Skip to main content

Posts

Interview Questions on VMware vSphere - PART 1

1. What is a Hypervisor? It is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual machines) cannot disrupt each other. 2. What is the hardware version used in VMware ESXi 5.5? Version 10 Below is the table showing the different version of hardware used in different VMware products along with their release version Virtual Hardware Version Products 10 ESXi 5.5, Fusion 6.x, Workstation 10.x, Player 6.x 9 ESXi 5.1, Fusion 5.x, Workstation 9.x, Player 5.x 8 ESXi 5.0, Fusion 4.x, Workstation 8.x, Player 4.x 7 ESXi/ESX 4.x, Fusion 2.x/3.x Workstation 6.5.x/7.x,Player 3.x 6 Workstation 6.0.x 4 ACE 2.x, ESX 3

VMware: Deploy VMs from Template using PowerCLI

Syntax : 1..<N> | Foreach {  New-VM -vmhost <ESX_HOST> -Name <VM_NAME> -Template <TEMPLATE> -Datastore <DATASTORE> [-OtherOptions]  }  Where: <N> is the number of VMs you need to deploy. <ESX_HOST> is the host where you will deploy your VMs <TEMPLATE> is the template from which your VMs will be created <DATASTORE> is the datastore that will contain your VMs [-OtherOptions] are additional options that can be used in conjunction with New-VM command. As you can see it's really basic, but New-VM cmdlet is really powerful and it has a lot of options. To go through all on New-VM options: Get-Help New-VM -Detailed Here's how I used it today for deploying 6 VMs that will be Oracle RAC nodes. Open a text editor and paste this code in it saving file with .ps1 extension. 1..2 | Foreach {  New-VM -vmhost esx1.testdomain.com -Name RAC$_ -Template OL6 -Datastore datastore1  }  3..4 | Foreach {  New-VM -vmhost esx

Scavenge.exe tool to delete cached content from secondary cache drive

Prerequisites This article assumes that you are familiar with the overall functionality of ARR and know how to deploy and configure ARR with disk cache. If you have not done so already, it is strongly recommended that you review the following walkthrough before proceeding: Configure and enable disk cache in Application Request Routing If Application Request Routing Version 2 has not been installed, you can download it at: Microsoft Application Request Routing Version 2 for IIS 7 (x86)  here . Microsoft Application Request Routing Version 2 for IIS 7 (x64)  here . Follow the steps outlined in  this  document to install ARR Version 2. This walkthrough also assumes that secondary cache drive has been added to ARR for caching. If not, please follow the Configure and Enable Disk Cache in Application Request Routing walkthrough. Scavenge.exe tool in ARR Scavenge.exe is a command line tool that can be used for managing the secondary drive by the administrators. The exe is

Connect to the iSCSI array

Now that you have the initiator software installed, you need to tell it where to look for mountable volumes. Start the initiator configuration by going to the Control Panel and choosing the iSCSI Initiator option. From the initiator, choose the Discovery tab, shown in Figure B. Figure B The iSCSI initiator’s Discovery tab. On the Discovery tab, click the Add button under the Target Portals box. This will open the Add Target Portal dialog box, shown in Figure C. Figure C The Add Target Portal dialog box. In the Add Target Portal dialog box, provide the name or IP address of your iSCSI array. The default communication port for iSCSI traffic is 3260. Unless you have changed your port, leave this as is. If you have configured CHAP security or are using IPSec for communication between your client and the array, click on the Advanced button and make necessary configuration changes. The Advanced Settings dialog box is shown in Figure D. Figure D Advanced options for conn

Linux Configuration

The Linux bonding driver provides a method for aggregating multiple network interfaces into a single logical bonded interface.The behavior of the bonded interfaces depends upon the mode; generally speaking, modes provide either hot standby or load balancing services. Additionally, link integrity monitoring may be performed. You have to install ifenslave, it is a tool to attach and detach slave network interfaces to a bonding device.     sudo apt-get install ifenslave Configuring your network interfaces and modules You need to edit /etc/network/interfaces file and make it looks like     sudo nano /etc/network/interfaces Add the following (This is just example enter you ip details)     # This file describes the network interfaces available on your system     # and how to activate them. For more information, see interfaces(5).     # The loopback network interface     auto lo     iface lo inet loopback     # The primary network interface     auto eth0     iface

New white paper: Windows Storage Server 2008 R2 Architecture and Deployment

A new white paper about Windows Storage Server 2008 R2 Architecture and Deployment (including the Microsoft iSCSI Software Target 3.3) has just been published. Here's an outline of this content:     Introduction     Windows Storage Server 2008 R2 Overview         Comparing Windows Server Operating System Storage Offerings             Comparing Windows Storage Server with Windows Server             Identifying Windows Storage Server Features             What’s New in Windows Storage Server 2008 R2         Comparing Windows Storage Server 2008 R2 with Windows Server 2008 R2         Windows Storage Server 2008 R2 Editions         Identifying Storage Challenges             Identify Scalability Storage Challenges             Identify Availability Storage Challenges             Identify Security Storage Challenges             Identify Manageability Storage Challenges             Identify Data Recovery Storage Challenges         Identifying Windows Stora

Getting WINS-like computer name resolution over VPN in SBS 2008

One of these was something that I used for my convenience over a VPN connection from home. You see, the internal order processing application that I wrote uses some shared folders to store some temporary data, such as e-mails that are generated but not yet released to Exchange, or a local copy of images that are available on the Web site. This software–and our users–are used to referring to Windows file shares as  \\COMPUTER-NAME\SHARE-NAME ; for example,  \\CYRUS\Pickup Holding , because for some reason some of the older servers are named after my boss’s dead cats. When connecting through VPN to SBS 2008, however, that “suffix-less” name resolution was not working. So when  \\CYRUS\Pickup Holding  failed to resolve to anything, \\cyrus.skiviez.com\Pickup Holding  would work fine. This was super annoying. The reason this worked previously with our SBS 2003 installation is that it was acting as a WINS server, which provided this type of computer name resolution for us. SBS 2008

Virtual Server 2005: How To Configure the Virtual DHCP Server

Instead of configuring a virtual machine as a DHCP server, you can use the virtual DHCP server for your virtual network. To configure the virtual DHCP server: 1. Open the  Virtual Server Administration Website . 2. Under  Virtual Networks , select Configure  and then click the virtual network. 3. In  Virtual Network Properties , click  DHCP server . 4. Check the  Enabled  checkbox, then configure the necessary DHCP server options. 5. Click OK.

Microsoft Hyper-V will not boot virtual SCSI devices

“Each IDE controller can have two devices. You can not boot from a SCSI controller. This means an IDE disk will be required. The boot disk will be IDE controller 0 Device 0. If you want a CDROM it will consume an IDE device slot.” Source:   MSDN Blog The hypervisor that runs the virtual BIOS does not support booting from a SCSI controller, today, but it does support the following boot devices: CD IDE Legacy Network Adapter Floppy The root reason is SCSI in a synthetic device and there is no VMBUS until after boot. One might think that this shouldn’t be a problem, after all, the virtual machines can still boot from regular IDE-based virtual disks. So where’s the catch? The main problem is related to the fact that in Virtual Server, virtual SCSI controllers have major performance benefits over virtual IDE controllers. In Virtual Server, it is recommended to attach the Virtual Disks to one or more SCSI controllers to improve disk input/output (I/O) performance. IDE is limited to

Answers to Microsoft Active Directory Interview Questions-2008

 Active Directory enables single sign on to access resources on the network such as desktops, shared files, printers etc. Active Directory provides advanced security for the entire network and network resources.  Active Directory is more scalable and flexible for administration. Functional levels help the coexistence of Active Directory versions such as, Windows NT, Windows 2000 Server, Windows Server 2003 and Windows Server 2008. The functional level of a domain or forest controls which advanced features are available in the domain or forest. Although lowest functional levels help to coexist with legacy Active Directory, it will disable some of the new features of Active Directory. But if you are setting up a new Active Directory environment with latest version of Windows Server and AD, you can set to the highest functional level, thus all the new AD functionality will be enabled. Windows Server 2003 Domain Functional Levels: Windows 2000 mixed (Default), Windows 2000 native, Wind

Remove a LUN from ESX host

ESXi 5.0 To avoid the rather complex set of instructions that you needed to follow in 4.1, VMware introduced new  detach  and  unmount operations to the vSphere UI & the CLI. As per  KB 2004605 , to avoid an APD condition in 5.0, all you need to do now is to  detach  the device from the ESX. This will automatically unmount the VMFS volume first. If there are objects still using the datastore, you will be informed. You no longer have to mess about creating and deleting rules in the PSA to do this safely. The steps now are: Unregister all objects from the datastore including VMs and Templates Ensure that no 3rd party tools are accessing the datastore Ensure that no vSphere features, such as Storage I/O Control or Storage DRS, are using the device Detach the device from the ESX host; this will also initiate an unmount operation Physically unpresent the LUN from the ESX host using the appropriate array tools Rescan the SAN