 7.0, vSphere Lifecycle Manager images are not supported
for clusters with Kubernetes enabled or NSX installed. You can
manage such clusters using baselines and baseline groups. You cannot
enable vSphere with Kubernetes or install NSX-T on a cluster that is
managed with an image.
You can leverage vSphere Lifecycle Manager for VMware Tools and virtual
machine hardware upgrade operations on virtual machines running on ESXi
6.5, ESXi 6.7, and ESXi 7.0 hosts.
To get started using vSphere Lifecycle Manager, in the vSphere Client, you
can navigate to Menu > Lifecycle Manager (which is called the Lifecycle
Manager home view) and select a vCenter Server. Here you can configure
Lifecycle Manager by using the Settings tab. Table 13-3 describes the
available settings for Lifecycle Manager remediation.
Note
In vSphere 7.0, the vendor name of VMware for inbox components has
changed from VMware, Inc to VMware. If you filter the components
by VMware, the results contain both VMware, Inc for 6.x patches and
VMware for 7.0 patches.
If a user has the View Compliance Status privilege, you can use the Updates
tab for a selected object to view the object’s compliance with baselines or
images. You can select a host or cluster that is managed with baselines and
click on Updates > Baselines. From there, you can do the following tasks:
You can select a cluster that is managed with an image and click on Updates
> Images. From there, you can do the following tasks:
You can select a host and then select Updates > Hosts > Hardware
Compatibility to check the host hardware against the VMware Compatibility
Guide. You can select a host and then select Updates > Hosts and then select
VMware Tools or VM Hardware to check and upgrade the VMware Tools
version and virtual hardware version of the virtual machines.
Table 13-4 provides definitions of vSphere Lifecycle Manager terms.
Table 13-4 Lifecycle Manager Definitions
Term Definition
Update A software release that makes small changes to the current
version, such as vSphere 7.0 Update 1, 7.0 Update 2, and so
on.
Upgrade A software release that introduces major changes to the
software. For example, you can upgrade from vSphere 6.5 to
6.7 and 7.0.
Patch A small software update that provides bug fixes or
Note
During the synchronization of a depot, vSphere Lifecycle Manager
downloads only the VIB metadata.
You cannot modify or delete the predefined baselines. You can use the
predefined baselines to create custom patch, extension, and upgrade
baselines. Recommendation baselines are baselines generated automatically
by vSAN. You can use recommendation baselines only with vSAN clusters.
A baseline group is a set of non-conflicting baselines that you can apply as a
single entity. A host baseline group can contain a single upgrade baseline
plus patch and extension baselines. For efficiency, you can attach and apply
baselines and baseline groups to container objects (such as folders, vApps,
and clusters) rather than to the individual underlying objects (virtual
machines and hosts).
To check a cluster’s compliance against an image, you can select the cluster,
select Updates > Hosts > Image, and click the Check Compliance button.
When you check a cluster’s compliance with a Lifecycle Manager image, one
Compliant: The host’s image matches the image applied to the cluster.
Non-Compliant: The host’s image does not match the image applied to
the cluster. Some potential causes are differences in the ESXi version,
the firmware version, or the set of components. Another potential cause
is that the host contains a standalone VIB.
Incompatible: The cluster’s image cannot be applied to the host. Some
potential reasons are that the host’s ESXi version is later than the version
in the image, the host has insufficient RAM, or the host’s hardware is
incompatible with the cluster’s image.
Unknown: No compliance state information is available, perhaps
because the host was recently added or the cluster’s image was edited.
Note
Note
If you intend to use the image in another vCenter Server, export it as a
JSON file and as a ZIP file. You can import both the JSON file and the
ZIP file to the target vCenter Server system.
You can use the vSphere Host Client interface to manage the host’s services.
To get started, log on to the vSphere Host Client as the root user or as another
user with local administrator privileges and navigate to Manage > Services.
Here you can examine the state of each ESXi service. To change the state of a
service, right-click on the service and select Start, Stop, or Reset. You can
also change a service’s startup policy such that it automatically starts with the
To manage firewall rules on an ESXi host, you can select the host in the
vSphere Client and navigate to Configure > System > Firewall, as illustrated
in Figure 13-2. Here you can view the currently allowed incoming and
outgoing firewall services. The details for each service include the service
name, the associated TCP ports, the associated UDP ports, and the allowed IP
The following are some of the other options you can select for a host in the
vSphere client:
Optionally, to see the impact of the command, you can use the following
command to examine the total and used storage (in kilobytes) before and
after step 4:
Note
If you want to keep a complete history of tasks and events for your
vCenter Server, do not use the database retention options.
Note
If you are using Internet Explorer, verify that TLS 1.0, TLS 1.1, and
TLS 1.2 are enabled in the security settings.
After logging in to the VAMI as root, you can perform any of the tasks
described in Table 13-5.
Table 13-5 Tasks in vCenter Server Appliance Management Interface
Task Steps/Details
View vCenter
Server health
status 1. Click Summary.
Reboot
vCenter
Server 1. Click Summary
Shut down
vCenter
Server 1. Click Summary
Create a
support
bundle 1. Click Summary
Monitor CPU
and memory
use of 1. Click Monitor
vCenter
Server
2. Click the CPU & Memory tab and use the date range
drop-down menu to specify a timeframe.
Monitor disk
Monitor
network use
of vCenter 1. Click Monitor
Server
2. Click the Network tab and use the date range drop-
down menu to specify a timeframe.
Monitor
database use
of vCenter 1. Click Monitor
Server
2. Click the Database tab and use the date range drop-
down menu to specify a timeframe.
Enable DCUI
Configure
network
settings for 1. Click Networking
vCenter
Server
2. Click Edit and fill in the following networking details:
DNS settings
IPv4 settings
IPv6 settings
Add
Edit
Delete
Reorder
Configure the
time settings
for the 1. Click Time
vCenter
Server
2. Click Time Zone > Edit and select the appropriate time
zone.
Start, stop,
and restart a
service in the 1. Click Services
vCenter
Server
2. Select a service and click Start, Stop, or Restart.
Configure
settings for
updating 1. Click Update
vCenter
Server
2. Click Settings, set the options for automatic update
checking, and set the repository to the default or to a
custom (HTTPS or FTPS) URL. Optionally provide
credentials if a custom repository is used.
Change the
root user
password in 1. Click Administration
vCenter
Server
2. Click Password > Change. Set the password and the
password expiration details. If you set the password to
expire, provide the number of days and an address for
the email warning.
Configure
and schedule
backups of 1. Click Backup
the vCenter
Server
2. Click Backup > Backup Now to initiate a backup or
click Backup > Configure to schedule backups.
Note
You can use the following procedure to reconfigure the FQDN, IP address, or
the primary network identifier (PID) of the vCenter Server:
Step 1. Log in to the VAMI using your administrator SSO credentials.
Step 2. Select Networking > Network Settings > Edit.
Step 3. Select the appropriate NIC and click Next.
Step 4. In the Edit Settings pane, change the host name and IP address.
Click Next.
Step 5. In the SSO Credentials pane, provide the administrator SSO
credentials. (You must provide the credentials for the administrator
account in the SSO domain, such as [email protected].)
Step 6. In the Ready to Complete pane, click Finish.
Step 7. Monitor the progress in the taskbar, and when you are redirected to
the new IP address, log in using your administrator SSO credentials.
Step 8. On the Networking page, verify the new host name and IP address.
Step 9. Re-register all deployed plug-ins.
Step 10. Regenerate all custom certificates.
Step 11. If vCenter Server HA was enabled, reconfigure vCenter HA.
Step 12. If Active Directory was enabled, reconfigure Active Directory.
Step 13. If Hybrid Link Mode was enabled, reconfigure Hybrid Link with
Cloud vCenter Server.
Note
If you set an IP address as a system name during the deployment of the
appliance, you can later change the primary network identifier to a
fully qualified domain name. If vCenter High Availability (HA) is
View port —
settings for
vCenter 1. Select the Configure tab.
Server
2. Navigate to Settings > General
> Edit > Ports and examine the
ports used by the web service.
Verbose (verbose)
Maximum connection
Send a —
message to
users who 1. Select the Configure tab.
are logged
in to
2. Navigate to Settings >
vCenter
Message of the Day, click Edit,
Server
and enter a message, such as a
maintenance announcement or
request for uses to log out.
Step 5. Optionally, for Database Size, set the following options and
examine the estimated database size and number of rows:
Number of Physical Hosts
Number of Virtual Machines
Disk: capacity,
maxTotalLatency, provisioned,
unshared, usage (average), used
Memory: consumed,
mementitlement, overhead,
swapinRate, swapoutRate,
swapused, totalmb, usage
(average), vmmemctl (balloon)
Note
If you increase the collection level, you may need to allocate more
storage and system resources to avoid a decrease in performance.
Note
Other staging options include Stage and Install, Unstage, and Resume.
If you choose to use the Check URL option, the vCenter Server uses the
configured VMware repository URL. The default VMware repository URL
requires Internet access. If your vCenter Server is not connected to the
Internet or if required by your security policy, you can configure a custom
repository URL for your vCenter Server patches by using the following
procedure:
Step 1. Download the vCenter Server Appliance patch ZIP file from
VMware’s website
(https://my.vmware.com/web/vmware/downloads).
Step 2. On a local web server, create a repository directory under the root.
Step 3. Extract the ZIP file into the repository directory.
Step 4. Log on as root to the VAMI.
Step 5. Select Update > Settings.
Step 6. Set the Repository settings: Choose use specified repository,
provide the URL and (optionally) the user credentials.
Step 7. Click OK.
After staging the patches to the vCenter Server, you can install the patches by
using the following procedure:
Step 1. Log on as root to the VAMI.
Step 2. Ensure that the patches are staged or use the staging procedure, but
for the staging options, select Stage and Install.
Step 3. Click Update.
Note
You should perform the previous procedure only during a maintenance
period because the services provided by the vCenter Server become
unavailable during the patch installation. As a precaution, you should
also back up the vCenter Server prior to patching.
Review Questions
1. You need to restore the vCenter Server from a file-based backup.
Which of the following will not be restored?
a. Resource pool hierarchy and setting
b. vSphere DRS cluster state
c. Cluster-host membership
d. vSphere DRS configuration and rules
2. You plan to upgrade a Windows-based vCenter Server to vCenter
Server Appliance 7.0 and want to transfer data in the background.
Which of the following can be included in the background transfer?
a. Configuration data only
b. Configuration data and performance data
c. Performance data
d. Data from the external database
3. You are configuring remediation setting for Lifecycle Manager.
Which of the following settings are only available when working
with baselines?
a. PXE Booted Hosts and Removable Media Devices
b. Quick Boot and VM Power State
c. VM Migration and Admission Control
d. VM Migration and Maintenance Mode Failures
4. Your vCenter Server is offline, and the distributed switch for an
ESXi host management network is not functioning. Which of the
following steps might fix the ESXi management connectivity?
a. Use the vSphere Host Client to restart ESXi networking.
Foundation Topics
To create a virtual machine, you can use the New Virtual Machine wizard
and select Create a New Virtual Machine. In the wizard, you should provide
all required information, including compute resource (host, cluster, or
Powering on a VM
To power on a virtual machine, in the vSphere client, you can right-click the
virtual machine and choose Power On. The following are some likely causes
of power-on failures:
Opening a Console to a VM
To open a console to a virtual machine, you can use an integrated web-based
console or the independent VMware Remote Console (VMRC). To use the
integrated web-based console, you should ensure that the virtual machine is
powered on, select it in the inventory pane, and either choose Launch Web
Console in the vSphere Client or Open Browser Console in the vSphere Host
Client.
To use the VMRC to access a virtual machine, you should first ensure that it
is installed on your local system and, if necessary, prepare a proxy server.
Then you can launch it from the vSphere Client or the vSphere Host Client.
In the vSphere Client, select the virtual machine in the inventory pane and
select Summary > Launch Remote Console. In the vSphere Host Client,
The main steps are to select the Enable Proxy for Remote Virtual Machine
option and to set the appropriate settings, such as the proxy server’s host
name or IP (IPv4 or IPv6) address and port, and optionally provide user
credentials. The specific steps depend on the OS type (Windows, Linux, or
macOS).
Note
In VMRC Version 11.0, the VMWARE_HTTPSPROXY environment
variable, which is used to set a proxy server in previous versions of
VMRC, is ignored after the previous procedure is applied. To use
authentication with the proxy server, you must use the previous
procedure instead of the environment variable.
Note
You cannot change the storage policy if you clone an encrypted virtual
machine.
You can clone a virtual machine to a create a new virtual machine. The
following privileges are required to clone a virtual machine to create a new
virtual machine:
You can clone a virtual machine to create a new virtual machine by right-
clicking the virtual machine and selecting Clone > Clone to Virtual Machine.
In the wizard, you should provide all required information, such as name,
compute resource, compatibility, and storage. The procedure is much like the
procedure in the “Deploying a Virtual Machine from a Template” section,
later in this chapter, including the option to customize the guest OS.
Note
You cannot use the vSphere Client to clone a virtual machine using
linked clones or instant clones. You can do so with API calls.
If the source virtual machine has an NVDIMM device and virtual PMem hard
disks, the destination host or cluster must have an available PMem resource.
If the virtual machine has virtual PMem hard disks but does not have an
NVDIMM device, the destination host or cluster must have an available
PMem resource. Otherwise, all hard disks of the destination virtual machine
use the storage policy and datastore selected for the configuration files of the
source virtual machine.
Step 1. In the vSphere Client, navigate to Menu > Policies and Profiles >
VM Customization Specifications.
Step 2. Click the Create a New Specification icon.
Step 3. On the Name and Target OS page, enter a name and a description
for the customization specification, select Linux as the target guest
OS, and click Next.
Step 4. On the Computer Name page, configure one of the following
Click Next.
Step 9. On the DNS Settings page, enter the DNS server and domain
settings.
Step 10. Complete the wizard and click Finish.
To create a guest customization specification for Windows, you can use the
previous procedure with the following modifications:
The compatibility setting impacts the supported features for the virtual
machine. Table 14-4 lists some of the feature sets available in recent
hardware versions.
Table 14-4 Features by Recent Virtual Machine Hardware Versions
Feature Versio Versio Versio Versio Versio
n 17 n 15 n 14 n 13 n 11
Maximum memory (GB) 6128 6128 6128 6128 4080
Maximum number of logical 256 256 128 128 128
processors
Maximum number of cores 64 64 64 64 64
(virtual CPUs) per socket
NVMe controllers 4 4 4 4 No
Maximum NICs 10 10 10 10 10
USB 3.1 SuperSpeedPlus Yes No No No No
Maximum video memory (GB) 4 2 2 2 2
Dynamic DirectPath Yes No No No No
PCI hot adding support Yes Yes Yes Yes Yes
Virtual precision clock device Yes No No No No
Virtual watchdog timer device Yes No No No No
Virtual SGX device Yes No No No No
Virtual RDMA Yes Yes Yes Yes No
NVDIMM controller 1 1 1 No No
For best results, set virtual machine compatibility to ESXi 5.0 or later.
Hot adding multicore virtual CPUs requires compatibility set to ESXi 5.0
or later.
You cannot use hot adding to increase the number of virtual CPUs for a
CPU identification (CPU ID) masks control the visibility of CPU features to
the guest OS. Masking CPU features can impact a virtual machine’s
availability for migration using vMotion. For example, if you mask the AMD
No eXecute (NX) or the Intel eXecute Disable (XD) bits, you prevent the
virtual machine from using those features, but you allow the virtual machine
to hot migrate to hosts that do not include this capability.
Note
Changing the CPU compatibility masks can result in an unsupported
configuration. Do not manually change the CPU compatibility masks
unless instructed to do so by VMware Support or a VMware
Knowledge Base article.
You must use a guest OS that supports large-capacity virtual hard disks.
Target hosts for migration and cloning operations must use ESXi 6.0 or
later.
NFS, vSAN, and VMFS Version 5 or later datastores are supported.
Fault Tolerance is not supported.
BusLogic Parallel controllers are not supported.
To increase the size of a virtual disk, you need the following privileges:
To control how a virtual disk is impacted by snapshots, you can set the disk
mode for a virtual disk to the settings described in Table 14-6.
Table 14-6 Virtual Disk Mode Settings
Disk Mode Description
Dependent Included in snapshots.
Independent– Not included in snapshots.
Persistent
All data written is written permanently to disk.
ESXi 4.x and later compatibility is required for LSI Logic SAS and
VMware Paravirtual SCSI.
ESXi 5.5 and later compatibility is required for AHCI SATA
ESXi 6.5 and later compatibility is required for NVMe
BusLogic Parallel controllers do not support large-capacity disks.
Disks on VMware Paravirtual SCSI controllers may not provide the
expected performance if they have snapshots or if the host’s memory is
overcommitted.
If the virtual machine boots from LSI Logic SAS or VMware Paravirtual
SCSI, and you add a disk that uses BusLogic, LSI Logic, or AHCI
SATA controllers
If the virtual machine boots from AHCI SATA, and you add BusLogic
Parallel or LSI Logic controllers
Note
Adding additional disks to virtual machines that use EFI firmware does
not cause boot problems.
Establish a trusted connection with the KMS and select a default KMS.
Create an encryption storage policy (or plan to use the sample VM
encryption policy).
Ensure that the virtual machine is powered off.
Step 3. Optionally, encrypt the virtual machine, or both virtual machine and
disks, from the Edit Settings menu in the vSphere Client:
a. Right-click the virtual machine and select Edit Settings.
b. Select the VM Options tab and open Encryption. Choose an
encryption policy. If you deselect all disks, only the VM home is
encrypted.
Step 4. Click OK.
Step 6. Optionally, enable the Installation Boot option and delay time in
seconds to automatically reboot the virtual machine after OVF
deployment.
Step 7. Click OK.
Note
To minimize the impact to a running virtual machine and to reduce the
time required to take a snapshot, do not snapshot the memory state or
quiesce the guest file system.
After creating a snapshot, you can use the Snapshot Manager to view the
snapshot hierarchy of the virtual machine, which appears as a tree with
branches, as illustrated in Figure 5-2 in Chapter 5, “vCenter Server Features
and Virtual Machines.” To open the Snapshot Manager, in the vSphere client,
you can right-click the virtual machine and choose Snapshots > Manage
Snapshots. In the Snapshot Manager, the snapshot that appears above the You
Are Here icon is the parent snapshot. If you revert to a snapshot, that
snapshot becomes the parent snapshot. If you take a snapshot of a virtual
machine that already has at least one snapshot, the new snapshot is a child of
the parent snapshot.
To revert a virtual machine to a specific snapshot, select the snapshot in the
To migrate a virtual machine by using the vSphere Client, you can right-click
the virtual machine in the inventory pane, choose Migrate, and complete the
wizard. The details for completing the wizard depend on the migration type.
The required privileges for each migration type are covered in Chapter 5.
You can use the Recent Tasks pane to monitor the progress of your
migration.
Click Next.
Step 3. If you select a migration type that includes a cross-host migration,
select the destination compute resource (Host, Cluster, Resource
Pool, or vApp), verify that no issues exist in the Compatibility
panel, and click Next.
Step 4. If you select a migration type that includes a cross-datastore
migration, select the virtual disk format (Same as Source, Thin
Provisioned, Thick Provisioned Lazy Zeroed, or Thick
Provisioned Eager Zeroed), select the appropriate policy in the
VM Storage Policy menu, and select the destination, as described
here:
To store all the virtual machines in a datastore, select the datastore
and click Next.
To store all the virtual machines in a Storage DRS cluster, select
the cluster and click Next.
To store the virtual machine configuration files and virtual disks in
separate locations, click Advanced and configure the destination
for the configuration files and each virtual disk. Click Next.
Step 5. For cross-host migrations, select the destination network for the
virtual machines and click Next. Alternatively, you can click
Advanced to assign separate networks to individual virtual machine
network adapters.
Virtualization-Based Security
Starting with vSphere 6.7, you can enable Microsoft virtualization-based
security (VBS) on supported Windows guest operating systems. VBS is a
Microsoft feature for Windows 10 and Windows Server 2016 operating
systems that use hardware and software virtualization to enhance system
security by creating an isolated, hypervisor-restricted, specialized subsystem.
Windows typically uses hashed credentials stored in memory, including
Active Directory credentials, that may be subject to the pass-the-hash exploit.
In VBS, you can enable a feature called Credential Guard that keeps account
of hash information outside the memory of the Windows instance, mitigating
pass-the-hash. If the hardware TPM chip is not available or is not enabled in
the BIOS, Windows still uses VBS, and you can still enable Credential
Guard, but the credentials are not as secure.
On a traditional (non-virtual) Windows server, to prepare for VBS, you
should ensure that its BIOS, firmware, and operating system are set to use
UEFI firmware, Secure Boot, hardware virtualization (Intel VT/ADM-V),
and IOMMU. You can enable VBS in the Windows operating system. When
you reboot Windows, the Microsoft hypervisor loads and leverages
virtualization to bring up additional Windows components, including the
credential management subsystem, in a separate memory space. All
subsequent communications between Windows and Windows components
are via RPC calls run through a Microsoft hypervisor-based communications
channel.
In vSphere, to use VBS, you must use virtual hardware Version 14 or later.
The virtual machine must be set to use UEFI firmware, Secure Boot,
hardware virtualization (Intel VT/ADM-V), and IOMMU. In the virtual
In many cases, you need to change the execution policy, which by default is
set to the most secure policy (Restricted). For example, to change the policy
to RemoteSigned, you can use the following command:
Click here to view code image
Set-ExecutionPolicy RemoteSigned
Get-VM
To start a virtual machine named win-01, you can use the following
commands:
Get-VM win-01 | Start-VM
If you save the sample content to a file named MyVMs.xml, you can use the
following commands to read the file, parse the XML content into a variable,
and create a virtual machine based on each specification:
Click here to view code image
[xml]$s = Get-Content myVM.xml
$s.CreateVM.VM | foreach {New-VM -VMHost $vmHost1 -Name $_.Name
-DiskGB $_.HDDCapacity}
In vSphere 7.0, you can enable virtual machines to use the processing power
of available graphics processing units (GPUs). GPUs are specialized
processors developed for parallel processing, primarily for rendering
graphical images. In vSphere, the main use case for a GPU is to support high-
end graphics in virtual desktop infrastructure (VDI). Recently, the need to
support artificial intelligence (AI) and machine learning (ML) has also
emerged as a major use case.
You can use GPUs in different manners in a vSphere environment. For
AI/ML use cases, the GPU configuration choice is mostly impacted by the
size and complexity of the problem being solved. For VDI, the GPU
configuration choice is impacted by the end user’s graphics needs. The
configuration involves either sharing GPUs with multiple virtual machines or
dedicating some GPUs to specific virtual machines. Table 14-8 summarizes
the potential GPU configuration for specific AI/ML use cases.
Table 14-8 Use Cases and GPU Configurations
GPU Sample Use Cases Details
Configuration
GPU sharing ML development and Good fit for small problems
testing and for the ML inference
phase
Dedicated Data science Commonly used for
Content Libraries
Click Next.
Step 4. On the Add Storage page, select a storage location for the content
library contents and click Next.
Step 5. On the Ready to Complete page, review the details and click Finish.
Note
When you enable authentication for the content library, you effectively
set a password on the static username vcsp, which you cannot change.
This is a user account that is not associated with vCenter Single Sign-
On or Active Directory.
Step 1. In the Subscription URL text box, enter the URL address of the
published library.
Step 2. If authentication is enabled on the published library, select Enable
Authentication and enter the publisher password.
Step 3. Select a download method for the contents of the subscribed library:
Immediately or When Needed.
Step 4. If prompted, accept the SSL certificate thumbprint. The SSL
certificate thumbprint is stored on your system until you delete the
subscribed content library from the inventory.
Note
The transfer service on the vCenter Server is responsible for importing
and exporting content between the subscriber and the publisher, using
HTTP NFC.
Note
You cannot set permissions on a content library directly.
Final Preparation
Congratulations on making it through all the technical chapters in this book.
Now you are ready for your final preparation for taking the Professional
VMware vSphere 7.x (2V0-21.20) exam. This chapter contains two sections:
“Getting Ready” and “Taking the Exam.”
Getting Ready
Here is a list of actions and considerations that you should address prior to
taking the exam:
Note
Currently, you can choose to take the exam at home or in a Pearson
Vue testing center. To take the exam at home, you must meet strict
requirements, such as compatibility for audio, camera, and bandwidth.
Pay careful attention to all the requirements and precheck information
before choosing this option.
Bring two forms of identification that include your photo and signature.
You cannot bring personal items such as laptops, tablets, phones,
watches, pagers, wallets, or notes into the examination room. You may
be able to place some of these items into a locker, but you should avoid
bringing larger items into the training facility.
Arrive at the exam center 30 minutes prior to the scheduled exam start
time so you have ample time to complete the sign-in procedure and
address personal needs. During the sign-in procedure, you should expect
to place personal belongings in a locker, provide credentials, review the
test regulations, and sign the agreement.
Be sure to pay attention to the rules and regulations concerning the exam.
For example, follow the venue’s protocol for requesting help during the
exam and for signaling your completion of the exam. Each venue’s rules
may be unique.
Pay close attention to the wording of each question and each choice.
(The exam format is multiple choice, provided via a web-based user
interface.) The following are some examples of what to expect:
Some questions may ask you to select “which statement is correct,”
and some questions may ask you to select “which statement is
incorrect.”
Chapter 2
1. c and f. Explanation: NPIV requires the use of virtual machines
with RDMs. An RDM is a mapping file containing metadata that
resides in a VMFS datastore.
2. a. Explanation: A vSphere pod requires ephemeral storage to store
Kubernetes objects, such as logs, emptyDir volumes, and
ConfigMaps.
3. c. Explanation: Symmetric Multiprocessing Fault Tolerance (SMP-
FT) is supported when PFFT is set to 0 and Data Locality is set to
Preferred or Secondary.
4. b. Explanation: If you choose RAID 5/6 and PFTT=2 for a 100 GB
Chapter 3
1. d. Explanation: On a vSS, you can set the following network
policies: Teaming and Failover, Security, Traffic Shaping, and
VLAN.
2. b. Explanation: The following NIC teaming options are available
on vSS and vDS: Route Based on Originating Virtual Port, Route
Based on IP Hash, Route Based on Source MAC Hash, and Use
Explicit Failover Order.
Chapter 4
1. d. Explanation: Intel EVC Mode Nehalem (Level L2) includes the
Intel Penryn feature set and exposes additional CPU features,
including SSE4.2 and POPCOUNT.
Chapter 5
Chapter 6
1. d. Explanation: Use cases for vSphere with Tanzu include
providing a familiar single stack for containers and virtual
machines and streamlining the development of modern
applications.
2. b. Explanation: vRealize Operations (vROps) is commonly used for
continuous performance optimization and intelligent remediation.
3. a. Explanation: vRealize Log Insight (vRLI) is commonly used to
decrease time and effort spent on root cause analysis and
centralized log management and analysis.
4. a and e. Explanation: Horizon includes instant clones, which
together with VMware Dynamic Environment Manager and
VMware App Volumes dynamically provides just-in-time (JIT)
delivery of user profile data and applications to stateless desktops.
5. d and e. Explanation: VMware App Volumes is a set of application
and user management solutions for VMware Horizon, Citrix
Virtual Apps and Desktops, and Remote Desktop Services Host
(RDSH) virtual environments.
6. d. Explanation: vSphere Replication does not require separate
licensing. Instead, it is included as a feature of specific vSphere
license editions, including vSphere Standard.
7. b and c. Explanation: Site Recovery Manager (SRM) use cases
include disaster recovery and data center migrations. For data
replication, SRM integrates with vSphere Replication and
supported storage-based replication products.
8. c. Explanation: VMware Cloud Foundation (VCF) is a hybrid cloud
platform built on full-stack hyperconverged infrastructure (HCI)
Chapter 7
1. d. Explanation: The key size requirement is 2048 to 16,384 bits, not
1024 to 16,384 bits
2. a. Explanation: vCenter Server supports these certificate modes for
ESXi: VMware Certificate Authority, Custom Certificate
Authority, and Thumbprint Mode.
3. a. Explanation: In vCenter Server 7.0, the system roles include
read-only, administrator, no access, no cryptography administrator,
trusted infrastructure administrator, and no trusted infrastructure
administrator.
4. a. Explanation: To migrate a virtual machine with Storage vMotion,
the user must have the Resource.Migrate Powered On Virtual
Machine on the virtual machine or folder and Datastore.Allocate
Space on the destination datastore.
5. d. Explanation: In normal lockdown mode, user accounts that are in
the Exception Users list and that have administrator privileges on
the host can access the DCUI. Also, users identified in the host’s
DCUI.Access advanced option can access the DCUI.
6. a. Explanation: By default, this password must have at least eight
characters, one lowercase character, one numeric character, and one
special character.
7. b. Explanation: To list the available security associations, you can
use the command esxcli network ip ipsec sa list in ESXi.
Chapter 8
1. a. Explanation: The ESXi installation prerequisites include
downloading the ESXi installer ISO and preparing the hardware
system to boot from it.
2. b. Explanation: There is a default installation script included with
the ESXi installer. The default ks.cfg installation script is in the
initial RAM disk at /etc/vmware/weasel/ks.cfg.
3. c. Explanation: Prior to running the deployment command, you can
run a pre-deployment check by using the command vcsa-deploy
install --verify-only path-to-JSON-file.
4. a. Explanation: VECS does not store ESXi certificates. ESXi
certificates are stored locally on the ESXi hosts in the
/etc/vmware/ssl directory.
5. d. Explanation: All users have must have the object of class
inetOrgPerson. All groups must have the object of class
groupOfUniqueNames. Al groups must have the group membership
attribute uniqueMember.
6. c. Explanation: A user must be a member of the CAAdmins group
to perform most certificate management operations, such as using
the certool command.
Chapter 9
1. a. Explanation: To add physical adapters to a vSS, you can select
the host, navigate to Configure > Networking > Virtual Switches,
select the switch, and select Manage Physical Adapters. In the
wizard, click the Add Adapters (green plus sign) button.
2. b. Explanation: You can set the VLAN ID to 0 (external switch
tagging), 1 to 4094 (virtual switch tagging), or 4095 (virtual guest
tagging)
3. d. Explanation: You can change the general setting of a vDS,
including Name, Number of Uplinks, Network I/O Control (enable
or disable), and Description.
4. a. Explanation: You can change the Advanced settings for a vDS,
including MTU (in bytes), Multicast Filtering Mode (Basic or
IGMP/MLD Snooping), Discovery Protocol, and Administrator
Contact.
5. a. Explanation: When creating a VMkernel adapter, you should
configure the VMkernel Adapter IP, MTU, Stack, and Available
Chapter 10
1. c. Explanation: If you initially selected the Skip Quickstart option,
you should add hosts manually. If you previously used Quickstart
but selected Configure Networking Settings Later, you can add
hosts by using Quickstart but must manually configure the host
networking.
2. d. Explanation: The default value for both CPU and Memory Limit
is Unlimited.
3. a. Explanation: Define Host Failover Capacity can be set to Cluster
Chapter 11
1. c. Explanation: In hybrid clusters, magnetic disks are used for
capacity, and flash devices serve as a read cache and a write buffer.
In a hybrid cluster, 70% of the flash space is used for the read
cache, and 30% is used for the write buffer.
Chapter 12
1. d. Explanation: To join vCenter Server systems in Enhanced
Linked Mode, you need to connect them to the same SSO domain.
2. a. Explanation: In a vSphere environment, you cannot change the
object, user, or user group in a permission, but you can change the
role.
3. b and c. Explanation: The Certificate Management page shows the
certificate types in the VMware Endpoint Certificate Service
(VECS). By default, the types are machine SSL certificates and
trusted root certificates.
4. a. Explanation: To perform certificate management for ESXi, you
must have the Certificates.Manage Certificates privilege.
5. d. Explanation: You can change the required length, change the
character class requirement, and allow passphrases by using the
Security.PasswordQualityControl advanced option.
6. a. Explanation: An orange icon indicates that the status of the
device has changed, and you must reboot the host before you can
use the device.
7. b. Explanation: If the host acceptance level is VMwareAccepted,
you cannot install VIBs at the PartnerSupported level.
8. a. Explanation: You can use the following command to run the
Secure Boot validation script on an upgraded ESXi host:
/usr/lib/vmware/secureboot/bin/secureBoot.py -c
9. b. Explanation: To configure a trust relationship between a KMS
and vCenter, in the vSphere Client, select the vCenter Server,
navigate to Configuration > Key Management Servers, and click
Add.
10. c. Explanation: To configure vSphere Trust Authority, you need to
configure the trusted key provider for the trusted hosts on the
trusted cluster (using Register-KeyProvider and Set-KeyProvider).
Chapter 14
1. c. Explanation: When selecting the storage type on a host that has
PMem memory, you can select either the Standard or PMem radio
button. If you chose PMem storage for a virtual machine, its default
virtual disk, new virtual disk, and NVDIMM devices share the
same PMem resources.
2. b. Explanation: With the vmx.log.guest.level = “info” setting,
vminst.log is sent to the host, but vmmsi.log remains in the virtual
machine.
3. a. Explanation: You cannot use the vSphere Client to clone a virtual
machine using linked clones or instant clones. You can do so with
API calls.
4. c. Explanation: The compatibility setting controls which virtual
machine hardware version is used. Setting the compatibility to
ESXi 6.7 and later uses hardware Version 14.
5. a. Explanation: To control the default hardware compatibility for
new virtual machines, you can set the Default VM Compatibility
setting at the host, cluster, or data center level.
6. d. Explanation: To minimize the impact to a running virtual
machine and to reduce the time required to take a snapshot, do not
snapshot the memory state or quiesce the guest file system.
7. c. Explanation: In vSphere, to use VBS, you must use virtual
hardware Version 14 or later. The virtual machine must be set to
use UEFI firmware, Secure Boot, hardware virtualization (Intel
Chapter 2
1. d. Explanation: VMFS Version 6 provides access for ESXi 6.5 and
later hosts.
2. c. Explanation: Ruby vSphere Console (RVC) is a command-line
interface used for managing and troubleshooting vSAN. RVC
provides a cluster-wide view and is included with the vCenter
Server deployment.
3. a. Explanation: VASA storage providers are software components
that integrate with vSphere to provide information about the
physical storage capabilities.
4. a. Explanation: MRU is the default path selection policy for most
active/passive storage devices.
5. b. Explanation: Thick eager zeroed is the slowest method for virtual
disk creation, but it is the best for guest performance.
Chapter 3
1. b. Explanation: When you enable traffic shaping for a standard
switch or port group, you can configure the options Average
Bandwidth, Peak Bandwidth, and Burst Size.
2. c. Explanation: At the distributed port level, you can override
policies applied to the distributed port group and apply unique
policies to a distributed port.
3. a. Explanation: In vSphere 7.0, the default settings for a distributed
port group are static binding, elastic port allocation, and eight ports.
4. d. Explanation: Single Root I/O Virtualization (SR-IOV) is a
feature that allows a single Peripheral Component Interconnect
Express (PCIe) device to appear as multiple devices. It is useful for
supporting an application in a guest OS that is sensitive to network
latency. SR-IOV-enabled devices provide virtual functions (VFs) to
Chapter 4
1. b. Explanation: Enhanced vMotion Compatibility (EVC) is a
cluster feature. The source and target processors must come from
the same vendor class (AMD or Intel) to be vMotion compatible.
Clock speed, cache size, and number of cores can differ between
source and target processors.
2. b. Explanation: When the DRS Migration Threshold is set to Level
2, DRS expands on Level 1 by making recommends in situations
that are at or close to resource contention. It does not make
recommendations just to improve virtual machine happiness or
cluster load distribution.
3. b. Explanation: If the primary host detects datastore heartbeats for a
secondary host but no network heartbeats or ping responses, it
assumes that the secondary host is isolated or in a network
partition.
4. d. Explanation: Hosts must use static IP addresses or guarantee that
IP addresses assigned by DHCP persist across host reboots.
5. a. Explanation: To use Wake-on-LAN (WoL) with DPM, you must
ensure that vMotion is configured, the vMotion NIC must supports
WoL, and the physical switch port must be set to automatically
negotiate the link speed.
Chapter 5
1. b. Explanation: Although making snapshots may be a useful step
for a backup utility, a snapshot is not by itself a backup. A snapshot
does not provide a redundant copy of data. If the base flat file is
lost or corrupt, you cannot restore the virtual machine by reverting
to a snapshot.
2. a. Explanation: You can enable or disable hardware acceleration.
Chapter 6
1. b. Explanation: vRealize Orchestrator (vRO) is a key component of
vRA that provides custom workflows to support anything as a
service (XaaS).
2. d. Explanation: VMware Horizon is commonly used for remote
users, kiosk and task users, and call centers.
3. b. Explanation: To configure replication, in the vSphere Client,
navigate to Home > Site Recovery > Open Site Recovery.
4. d. Explanation: VMware HCX is a workload mobility platform that
simplifies application migration, workload rebalancing, and
business continuity across on-premises data centers, private clouds,
and hybrid clouds.
5. a. Explanation: VMware AppDefense provides data center endpoint
security that protects applications running in a virtualized
environment.
Chapter 7
1. c. Explanation: Do not use CRL distribution points, authority
information access, or certificate template information in any
Chapter 8
1. d. Explanation: In the first stage when using the GUI installer, you
navigate through the installation wizard, choose the deployment
type, provide the appliance settings, and deploy the OVA. In the
second stage you use a wizard to configure the appliance time
synchronization, configure vCenter Single Sign-On (SSO), and
start the services in the newly deployed appliance.
2. d. Explanation: When adding an Active Directory over LDAP
identity source, you need to provide required information such as
the name, the base DN for users, and the base DN for groups.
3. d. Explanation: The vSphere Lifecyle Manager service is available
via the vSphere Client immediately after vCenter Server
deployment. No special steps are required to install vSphere
Lifecyle Manager.
4. c. Explanation: A rule can identify target hosts by boot MAC
address, SMBIOS information, BIOS UUID, vendor, model, or
fixed DHCP IP address.
Chapter 9
1. b. Explanation: You can set VLAN ID to 0 (external switch
tagging), 1 to 4094 (virtual switch tagging), or 4095 (virtual guest
tagging).
2. c. Explanation: As a rollback plan, you should export the
distributed switch configuration prior to upgrading. In the export
wizard, choose the option to include the distributed port groups.
3. c. Explanation: Edit the distributed port group setting. In the
settings, click General and then, from the Network Resource Pool
drop-down menu, select the network resource pool and click OK.
4. d. Explanation: The provisioning stack supports traffic for virtual
machine cold migration, cloning, and snapshot migration. It also
supports the Network File Copy (NFC) traffic used for cloning
virtual disks during long-distance vMotion. You can use this stack
to isolate provisioning traffic by placing it on a separate gateway.
The default stack provides networking support for management
traffic and for all VMkernel traffic types.
5. a. Explanation: To enable NetFlow in a distributed port group,
select the distributed port group, select Configure > Policies, click
Edit, and then, on the Monitoring page, select Enable NetFlow or
Disable NetFlow.
Chapter 10
1. c. Explanation: Optionally, you can set Memory Reservation to a
numeric value (the default is 0) and a unit of measure (MB, GB,
MHz, or GHz).
2. c. Explanation: In the vRealize Operations (vROps) GUI, locate the
appropriate vCenter Server adapter instance. Select the adapter,
choose Advanced Settings, and set Provide Data to vSphere
Chapter 11
1. c. Explanation: To provide the encryption keys for a vSAN
datastore, you must implement a key management server (KMS)
cluster server that is KMIP 1.1 compliant and is in the vSphere
compatibility matrices.
2. c. Explanation: To enable deduplication and compression for an
existing vSAN cluster, edit the vSAN services in the cluster and
enable Deduplication and Compression. (Separate options to enable
just deduplication or just decompression are not provided.)
3. c. Explanation: The options in the Datastore Brower include
Upload Files, Upload Folder, Download, New Folder, Copy to,
Move to, Rename to, Delete, and Inflate.
4. d. Explanation: The default storage module that claims NVMe-oF
is HPP. NVMe-oF targets cannot be claimed by NMP.
5. a. Explanation: When using the vSphere Client to manage the
storage providers, you can select a storage provider and choose
Synchronize Storage Providers, Rescan, Remove, or Refresh
Certificate.
Chapter 12
1. b. Explanation: To assign a global permission, you should use the
vSphere Client with a user account that has the Permissions.Modify
Permission privilege on the root object of all inventory hierarchies.
2. d. Explanation: A yellow alarm is raised if a certificate’s status is
Chapter 13
1. b. Explanation: After a restore completes, the following
configurations are restored: virtual machine resource settings,
resource pool hierarchy and setting, cluster-host membership, DRS
configuration, and rules.
2. d. Explanation: If you choose to transfer configuration, historical,
and performance data, you can transfer the configuration data
during the upgrade and transfer the remaining data in the
background following the upgrade. The option to transfer data in
the background following an upgrade is only applicable to
scenarios where the source vCenter Server uses an external
database.
3. b. Explanation: When working with baselines, the following
settings are applicable: Quick Boot, VM Power State, VM
Migration, Maintenance Mode Failures, PXE Booted Hosts, and
Removable Media Devices. When working with images, the
following settings are applicable: Quick Boot, VM Power State,
VM Migration, Maintenance Mode Failures, HA Admission
Control, and DPM.
Chapter 14
1. c. Explanation: Guest OS customization requires a supported guest
OS installed on SCSI node 0:0 and VMware Tools. Windows guest
customization requires ESXi Version 3.5 or later. Linux guest
customization requires Perl in the guest OS.
2. a. Explanation: The compatibility setting controls which virtual
machine hardware version is used. Setting the compatibility to
ESXi 7.0 and later uses hardware Version 17, which is the
minimum version that support 4 GB video memory.
3. d. Explanation: To minimize the impact to a running virtual
machine and to reduce the time required to take a snapshot, do not
snapshot the memory state or quiesce the guest file system.
4. a. Explanation: You can export a virtual machine, virtual appliance,
or vApp as an OVF or OVA template to create virtual appliances
that can be imported by other users. Starting in vSphere 6.5, you
can only export to OVF.
5. c. Explanation: The transfer service on the vCenter Server is
responsible for importing and exporting content between the
subscriber and the publisher, using HTTP NFC.
A
absent component state, vSAN, 52
acceptance levels, ESXi hosts, 496
accessing
CIM, controlling access, 491–492
datastore browsers, controlling, 261
vCenter Server, restricting access, 261
accounts
lockouts, 485–487
vCenter Cloud account permissions, 210–213
VMware Certification accounts, 604
acknowledging triggered alarms, 399–400
active nodes, vCenter HA, 14
AD (Active Directory), 21
ESXi user management, 497–498
Federation Services, 313–314
B
backups
vCenter Appliance File-Based Backup and Restore, 7
vCenter Server, 23, 514–517, 538–539
bandwidth
average bandwidth, 101
burst size, 101
inbound traffic shaping, 105
network resource pools, 106–108
peak bandwidth, 101
traffic shaping policies, 101
base images, 534–535
baselines, 527, 530–535
basic multicasting filtering, 116–117
behaviors, SDRS, 82–83
binding ports, 112–113
block primitives
ATS, 70
ATS Only Flag, 70
VAAI, 70–71
Write Same (Zero), 71
XCOPY, 70
C
CA, VMCA as intermediate, 238–239
caching, stateless, 292
capacity reservation settings, vSphere HA, 420
CDP (Cisco Discovery Protocol), 117–118
certificates
client certificates
managing, 477–478
vCenter Server, 261
CSR, 238–239
custom certificates, 241
managing, 478–479
VMCA, 237
ESXi, 240
changing certificate mode, 479–480
custom certificates, 480
expiration, 481
host certificate modes, 241, 242
management, 479–481
switching to VMCA Mode, 480–481
identity services, 236–237
machine SSL certificates, 240, 241
D
data centers, 166–167
NSX, requirements, 26
vRealize Suite, requirements, 26–27
vSAN, requirements, 25–26
vSphere Client data center-level management, 111
Data Locality, vSAN, 57
data transfers, vCenter Server, 519
database files, 179
databases, vCenter Server, 11, 297
datastores, 41, 169
E
eager zeroed thick virtual disks, 79
editing
ESXi host profiles, 319
OVF templates, 585–586
permissions, 476–477
VM, 583–585
vSAN settings, 417–418
editions, vSphere, 8–10
elastic port allocation, 113
encrypted vMotion, 192
encryption
DEK, 61–62, 270
Encrypted vSphere vMotion, 272–273
KEK, 61–62, 270, 271
VM, 270–272, 505–506
vSAN, 61–62
vSAN clusters, 432–435
vSphere Virtual Machine Encryption certificates, 240
Enhanced Linked Mode, 12–13, 474
enhanced reservations, resource pools, 142
ephemeral binding, 113
erasure coding
RAID 5, 60–61
RAID 6, 60–61
vSAN, 59, 60–61
esxcli commands, 483–484
HPP, 457
multipathing, 456–457
G
“getting ready,” exam preparation, 603–604
global permissions, 247, 476
GPU, VM support, 592–594
GRID models, VM, 593
groups, authentication, 474–475
H
HA (High Availability)
Admission Control, 146–148
advanced options, 148–149
benefits of, 144
best practices, 151
configuring
admission control, 371
advanced options, 370
HA clusters, 370–371
detecting host issues, 144
failovers, 144
heartbeats, 146
Proactive HA, 7, 151, 372
requirements, 145
response to failures, 145–146
vCenter HA, 6, 14
active nodes, 14
cluster management, 557–558
implementing, 316–317
passive nodes, 14
requirements, 24–25
witness nodes, 14
vCenter Server HA, 145, 157
I
IDE 0, 181
IDE 1, 181
identification
NPIV, 40
VLAN ID, standard port groups, 333
Identity Federation, 313–314
identity services, 236
VECS, 236–237, 240–241
VMAFD, 236
VMCA, 236–237, 239
custom certificates, 237
as intermediate CA, 237, 239
management modes (recommended), 237–238
unsupported certificates, 238
vmdir, 236
identity sources
AD, 307–309
SSO, 305–307
IEEE 802.1ax, 93
IEEE 802.3ad, 93
images
cluster images, importing/exporting, 538
J
JSON templates, VCSA deployments with CLI installers, 302
jumbo frames, 97–98
K
KEK (Key Encryption Keys), 61–62, 270, 271
kernels, ESXi, 321–322
Key Management Servers, security, 502
keyboards, 181
KMS, vSAN encryption, 61–62
Kubernetes, 45–46, 54
L
LACP (Link Aggregation Control Protocol), 93, 113–115
LAG (Link Aggregation Groups), 346–349
LAN (Local Area Networks). See PVLAN; VLAN
large-capacity drives, vSAN support, 54
latency
sensitivity, 392
troubleshooting
device latency, 382
N
NAI primitives, VAAI, 71
naming conventions, RDM
dynamic name resolution, 39
user-friendly persistent names, 39
NAS/NFS, 38
NetFlow, 108, 336–337
O
objects
inventory hierarchies, 243–244
states, vSAN
healthy object state, 52
unhealthy object state, 52
storage, vSAN, 51
Observer (vSAN), 53
opaque networks, 18, 93
OpenLDAP, 309–310
optimizing performance, 379–383
OS, guest installations on VM, 250, 574–576
Other-vVol, 73
OVA templates, deploying VM, 577
overview performance charts, 375–377
OVF templates
deploying VM, 577
editing details, 585–586
managing, 589
P
packets
dropped packets, troubleshooting, 383
R
RAID 5 erasure coding, 60–61
RAID 6 erasure coding, 60–61
rapid provisioning VM with templates, 195
RDM (Raw Device Mappings)
benefits of, 39–40
diagrams, 38
distributed file locking, 39
dynamic name resolution, 39
file permissions, 39
file system operations, 39
management, 439–446
NPIV, 40
physical compatibility mode, 39
SAN management agents, 40
snapshots, 39
use cases, 39
user-friendly persistent names, 39
virtual compatibility mode, 38–39
VM, 582–583
vMotion, 40
RDMA (Remote Direct Memory Access)
ESXi and RDMA support, 453
NVMe over RDMA, 451, 453
S
SAN
SAN (Storage Area Networks)
management agents, RDM, 40
vSAN. See individual entry
SATA controllers, 182
SATP (Storage Array Type Plug-ins), 76
scalable shares, resource pools, 142–143
schedulers, DRS, 7
scoring VM, DRS, 136–137
scripted ESXi host installations, 288–292
SCSI controllers, 182
SCSI UNIMAP, 59
SDDC (Software-Defined Data Centers)
NSX, requirements, 26
requirements, 25–27
VMware SDCC, 27
vRealize Suite, requirements, 26–27
vSAN, requirements, 25–26
SDRS (Storage DRS), 81, 84
anti-affinity rules, 448–449
automation levels, 82
behaviors, 82–83
T
taking exams, 604–606
Tanzu, vSphere with, 173, 204
integration, 205
use cases, 204
TCP/IP (Transmission Control Protocol/Internet Protocol), 92
stacks, 121–122, 188
VMkernel
TCP/IP networking layer, 18
TCP/IP stacks, 121–122, 339–340
tcServer, 11
U
UEFI Secure Boot, 266, 499–500
UMDS (Update Manager Download Service), 529–530
unexposed features (network security), disabling, 266–267
unhealthy object state, vSAN, 52
updating
ESXi firmware updates, 536–537
UMDS, 529–530
V
VAAI (vStorage API for Array Integration)
block primitives, 70–71
NAI primitives, 71
thin provisioning primitives, 71
vSphere storage integration, 70–71
VAIO (vSphere API for I/O Filtering), 271
validation settings (permissions), changing, 502
VAMI (vCenter Server Application Management Interface)
monitoring/managing resources, 396
vCenter Server
monitoring/managing, 543–547
patching, 554–556
updating, 554–557
vApps, 170
VASA (vStorage API for Storage Awareness)
SPBM
managing storage providers, 462
registering storage providers, 461
vSphere storage integration, 69–70
VBS (Virtualization-Based Security), 590
vCenter Appliance File-Based Backup and Restore, 7
vCenter Cloud account permissions, 210–213
vCenter Converter, 205
integration, 205–206
W
warning events, 397
web proxies, ESXi security settings, 490–491
Windows Perfmon, 391–392
Windows Session Authentication, enabling SSO, 472–473
witness nodes, vCenter HA, 14
witnesses, vSAN, 52, 54
workflows, evacuation, 136
Write Same (Zero), 71
Memory Tables
Chapter 1
Table 1-4 Available vSphere Features
Availab Description
le
vSpher
e
Feature
s
A feature introduced in vSphere 7.0 that enables you to back up
and restore the vCenter Server Appliance instances.
A feature that provides live virtual machine migrations with
negligible disruption from a source ESXi host to a target ESXi
host.
A feature that provides automated failover protection for VMs
against host, hardware, network, and guest OS issues. In the event
of host system failure, it performs cold migrations and restarts
failed VMs on surviving hosts.
A feature that places and starts VMs on appropriate ESXi hosts
and hot-migrates VMs using vMotion when there is contention
for compute resources.
A feature that performs live migrations with negligible disruption
of VMs from a source datastore to a target datastore.
A feature that provides automated live failover protection for
VMs against host, hardware, network, and guest OS issues.
Chapter 2
Table 2-2 Comparison of VMFS Version 5 and Version 6
VMFS Features and Version 5 Versio
Functionalities n6
Access for ESXi hosts Version 6.5 Yes Yes
and later
Access for ESXi hosts Version 6.0 Yes No
and earlier
Datastores per host 512 512
512n storage devices Yes Yes
(def
ault)
Table 2-4 Comparison of NFS Version 3 and Version 4.1 Support for
vSphere Features and Solutions
NFS Features Ver Version 4.1
and sion
Functionalities 3
vMotion and Y Yes
Storage e
vMotion s
High Y Yes
Availability e
(HA) s
Fault Y Yes (Supports the new FT mechanism introduced in
Tolerance e vSphere 6.0 that supports up to four vCPUs, not the
(FT) s legacy FT mechanism.)
Distributed Y
Resource e
Scheduler s
(DRS)
Host Profiles Y
e
s
Storage DRS Y
25% reservation
50% reservation
75% reservation
Thick provisioning
Chapter 3
Table 3-2 Advantages and Disadvantages of IP Hash NIC Teaming
Guest OS
Virtual function (VF) driver in guest OS
Chapter 5
Table 5-2 Virtual Machine Files
Description
Virtual machine configuration file
Additional virtual machine configuration file
Virtual disk characteristics (metadata) file
Virtual disk data file (commonly called a flat file)
Virtual machine BIOS or UEFI configuration file
Virtual machine snapshot file
Virtual machine snapshot data file
Encrypti
on
Options
Power
Manage
ment
Chapter 6
Table 6-2 Required Permissions for the vCenter Cloud Account
Object Permissions
Datastore
Datastore cluster
Folder
Global
Network
Content library
Add library item
Download files
Read storage
Type introspection
Update files
Update library
vApp
Import
Add or remove
Remove disk
Advanced
Change resource
Memory
Rename
Set annotation
Settings
Swapfile placement
Revert to snapshot
Table 6-3 Required vCenter Server Privileges for Horizon (without instant
clones)
Privilege Group Privileges to
Enable
Folder
Datastore
Virtual Machine
Chapter 7
Table 7-2 Core Identity Services in vSphere
Se Description
rvi
ce
Serves as an identity source that handles SAML certificate
management for authentication with vCenter Single Sign-On.
Virtual Machine.Provisioning.Deploy
Template
Datastore.Allocate Space
Network.Assign Network
Virtual Machine.Snapshot
Management.Create Snapshot
Datastore.Allocate Space
Virtual Machine.Inventory.Move
Virtual Machine.Interaction.Answer
Question
Virtual Machine.Interaction.Device
Connection
Virtual Machine.Interaction.Power On
Virtual Machine.Interaction.Reset
Virtual Machine.Interaction.Configure CD
Media
Virtual Machine.Interaction.Configure
Floppy Media
Datastore.Browse Datastore
Datastore.Browse Datastore
Datastore.Allocate Space
Host.Inventory.Modify. cluster
Chapter 8
Table 8-2 Information Required for ESXi Installation
Information Required or Optional De
tail
s
Keyboard layout Required
VLAN ID Optional
IP address Optional
Subnet mask Optional
VMwareCertified
VMwareAccepted
PartnerSupported
Machine
vpxd
vpxd-
extension
vsphere-
webclient
VMFS-L ESX-OSData
USB VMFS-L
Local VMFS
Chapter 9
Table 9-2 VLAN ID Details
VLA VLAN Description
N ID Tagging
Mode
The virtual switch does not pass traffic associated
with a VLAN.
The virtual switch tags traffic with the entered tag.
Virtual machines handle VLANs. The virtual switch
passes traffic from any VLAN.
Enhanced LACP support for vDS supports the following load-balancing
modes (hashing algorithms):
Destination IP address
Chapter 10
Table 10-4 Performance Chart Types
Ch Description Example
art
Ty
pe
L Displays metrics for a For example, Aa network chart for a host can
Upgrade ESXi to
the latest version.
Enable CPU-
saving features
such as TCP
segmentation
offload, large
memory pages,
and jumbo
frames.
Increase the
amount of
memory allocated
to the virtual
machines, which
may improve
cached I/O and
reduce CPU
utilization.
Reduce the
number of virtual
CPUs assigned to
virtual machines.
Compare the
CPU usage of
troubled virtual
machines with
that of other
virtual machines
on the host or in
the resource pool.
(Hint: Use a
stacked graph.)
Increase the
number of hosts
in the DRS
cluster.
Migrate one or
more virtual
machines to other
hosts.
Add physical
memory to the
host.
Guest OS:
Memory
usage is
high.
Virtual
machine:
CPU ready
is low.
Guest OS:
CPU
utilization
is high.
Datastore:
Space
utilization
is high.
Disk:
Device
latency is
greater
than 15
ms.
Disk: The maximum throughput of a storage Migrate the
VMkernel device is not sufficient to meet the virtual machines
latency is demand of the current workload. to datastores
greater backed by storage
than 4 ms. devices (LUNs)
Configure the
queue depth and
cache settings on
the RAID
controllers.
Adjust the
Disk.SchedNumR
eqOutstanding
parameter.
Configure
multipathing.
Increase the
memory size of
the virtual
Ensure that no
virtual machine
swapping or
ballooning is
occurring.
Defragment guest
file systems.
Implement TCP
Segmentation
Offload (TSO)
and jumbo
frames.
Assign additional
physical adapters
as uplinks for the
associated port
groups.
Replace physical
network adapters
with high-
bandwidth
adapters.
Place sets of
virtual machines
that communicate
with each other
regularly on the
same ESXi host.
Performan Some metrics are not available for pre- Upgrade hosts to
ce charts ESXi 5.0 hosts. a later version of
The vCenter Server collects only error entries in its log files.
The vCenter Server collects warning and error entries in its log
files.
Chapter 11
Table 11-2 Network Differences in vSAN and non-vSAN Clusters
Factor vSAN Is vSAN Is Not Enabled
Enabled
Network used by Management network
vSphere HA
Heartbeat Any datastore that is mounted to multiple
datastores hosts in the cluster
Hides storage devices (LUNs) that are used by an RDM on any host
managed by vCenter Server.
Hides storage devices (LUNs) that are ineligible for use as VMFS
datastore extents because of incompatibility with the selected datastore.
Hides LUNs that are not exposed to all hosts that share the original
datastore. Hides LUNs that use a storage type (such as Fibre Channel,
iSCSI, or local) that is different from the original datastore.
Automatically rescans and updates VMFS datastores following
datastore management operations. If you present a new LUN to a host
or a cluster, the hosts automatically perform a rescan, regardless of this
setting.
Table 11-7 SCSI over Fabric and NVMe over Fabric Comparison
Shared Storage Capability SCSI over Fabric NVMe over
Fabric
RDM Supported
Coredump Supported
SCSI-2 reservations Supported
Shared VMDK Supported
Chapter 12
Table 12-2 Sample ESXCLI Commands
Command Description
esxcli system account add Creates an ESXi host local user account
Configures an ESXi host local user account
esxcli system account list Lists ESXi host local user accounts
esxcli system account Deletes an ESXi host local user accounts
remove
Lists the host’s DNS servers
Lists the ESXi host’s physical network
adapters
Displays the shell interactive timeout for
the host
ESXi Shell
(if
enabled)
Chapter 13
Table 13-4 Lifecycle Manager Definitions
Te Definition
r
m
A software release that makes small changes to the current version,
such as vSphere 7.0 Update 1, 7.0 Update 2, and so on.
A software release that introduces major changes to the software. For
example, you can upgrade from vSphere 6.5 to 6.7 and 7.0.
A small software update that provides bug fixes or enhancements to the
current version of the software, such as 7.0a, 7.0 Update 1a, and so on.
The smallest installable software package (metadata and binary
payload) for ESXi.
An XML file that describes the contents of the VIB, including
dependency information, textual descriptions, system requirements,
and information about bulletins.
A VIB that is not included in a component.
The hosted version of updates provided by VMware, OEMs, and third-
1 week
1 year
Chapter 2
Table 2-2 Comparison of VMFS Version 5 and Version 6
VMFS Features and Version 5 Versio
Functionalities n6
Access for ESXi hosts Version 6.5 Yes Yes
and later
Access for ESXi hosts Version 6.0 Yes No
and earlier
Datastores per host 512 512
512n storage devices Yes Yes
(def
ault)
512e storage devices Yes (Not supported on local Yes
512e devices.) (def
ault)
4Kn storage devices No Yes
Automatic space reclamation No Yes
Manual space reclamation through Yes Yes
the esxcli command.
Space reclamation from guest OS Limited Yes
GPT storage device partitioning Yes Yes
MBR storage device partitioning Yes No
Table 2-4 Comparison of NFS Version 3 and Version 4.1 Support for
vSphere Features and Solutions
50% reservation
75% reservation
Thick provisioning
Chapter 3
Table 3-2 Advantages and Disadvantages of IP Hash NIC Teaming
Advantages Disadvantages
A more even distribution of the load Highest resource
compared to Route Based on Originating consumption compared to
Chapter 4
Table 4-4 Resource Pool Use Cases
Use Case Details
Flexible Add, remove, modify, and reorganize resource pools, as
hierarchical needed.
organization
Resource Use resource pools to allocate resources to separate
isolation departments, in such a manner that changes in a pool do
not unfairly impact other departments.
Access Use permissions to delegate activities, such as virtual
control and machine creation and management, to other
delegation administrators.
Separation of In a DRS cluster, perform resource management
resources independently of the actual hosts.
from
hardware
Managing Manage the resources for a group of virtual machines (in
multitier a specific resource pool), which is easier than managing
applications. resources per virtual machine.
Chapter 5
Table 5-2 Virtual Machine Files
File Description
vmname.vmx Virtual machine configuration file
vmname.vmxf Additional virtual machine configuration file
vmname.vmdk Virtual disk characteristics (metadata) file
vmname-flat.vmdk Virtual disk data file (commonly called a flat file)
vmname.nvram or Virtual machine BIOS or UEFI configuration file
nvram
vmname.vmsd Virtual machine snapshot file
vmname.vmsn Virtual machine snapshot data file
vmname.vswp Virtual machine swap file
vmname.vmss Virtual machine suspend file
vmware.log Current virtual machine log file
vmware-#.log Old virtual machine log file, where # is a number
starting with 1
Chapter 6
Table 6-2 Required Permissions for the vCenter Cloud Account
Object Permissions
Datastore
Allocate space
Datastore cluster
Configure a datastore cluster
Folder
Create folder
Delete folder
Global
Manage custom attributes
Network
Assign network
Permissions
Modify permission
Resource
Assign VM to resource pool
Content library
Add library item
Download files
Type introspection
Update files
Update library
Tags
Assign or unassign vSphere tag
vApp
Import
Create new
Move
Console interaction
Device connection
Power off
Power on
Reset
Suspend
Tools install
Add or remove
Clone template
Deploy template
Remove snapshot
Revert to snapshot
Table 6-3 Required vCenter Server Privileges for Horizon (without instant
clones)
Privilege Group Privileges to Enable
Folder
Create Folder
Delete Folder
Advanced
In Interaction:
Power off
Power on
Reset
Suspend
Create new
Remove
In Provisioning:
Customize
Deploy template
Read customization
specifications
Clone template
Chapter 7
Table 7-2 Core Identity Services in vSphere
Service Description
VMware Serves as an identity source that handles SAML certificate
Directory management for authentication with vCenter Single Sign-
Service On.
(vmdir)
VMware Issues certificates for VMware solution users, machine
Certificate certificates for machines on which services are running,
Authority and ESXi host certificates. VMCA can be used as is, or it
(VMCA) can be used as an intermediary certificate authority.
VMware Includes VMware Endpoint Certificate Store (VECS) and
Authenticati several internal authentication services.
on
Framework
Daemon
(VMAFD)
Datastore.Allocate Space
On the network:
Network.Assign Network
Virtual Machine.Provisioning.Deploy
Template
Datastore.Allocate Space
Virtual Machine.Snapshot
Management.Create Snapshot
Datastore.Allocate Space
Virtual Machine.Inventory.Move
Virtual Machine.Interaction.Answer
Question
Virtual Machine.Interaction.Console
Interaction
Virtual Machine.Interaction.Device
Connection
Virtual Machine.Interaction.Power On
Virtual Machine.Interaction.Reset
Virtual Machine.Interaction.Configure CD
Media
Virtual Machine.Interaction.Configure
Floppy Media
Datastore.Browse Datastore
Datastore.Browse Datastore
Datastore.Allocate Space
Host.Inventory.Modify. cluster
Chapter 8
Table 8-2 Information Required for ESXi Installation
Information Required or Optional Details
Keyboard layout Required Default: US English
VLAN ID Optional Range: 0–4094
Default: None
IP address Optional Default: DHCP
Default: None
Migrate existing Required if you are Default: None
ESXi settings; installing ESXi on a drive
preserve VMFS with an existing ESXi
datastore installation
Root password Required Must contain at least 8
to 40 characters and
meet other
requirements
Default: None
VMwareAccepted
PartnerSupported
CommunitySupported
Machine
vpxd
vpxd-extension
vsphere-webclient
Chapter 9
Table 9-2 VLAN ID Details
VLA VLAN Tagging Description
N ID Mode
0 External switch The virtual switch does not pass traffic
tagging (EST) associated with a VLAN.
1 to Virtual switch The virtual switch tags traffic with the entered
409 tagging (VST) tag.
4
409 Virtual guest Virtual machines handle VLANs. The virtual
5 tagging (VGT) switch passes traffic from any VLAN.
Enhanced LACP support for vDS supports the following load-balancing
modes (hashing algorithms):
Destination IP address
Destination IP address and TCP/UDP port
Destination IP address and VLAN
Destination IP address, TCP/UDP port, and VLAN
Destination MAC address
Chapter 10
Table 10-4 Performance Chart Types
Ch Description Example
art
Ty
pe
L Displays metrics for a For example, Aa network chart for a host can
i single inventory contain one line showing the number of
n object, where data for packets received and another line showing
e each metric is the number of packets transmitted.
c represented by a
h separate line.
a
Upgrade ESXi to
the latest version.
Enable CPU-
saving features
such as TCP
segmentation
offload, large
memory pages,
and jumbo
frames.
Increase the
amount of
memory allocated
to the virtual
machines, which
may improve
cached I/O and
reduce CPU
utilization.
Ensure that
VMware Tools is
installed.
Compare the
CPU usage of
troubled virtual
machines with
that of other
virtual machines
on the host or in
the resource pool.
(Hint: Use a
stacked graph.)
Increase the
number of hosts
in the DRS
cluster.
Migrate one or
more virtual
machines to other
hosts.
Add physical
memory to the
host.
Virtual The guest OS is not provided sufficient Increase the
machine: memory by the virtual machine. memory size of
Memory the virtual
usage is machine.
high.
Migrate one or
more virtual
machines (or
virtual disks) to
other datastores.
Configure the
queue depth and
cache settings on
the RAID
controllers.
Adjust the
Disk.SchedNumR
eqOutstanding
parameter.
Configure
multipathing.
Increase the
memory size of
the virtual
machine to
eliminate any
guest OS paging.
Increase the guest
OS caching of
disk I/O.
Ensure that no
virtual machine
swapping or
ballooning is
occurring.
Defragment guest
Implement TCP
Segmentation
Offload (TSO)
and jumbo
frames.
Assign additional
Replace physical
network adapters
with high-
bandwidth
adapters.
Place sets of
virtual machines
that communicate
with each other
regularly on the
same ESXi host.
Performan Some metrics are not available for pre- Upgrade hosts to
ce charts ESXi 5.0 hosts. a later version of
are empty. ESXi.
Data is deleted when you remove
objects to vCenter Server or remove Allow time for
them. data collection on
objects that were
recently added,
Performance chart data for inventory migrated, or
objects that were moved to a new site recovered to the
by VMware vCenter Site Recovery vCenter Server.
Manager is deleted from the old site
and not copied to the new site.
Power on all
hosts and allow
Performance chart data is deleted when time for real-time
you use VMware vMotion across statistics to
vCenter Server instances. collect.
(VMF
S
filter)
config. Hides storage devices (LUNs) that are used by an RDM on any
vpxd.fi host managed by vCenter Server.
lter.rd
mFilter
(RDM
filter)
config. Hides storage devices (LUNs) that are ineligible for use as
vpxd.fi VMFS datastore extents because of incompatibility with the
lter.sa selected datastore. Hides LUNs that are not exposed to all hosts
meHos that share the original datastore. Hides LUNs that use a storage
tsAndT type (such as Fibre Channel, iSCSI, or local) that is different
ranspor from the original datastore.
tsFilter
(Same
Hosts
and
Transp
orts
(Host
Rescan
filter)
Table 11-7 SCSI over Fabric and NVMe over Fabric Comparison
Shared Storage SCSI over NVMe over Fabric
Capability Fabric
RDM Supported Not supported
Coredump Supported Not supported
SCSI-2 reservations Supported Not supported
Shared VMDK Supported Not supported
vVols Supported Not supported
Hardware Supported Not supported
acceleration with
VAAI plug-ins
Default MPP NMP HPP (NVMe-oF targets cannot be
claimed by NMP.)
Limits LUNs=102 Namespaces=32, paths=128
4, (maximum 4 paths per namespace
paths=4096 in a host)
Chapter 12
Table 12-2 Sample ESXCLI Commands
vCloud vCloud
Director Director
(vslauser, if (vslauser, if
available) available)
CIM Users with administrator vCenter vCenter
vCloud vCloud
Director Director
(vslauser, if (vslauser, if
available) available)
DCUI Users with administrator Users defined DCUI service
privileges on the host and in the is stopped
users defined in the DCUI.Access
DCUI.Access advanced advanced
option option
Exception
users with
administrator
privileges on
the host
ESXi Users with administrator Users defined Users defined
Shell privileges on the host in the in the
(if DCUI.Access DCUI.Access
enabl advanced advanced
ed) option option
Exception Exception
users with users with
administrator administrator
privileges on privileges on
the host the host
SSH Users with administrator Users defined Users defined
Exception Exception
users with users with
administrator administrator
privileges on privileges on
the host the host
Chapter 13
Table 13-4 Lifecycle Manager Definitions
Term Definition
Update A software release that makes small changes to the current
version, such as vSphere 7.0 Update 1, 7.0 Update 2, and so
on.
Upgrade A software release that introduces major changes to the
software. For example, you can upgrade from vSphere 6.5 to
6.7 and 7.0.
Patch A small software update that provides bug fixes or
enhancements to the current version of the software, such as
7.0a, 7.0 Update 1a, and so on.
VIB The smallest installable software package (metadata and
(vSphere binary payload) for ESXi.
Installation
Bundle)
VIB An XML file that describes the contents of the VIB,
metadata including dependency information, textual descriptions,
system requirements, and information about bulletins.
Standalone A VIB that is not included in a component.
VIB
Study Planner
Practice Test Reading Review
B
baseline: In vSphere Lifecyle Manager, a set of bulletins.
C
Certificate Manager: A command-line utility that you can use to generate
certificate signing requests (CSRs) and replace certificates for machine and
solution users.
client performance charts: vSphere charts that enable you to view
performance metrics in different ways, depending on the selected object and
metric type.
cluster: A set of ESXi hosts that are intended to work together as a unit.
Common Information Model (CIM): An open standard that defines a
framework for agentless, standards-based monitoring of ESXi host hardware
resources. The framework consists of a CIM broker and a set of CIM
D
data center: A container object in the vSphere inventory that is an
aggregation of all the different types of objects used to work in virtual
infrastructure.
disk group: A group of local disks on an ESXi host that contributes to the
vSAN datastore.
Distributed Resource Scheduler (DRS): A vSphere feature that balances
VM workload in a cluster based on compute usage. It includes live (vMotion)
migrations of VMs, when necessary.
E-F
ESXi base image: The ESXi image that VMware provides with each release
of ESXi, which is a complete set of components that can boot up a server.
ESXTOP: A utility that provides a detailed real-time look at resource usage
from the ESXi Shell.
EtherChannel: A logical channel formed by bundling together two or more
links to aggregate bandwidth and provide redundancy. Other acceptable
names for EtherChannel (an IOS term) are port channel (an NX-OS term) and
link aggregation group (LAG).
G
graphics processing unit (GPU): A specialized processor developed for
H
High-Performance Plug-in (HPP): The default plug-in that claims NVMe-
oF targets.
host profile: A feature that enables you to encapsulate the configuration of
one host and apply it to other hosts.
hybrid cloud: A cloud that is a combination of a private cloud, a public
cloud, and on-premises infrastructure.
I-L
I/O filter: A software component that can be installed on ESXi hosts and can
offer additional data services to virtual machines.
image: In vSphere Lifecyle Manager, a description of which software,
drivers, and firmware to run on a host.
Intel Software Guard Extension (SGX): A processor-specific technology
that enables application developers to protect code and data from disclosure
or modification.
M
managed object browser (MOB): A web-based interface that provides you
with a means to explore the VMkernel object model.
microsegmentation: A type of network segmentation that decreases the level
of risk and increases the security posture of a data center by providing
granular control and distributed stateful firewalling. It effectively allows you
to place a firewall on each VM network connection.
Microsoft virtualization-based security (VBS): A Microsoft feature for
Windows 10 and Windows Server 2016 operating systems that uses hardware
and software virtualization to enhance system security by creating an
isolated, hypervisor-restricted, specialized subsystem.
O
Open Virtual Appliance (OVA) template: A single-file distribution of an
OVF package.
Open Virtual Format (OVF) template: A set of files with the OVF,
VMDK, and MF file extensions
P-Q
PMem device: A non-volatile dual in-line memory module (NVDIMM) on
the ESXi host that resides in a normal memory slot.
port mirroring: A process that allows administrators to duplicate everything
that is happening on one distributed port to then be visible on another
distributed port.
Predictive DRS: A feature that leverages the predictive analytics of vRealize
Operations (vROps) Manager and vSphere DRS to provide workload
balancing prior to the occurrence of resource utilization spikes and resource
contention.
private VLAN (PVLAN): An extension of the VLAN standard that is not
double encapsulated but that allows a VLAN to effectively be subdivided into
other VLANs
Proactive HA: A vSphere feature that minimizes VM downtime by
proactively detecting hardware failures and placing the host in Quarantine
R
raw device mapping (RDM): A mapping file that contains metadata that
resides in a VMFS datastore and acts as a proxy for a physical storage device
(LUN), allowing a virtual machine to access the storage device directly.
resource pool: A container object in the vSphere inventory that is used to
compartmentalize the CPU and memory resources of a host or cluster.
S
Single Root I/O Virtualization (SR-IOV): A feature that allows a single
Peripheral Component Interconnect Express (PCIe) device to appear as
multiple devices to the hypervisor (ESXi) or to a virtual machine’s guest
operating system.
Site Recovery Manager (SRM): A VMware business continuity solution
that you can use to orchestrate planned migrations, test recoveries, and
disaster recoveries.
Skyline: A proactive support technology developed by VMware Global
Services that is available to customers with an active Production Support or
Premier Services agreement.
stateless caching: A type of caching in which Auto Deploy does not store
ESXi configuration or state data within the host. Instead, during subsequent
boots, the host must connect to the Auto Deploy server to retrieve its
configuration.
Storage I/O Control (SIOC): A vSphere feature that allows you to prioritize
storage access during periods of contention, ensuring that the more critical
virtual machines obtain more I/O than less critical VMs.
Storage vMotion: The hot cross-datastore migration of a virtual machine.
V
vApp: A container object in vSphere that provides a format for packaging
and managing applications.
vCenter Converter: A free solution that automates the process of converting
existing Windows and Linux machines into virtual machines running in a
vSphere environment.
vCenter HA: A native high availability solution for vCenter Server
Appliance.
vCenter Single Sign-On (SSO): An authentication broker and security token
exchange infrastructure.
vCenter Single Sign-On Security Token Service (STS): A web service that
issues, validates, and renews security tokens.
VIMTOP: A tool you can run in vCenter Server Appliance to see resource
usage for services that are running.
virtual LAN (VLAN): A logical partition of a physical network at the data
link layer (Layer 2).
Virtual Machine Component Protection (VMCP): A vSphere HA feature
that can detect datastore accessibility issues and provide remediation for
impacted virtual machines.
virtual machine snapshot: A copy that captures the state of a virtual
machine and the data in the virtual machine at a specific point in time.
virtual PMem disk (vPMemDisk): A regular virtual disk that is assigned a
PMem storage policy, which forces it to be placed on a host-local PMem
datastore.
W-Z
witness host: A stretched vSAN component that consists only of metadata
and acts as a tiebreaker.
www.pearsonITcertification.com/title/9780136484264
Coupon Code:
If you wish to use the Windows desktop offline version of the application, simply register your book at
www.pearsonITcertification.com/register, select the Registered Products tab on your account page,
click the Access Bonus Content link, and download and install the software from the companion
website.
This activation code can be used to register your exam in both the online and the offline versions.
Activation Code:
See the card insert in the back of the book for your Pearson Test
Prep activation code and special offers.
1. Go to www.pearsonITcertification.com/register.
2. Enter the print book ISBN: 9780135898192..
3. Answer the security question to validate your purchase.
4. Go to your account page.
5. Click on the Registered Products tab.
6. Under the book listing, click on the Access Bonus Content link.
If you have any issues accessing the companion website, you can
contact our support team by going to http://pearsonitp.echelp.org.