VCP-DCV For VSphere 8x Cert - Guide - 5th
VCP-DCV For VSphere 8x Cert - Guide - 5th
x Cert Guide
Companion Website and Pearson Test Prep Access Code
Access interactive study tools on this book’s companion website, including practice
test software, review exercises, Key Term flash card application, a study planner, and
more!
To access the companion website, simply follow these steps:
1. Go to www.pearsonitcertification.com/register.
6. Under the book listing, click on the Access Bonus Content link.
When you register your book, your Pearson Test Prep practice test access code will
automatically be populated with the book listing under the Registered Products tab.
You will need this code to access the practice test that comes with this book. You
can redeem the code at PearsonTestPrep.com. Simply choose Pearson IT Certi-
fication as your product group and log into the site with the same credentials you
used to register your book. Click the Activate New Product button and enter the
access code. More detailed instructions on how to redeem your access code for both
the online and desktop versions can be found on the companion website.
If you have any issues accessing the companion website or obtaining your Pearson
Test Prep practice test access code, you can contact our support team by going to
pearsonitp.echelp.org.
This page intentionally left blank
VCP-DCV for vSphere 8.x
Cert Guide
$PrintCode PROOFREADER
Donna E. Mulder
Trademarks TECHNICAL EDITOR
All terms mentioned in this book that are known to be trademarks or service Joseph Cooper
marks have been appropriately capitalized. Pearson IT Certification cannot attest PUBLISHING
to the accuracy of this information. Use of a term in this book should not be COORDINATOR
regarded as affecting the validity of any trademark or service mark. Cindy Teeters
DESIGNER
Warning and Disclaimer
Chuti Prasertsith
Every effort has been made to make this book as complete and as accurate as pos-
COMPOSITOR
sible, but no warranty or fitness is implied. The information provided is on an “as
codeMantra
is” basis. The authors and the publisher shall have neither liability nor responsi-
bility to any person or entity with respect to any loss or damages arising from the
information contained in this book.
Special Sales
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs; and
content particular to your business, training goals, marketing focus, or branding
interests), please contact our corporate sales department at corpsales@pearsoned.
com or (800) 382-3419.
For government sales inquiries, please contact governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact intlcs@pearson.com.
Pearson’s Commitment to Diversity, Equity, and
Inclusion
Pearson is dedicated to creating bias-free content that reflects the diversity of all
learners. We embrace the many dimensions of diversity, including but not limited
to race, ethnicity, gender, socioeconomic status, ability, age, sexual orientation, and
religious or political beliefs.
Education is a powerful force for equity and change in our world. It has the poten-
tial to deliver opportunities that improve lives and enable economic mobility. As we
work with authors to create content for every product and service, we acknowledge
our responsibility to demonstrate inclusivity and incorporate diverse scholarship so
that everyone can achieve their potential through learning. As the world’s leading
learning company, we have a duty to help drive change and live up to our purpose to
help more people create a better life for themselves and to create a better world.
Our ambition is to purposefully contribute to a world where
■ Everyone has an equitable and lifelong opportunity to succeed through
learning
■ Our educational products and services are inclusive and represent the rich
diversity of learners
■ Our educational content accurately reflects the histories and experiences of the
learners we serve
■ Our educational content prompts deeper discussions with learners and moti-
vates them to expand their own learning (and worldview)
While we work hard to present unbiased content, we want to hear from you about
any concerns or needs with this Pearson product so that we can investigate and
address them.
Please contact us with concerns about any potential bias at
https://www.pearson.com/report-bias.html.
Contents at a Glance
Introduction xxvi
PART I: VSPHERE ARCHITECTURE, INTEGRATION, AND REQUIREMENTS
CHAPTER 1 vSphere Overview, Components, and Requirements 3
CHAPTER 2 Storage Infrastructure 31
CHAPTER 3 Network Infrastructure 91
CHAPTER 4 Clusters and High Availability 131
CHAPTER 5 vCenter Server Features and Virtual Machines 167
CHAPTER 6 VMware Product Integration 205
CHAPTER 7 vSphere Security 237
PART II: VSPHERE INSTALLATION/CONFIGURATION
CHAPTER 8 vSphere Installation 287
CHAPTER 9 Configuring and Managing Virtual Networks 331
PART III: VSPHERE MANAGEMENT AND OPTIMIZATION
CHAPTER 10 Managing and Monitoring Clusters and Resources 365
CHAPTER 11 Managing Storage 415
CHAPTER 12 Managing vSphere Security 471
CHAPTER 13 Managing vSphere and vCenter Server 515
CHAPTER 14 Managing Virtual Machines 573
CHAPTER 15 Final Preparation 613
APPENDIX A Answers to the “Do I Know This Already?” Quizzes and
Review Questions 617
Glossary 637
Index 645
ONLINE ELEMENTS:
APPENDIX B Memory Tables
APPENDIX C Memory Table Answers
APPENDIX D Study Planner
Table of Contents
Introduction xxvi
Appendix A Answers to the “Do I Know This Already?” Quizzes and Review
Questions 617
Glossary 637
Index 645
Online Elements:
Dedicated to Madison, Emma, Jaxon, Ethan, Eli, and Robbie, the six wonderful children
to whom I am blessed to be known as “Grampy.” They fill my days with joy and fun,
especially after a hard day of writing or working for their namesake, MEJEER, LLC.
—John Davis
First and foremost, I would like to dedicate this book to my loving wife, Sharyl. Without
your support, I would not be able to commit the time necessary to co-author a book.
Thank you for believing in me and allowing me to have the time for my many
endeavors. I would also like to dedicate this book to my children: Zachary, Brianna,
Eileen, Susan, Keenan, and Maura.
—Steve Baca
Acknowledgments
Thanks to my wife and best friend, Delores, who tolerates my late-night writing,
supports my recent business venture, and makes me happy every day. Thanks to my
parents, Monica and Norman Davis, who provided me with a great education and
taught me the importance of hard work. Thanks to God for placing me in an
environment with unmeasurable blessings and opportunities.
I would like to thank my co-authors and partners, Steve Baca and Owen Thomas.
Thanks to our technical editor, Joe Cooper, for his hard work and dedication.
Special thanks to Nancy Davis (executive editor) and Ellie Bru (development editor)
for coordinating everything and keeping this project moving.
—John Davis
There are so many people to acknowledge and thank for making this book possible.
First, thanks to my wife and family for supporting me while writing this book. I
would also like to thank my co-authors, John Davis and Owen Thomas, who deserve
much of the credit for this book. Thank you to the production team and editors at
Pearson, who do a tremendous amount of work from the initial planning of the book
to the final printing.
—Steve Baca
About the Technical Reviewer
Reader Services
Register your copy of VCP-DCV for vSphere 8.x Cert Guide at
www.pearsonitcertification.com for convenient access to downloads, updates,
and corrections as they become available. To start the registration process, go to
www.pearsonitcertification.com/register and log in or create an account.* Enter the
product ISBN 9780138169886 and click Submit. When the process is complete, you
will find any available bonus content under Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive
discounts on future editions of this product.
Introduction
This book focuses on one major goal: helping you prepare to pass the VMware
vSphere 8.x Professional (2V0-21.23) exam, which is a key requirement for earning
the VCP-DCV 2023 certification. This book may be useful for secondary purposes,
such as learning how to implement, configure, and manage a vSphere environment
or preparing to take other VCP-DCV qualifying exams.
The rest of this introduction provides details on the VCP-DCV certification, the
2V0-21.23 exam, and this book.
VCP-DCV Requirements
The primary objective of the VCP-DCV 2023 certification is to demonstrate that
you have mastered the skills to successfully install, configure, and manage VMware
vSphere 8 environments. You can find the exam requirements, objectives, and other
details on the certification web portal, at http://mylearn.vmware.com/portals/
certification/. On the website, navigate to the Data Center Virtualization track and
to the VCP-DCV certification. Examine the VCP-DCV 2023 requirements based
on your qualifications. For example, if you select that you currently hold no VCP
certifications, then the website indicates that your path to certification is to gain
experience with vSphere 8.0, attend one of the following required training courses,
and pass the Professional vSphere 8.0 (2V0-21.23) exam:
■ VMware vSphere: Install, Configure, Manage [V8]
■ VMware vSphere: Optimize, Scale, and Secure [V8]
■ VMware vSphere: Troubleshooting [V8]
■ VMware vSphere: Fast Track [V8]
If you select that you currently hold a VCP-DCV 2020 or newer certification, the
website indicates that your path includes a recommendation, but not a requirement,
to take a training course.
VMware updates the VCP-DCV certification requirements each year. So, the
requirements for the VCP-DCV 2024 certification may differ slightly from VCP-
DCV 2023 certification. Likewise, VMware updates the qualifying exams. Each
year, as VMware updates the Professional VMware vSphere 8.x exam, the authors of
this book will create an appendix to supplement the original book. To prepare for a
future version of the exam, download the corresponding online appendix from the
book’s companion website and use it to supplement the original book.
Introduction xxvii
After you identify your path to certification, you can select the Professional VMware
vSphere 8.x (2V0-21.23) exam to closely examine its details and to download the
Exam Preparation Guide (also known as the exam blueprint).
■ Objective 5.13: Complete lifecycle activities for VMware vSphere with Tanzu
■ 5.13.1: Update Supervisor cluster
■ 5.13.2: Back up and restore VMware vSphere with Tanzu
Section 6: Troubleshooting and Repairing
■ Objective 6.1: Identify use cases for enabling vSphere Cluster Services (vCLS)
retreat mode
■ Objective 6.2: Differentiate between the main management services in
VMware ESXi and vCenter and their corresponding log files
■ Objective 6.3: Generate a log bundle
NOTE For future exams, download and examine the objectives in the updated exam
blueprint. Be sure to use the future Pearson-provided online appendix specific to the
updated exam.
NOTE Section 3 does not apply to the 2V0-21.23 exam, but it may be used for other
exams.
The book includes many features that provide different ways to study so you can
be ready for the exam. If you understand a topic when you read it but do not study
it any further, you probably will not be ready to pass the exam with confidence.
The features included in this book give you tools that help you determine what you
know, review what you know, better learn what you don’t know, and be well prepared
for the exam. These tools include:
■ “Do I Know This Already?” Quizzes: Each chapter begins with a quiz that
helps you determine the amount of time you need to spend studying that
chapter.
■ Foundation Topics: These are the core sections of each chapter. They explain
the protocols, concepts, and configuration for the topics in that chapter.
■ Exam Preparation Tasks: This section of each chapter lists a series of study
activities that should be done after reading the “Foundation Topics” section.
Each chapter includes the activities that make the most sense for studying the
topics in that chapter. The activities include the following:
■ Key Topics Review: The Key Topic icon appears next to the most
important items in the “Foundation Topics” section of the chapter. The
“Key Topics Review” section lists the key topics from the chapter and
their page numbers. Although the contents of the entire chapter could be
on the exam, you should definitely know the information listed for each
key topic. Review these topics carefully.
■ Memory Tables: To help you exercise your memory and memorize some
important facts, memory tables are provided. The memory tables contain
only portions of key tables provided previously in the chapter, enabling
you to complete the table or list. Appendix B, “Memory Tables,” provides
the incomplete tables, and Appendix C, “Memory Tables Answer Key,”
includes the completed tables (answer keys). These appendixes are also
provided on the companion website that is provided with your book.
■ Define Key Terms: The VCP-DCV exam requires you to learn and
know a lot of related terminology. This section lists some of the most
important terms from the chapter and asks you to write a short definition
and compare your answer to the glossary.
■ Practice Exams: The companion website contains an exam engine.
Book Organization
The chapters in this book are organized such that Chapters 1 through 7 provide in-
depth material on vSphere concepts, and Chapters 8 through 14 describe procedures
xxxvi VCP-DCV for vSphere 8.x Cert Guide
Companion Website
Register this book to get access to the Pearson IT Certification test engine and
other study materials plus additional bonus content. Check this site regularly for
new and updated postings written by the authors that provide further insight into
the more troublesome topics on the exam. Be sure to check the box indicating that
you would like to hear from us to receive updates and exclusive discounts on future
editions of this product or related products.
To access this companion website, follow these steps:
Step 1. Go to www.pearsonITcertification.com/register and log in or create
a new account.
Step 2. Enter the ISBN 9780138169886.
Step 3. Answer the challenge question as proof of purchase.
Step 4. Click on the Access Bonus Content link in the Registered Products
section of your account page to be taken to the page where your
downloadable content is available.
NOTE Keep in mind that many of the companion content files—especially image
and video files—are very large.
If you are unable to locate the files for this title by following these steps, please visit
www.pearsonITcertification.com/contact and select the Site Problems/Comments
option. Our customer service representatives will assist you.
NOTE After you register your book, your code can always be found in your account
under the Registered Products tab.
Once you have the access code, to find instructions about both the PTP web app
and the desktop app, follow these steps:
Step 1. Open this book’s companion website as shown earlier in this Introduction
under the heading, “Companion Website.”
Step 2. Click the Practice Exams button.
Step 3. Follow the instructions listed there for both installing the desktop app
and using the web app.
Note that if you want to use the web app only at this point, just navigate to
pearsontestprep.com, log in using the same credentials used to register your book
or purchase the Premium Edition, and register this book’s practice tests using the
registration code you just found. The process should take only a couple of minutes.
In addition to these three modes, you will be able to select the source of your ques-
tions. You can choose to take exams that cover all of the chapters or you can narrow
your selection to just a single chapter or the chapters that make up specific parts in
the book. All chapters are selected by default. If you want to narrow your focus to
individual chapters, simply deselect all the chapters and then select only those on
which you wish to focus in the Objectives area.
You can also select the exam banks on which to focus. Each exam bank comes com-
plete with a full exam of questions that cover topics in every chapter. You can have
the test engine serve up exams from all test banks or just from one individual bank
by selecting the desired banks in the exam bank area. There are several other cus-
tomizations you can make to your exam from the exam settings screen, such as the
time of the exam, the number of questions served up, whether to randomize ques-
tions and answers, whether to show the number of correct answers for multiple-
answer questions, and whether to serve up only specific types of questions. You can
also create custom test banks by selecting only questions that you have marked or
questions on which you have added notes.
Cover: FrameRatio/Shutterstock
Figure 5-1, Figure 5-2, Figure 5-3, Figure 5-4, Figure 8-1, Figure 10-1, Figure 10-2,
Figure 10-3, Figure 10-4, Figure 13-1, Figure 13-2: VMware, Inc.
This page intentionally left blank
This chapter covers the following topics:
vSphere Overview,
Components, and
Requirements
This chapter introduces vSphere 8.0, describes its major components, and iden-
tifies its requirements.
Table 1-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundations Topics Section Questions Covered in This Section
vSphere Components and Editions 1, 2
vCenter Server Topology 3, 4
Infrastructure Requirements 5, 6
Other Requirements 7, 8
VMware Cloud vs. VMware Virtualization 9, 10
1. You plan to deploy vSphere 8.0 for three ESXi hosts and want to deploy
the minimum vCenter Server edition that supports vMotion. Which
vCenter Server edition do you choose?
a. Essentials
b. Essentials Plus
c. Foundation
d. Standard
4 VCP-DCV for vSphere 8.x Cert Guide
2. You plan to deploy vSphere 8.0 and want to minimize virtual machine down-
time by proactively detecting hardware failures and placing the host in Quar-
antine Mode or Maintenance Mode. Which feature do you need?
a. vSphere High Availability
b. Proactive HA
c. Predictive DRS
d. vCenter HA
4. You plan to deploy another vCenter Server in your vSphere 8.0 environment
and want it to use an existing vSphere Single Sign-On domain. What should
you do?
a. During vCenter Server deployment, join an existing SSO domain.
b. Prior to vCenter Server deployment, deploy an external PSC.
c. During vCenter Server deployment, connect to an external PSC.
d. Configure vCenter HA.
5. You plan to deploy a vCenter Server Appliance 8.0 instance to support 350
ESXi hosts and 4500 virtual machines. Which type of vCenter Server Appli-
ance should you choose?
a. Small Environment
b. Medium Environment
c. Large Environment
d. X-Large Environment
6. You are interested in booting your ESXi hosts using UEFI. Which of the fol-
lowing is a key consideration?
a. After installing ESXi 8.0, you can change the boot type between BIOS
and UEFI by using the direct console user interface.
b. ESXi boot from UEFI is deprecated in ESXi 8.0.
Chapter 1: vSphere Overview, Components, and Requirements 5
c. After installing ESXi 8.0, you can change the boot type between BIOS
and UEFI by using the vSphere Client.
d. After you install ESXi 8.0, changing the boot type between BIOS and
UEFI is not supported.
7. You are planning the backup and recovery for a new vCenter Server Appliance
instance, using the file-based backup feature in the vCenter Server Appliance
Management Interface. Which protocols are supported? (Choose three.)
a. NFS
b. FTP
c. HTTPS
d. FTPS
e. TFTP
8. When you are planning for managing a new vSphere 8.0 environment, which
of the following are supported browsers for the vSphere Client? (Choose
three.)
a. Chrome for Windows users
b. Microsoft Edge for Windows users
c. Safari for Mac users
d. Firefox for Mac users
e. Edge for Mac users
10. You want a simple path to the hybrid cloud that leverages a common infra-
structure and consistent operational model for on-premises and off-premises
data centers. What should you use?
a. Aria Suite
b. VMware Cloud Foundation
c. vCloud Director
d. Cloud Automation
6 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
vSphere Components
Table 1-2 describes the installable VMware products that are the core components
in a vSphere environment.
Many vSphere features, such as those described in Table 1-4, require specific
vSphere configuration, and some require specific licensing, but they do not require
the installation or deployment of additional software or virtual appliances.
Chapter 1: vSphere Overview, Components, and Requirements 7
The add-on products in Table 1-5 are commonly used in a vSphere environment
and are discussed in this book. These products can be sold separately from vSphere.
The vSphere Host Client is a web-based interface provided by each ESXi host. It is
available immediately following the installation of a host. Its primary purpose is to pro-
vide a GUI for configuration, management, and troubleshooting purposes when vCen-
ter Server is not available. For example, during the implementation of a new vSphere
environment, you could use the vSphere Host Client to create virtual machines for
running DNS, Active Directory, and vCenter Server databases prior to deploying
vCenter Server. As another example, you could use the vSphere Host Client to power
down, troubleshoot, reconfigure, and restart the vCenter Server virtual machine.
The HTML5-based vSphere Client is the preferred web-based GUI for managing
vSphere. It is provided by services running in the vCenter Server. The flash-based
vSphere Web Client used in previous vSphere versions has been deprecated and is
no longer available.
You need to obtain vSphere licenses based on the number of CPU sockets and cores
per socket in your ESXi server. Each physical socket consumes 1 CPU license, but
starting with vSphere 7.0, a socket with more than 32 cores consumes 1 additional
CPU license. For example, you can assign 10 vSphere CPU licenses to any of the
following combinations of hosts:
■ Five hosts with 2 CPUs and 32 cores per CPU
■ Five hosts with 1 CPU with 64 cores per CPU
■ Two hosts with 2 CPUs and 48 cores per CPU and two hosts with 1 CPU and
20 cores per CPU
The major editions of vSphere 8.0 are Standard and Enterprise Plus. Table 1-7 lists
some of the features that are provided with each of these editions.
Service Description
tcServer A service that is co-installed with vCenter and is used by web services
such as ICIM/Hardware status, Performance charts, WebAccess, Storage
Policy Based Services, and vCenter Service status.
License Service A service that is used to store the available licenses and manage the
license assignments for the entire vSphere environment.
vCenter Server A service that is installed on an ESXi host when that host is added to
Agent vCenter’s inventory. This service collects, communicates, and runs actions
initiated from the vSphere Client.
Host Agent An administrative agent installed on an ESXi host. Responsible for
collecting, communicating, and running actions initiated from the
vSphere Host Client.
If you upgrade or migrate a vCenter Server deployment that uses an external PSC,
you must converge the PSC into a vCenter Server Appliance instance that you spec-
ify. In domains with multiple vCenter Server instances, you must identify the SSO
replication partner for each subsequent vCenter Server. If you upgrade or migrate
using the GUI-based installer, the wizard prompts you to specify the replication
topology. If you upgrade or migrate using the CLI-based installer, you specify the
replication topology using the JSON templates. During the upgrade or migration
process, the new vCenter Server Appliance 8.0 incorporates the former PSC ser-
vices, enabling you to decommission the original external PSC.
SSO Domain
Figure 1-1 Enhanced Linked Mode with Two vCenter Server Appliance Instances
vCenter HA
A vCenter HA cluster consists of three vCenter Server instances. The first instance,
initially used as the Active node, is cloned twice to a Passive node and to a Witness
node. Together, the three nodes provide an active/passive failover solution.
Deploying each of the nodes on a different ESXi instance protects against hard-
ware failure. Adding the three ESXi hosts to a DRS cluster can further protect your
environment.
When the vCenter HA configuration is complete, only the Active node has an active
management interface (public IP address), as illustrated in Figure 1-2. The three
nodes communicate over a private network called a vCenter HA network that is set
up as part of the configuration. The Active node continuously replicates data to the
Passive node.
All three nodes are necessary for the functioning of this feature. Table 1-9 provides
details for each of the nodes.
Chapter 1: vSphere Overview, Components, and Requirements 13
vSphere
Client
Management Network
vCenter HA Network
Witness
Infrastructure Requirements
This section describes some of the main infrastructure requirements that you should
address prior to implementing vSphere.
14 VCP-DCV for vSphere 8.x Cert Guide
vCenter Server
vCenter Server Appliance 8.0 can be deployed to an ESXi 6.7 or later host that is
managed by a vCenter Server 6.7 or later.
To prepare for deployment of vCenter Server, you should plan to address the com-
pute specifications listed in Table 1-10.
NOTE If you want to have an ESXi host with more than 512 LUNs and 2048 paths,
you should deploy a vCenter Server Appliance instance for a Large Environment or
X-Large Environment component.
ESXi
To install ESXi 8.0, ensure that the hardware system meets the following requirements:
■ A supported system platform, as described in the VMware Compatibility Guide.
■ Two or more CPU cores.
■ A supported 64-bit x86 processor, as described in the VMware Compatibility
Guide.
Chapter 1: vSphere Overview, Components, and Requirements 15
NOTE SATA disks are considered remote, not local. These disks are not used as
scratch partitions by default because they are considered remote. You cannot connect
a SATA CD-ROM device to a virtual machine on an ESXi 8.0 host. To use the SATA
CD-ROM device, you must use IDE Emulation Mode.
In vSphere 8.0, support for legacy BIOS is limited, and booting ESXi hosts from
the Unified Extensible Firmware Interface (UEFI) is recommended. With UEFI,
you can boot systems from hard drives, CD-ROM drives, or USB media. vSphere
Auto Deploy supports network booting and provisioning of ESXi hosts with UEFI.
If your system has supported data processing units (DPUs), you can only use UEFI
to install and boot ESXi on the DPUs. You can boot systems from disks larger than
2 TB if the system firmware add-in card firmware supports it, according to vendor
documentation.
NOTE Changing the host boot type between legacy BIOS and UEFI is not sup-
ported after you install ESXi.
Starting with ESXi 8.0, you can choose to leverage DPUs. In vSphere 8.0, the only
supported DPU devices are NVIDIA BlueField and Pensando Distributed Services
Card (Pensando DSC).
DPUs are the next step in the evolution of SmartNICs, which are available in PCIe
cards that plug into a server. Existing processors such as CPUs and GPUs are not
specifically designed to efficiently handle the moving and processing of data. DPUs
16 VCP-DCV for vSphere 8.x Cert Guide
are designed to process data that x86 CPUs and GPUs can do only inefficiently. A
DPU in vSphere 8 makes it possible to offload infrastructure functions from the
server’s x86 CPU to the DPU. Currently, vSphere supports offloading to DPUs only
if NSX is enabled on the ESXi host. NSX traffic and some common virtual switch
features can be offloaded to a DPU. Virtual machine traffic and some general net-
work traffic management continues to use the x86 CPU.
NSX and infrastructure services, such as storage and local I/O control, can be
offloaded to a DPU. Figure 1-3 shows an instance of ESXi and NSX running
directly on a DPU.
Current NextGen
Computing Platform Computing Platform
x86 x86
General Purpose Computing
General Purpose Computing
ESXi
ESXi
SmartNIC / DPU
NSX Networking and
Infrastructure
Security Programmable
Services
HW Accelerator
NSX on
SD Local I/O ARM
Storage Control
NSX
NSX Networking and
Infrastructure
Security
Services
ESXi
SD Local I/O
Traditional NIC
Storage Control
Storage Requirements
When preparing to implement a vSphere environment, you should ensure that you
have sufficient supported storage resources, as described in this section.
ESXi
For best performance of an ESXi 8.0 installation, use a 32 GB or larger persistent
storage device for boot devices. Upgrading to ESXi 8.0 requires a 8 GB minimum
boot device. When booting from a local disk, SAN, or iSCSI LUN, a 32 GB disk is
required to allow for the creation of the boot partition, boot banks, and a VMFS_L
ESX=OSData volume. The ESX-OSData volume takes on the role of the legacy/
scratch partition, locker partition for VMware Tools, and coredump destination.
NOTE Upgrading to ESXi 8.0 from versions earlier than 7.x repartitions the boot
device and consolidates the original coredump, locker, and scratch partitions into the
ESX-OSData volume, which prevents rollback. If you are concerned about upgrading,
create a backup of the boot device prior to upgrading; if needed, you can restore from
this backup after the upgrade.
The following are additional suggestions for best performance of an ESXi 8.0
installation:
■ A local disk of 128 GB or larger for optimal support of ESX-OSData. This
disk contains the boot partition, the ESX-OSData volume, and a Virtual
Machine File System (VMFS) datastore.
■ A device that supports the minimum of 128 terabytes written (TBW).
■ A device that delivers at least 100 MBps of sequential write speed.
■ To provide resiliency in the event of a device failure, a RAID 1 mirrored device
is recommended.
Network Requirements
This section describes some of the key networking requirements for a successful
vSphere deployment.
18 VCP-DCV for vSphere 8.x Cert Guide
Networking Concepts
In order to prepare for network virtualization in vSphere, you should understand
some of the following concepts:
■ Physical network: This is a network of physical machines that are connected
so that they can send data to and receive data from each other.
■ Virtual network: This is a network of virtual machines running on a physical
machine that are connected logically to each other so that they can send data
to and receive data from each other.
■ Opaque network: This is a network created and managed by a separate entity
outside vSphere. For example, logical networks that are created and managed
by VMware NSX appear in vCenter Server as opaque networks of the type
nsx.LogicalSwitch. You can choose an opaque network as the backing for a
VM network adapter. To manage an opaque network, use the management
tools associated with the opaque network, such as VMware NSX Manager or
the VMware NSX API management tools.
■ vSphere standard switch: This type of virtual switch works much like a phys-
ical Ethernet switch. It detects which virtual machines are logically connected
to each of its virtual ports and uses that information to forward traffic to the
correct virtual machines. A vSphere standard switch can be connected to phys-
ical switches by physical Ethernet adapters, also referred to as uplink adapters.
■ VMkernel TCP/IP networking layer: This layer provides connectivity to
hosts and handles the standard infrastructure traffic of vSphere vMotion,
IP Storage, Fault Tolerance, and vSAN.
Infrastructure Services
In addition to providing the required compute, storage, and network infrastructure,
you should provide supporting infrastructure services, such as Active Directory
(AD), Domain Name System (DNS), Network Time Protocol (NTP), and Key
Management Services (KMS).
AD
In many vSphere environments, vCenter Single Sign-On (SSO) is integrated with
directory services, such as Microsoft Active Directory (AD). SSO can authenticate
users from internal users and groups, and it can connect to trusted external direc-
tory services such as AD. If you plan to leverage AD for an SSO identity source, you
should ensure that the proper network connectivity, service account credentials, and
AD services are available and ready for use.
NOTE If the system you use for your vCenter Server installation belongs to a work-
group rather than a domain, vCenter Server cannot discover all domains and systems
available on the network when using some features.
DNS
You might want to assign static IP addresses and resolvable fully qualified domain
names (FQDNs) to your vSphere components, such as vCenter Server and ESXi
hosts. Before installing these components, you should ensure that the proper
22 VCP-DCV for vSphere 8.x Cert Guide
IP addresses and FQDN entries are registered in your DNS server. You should con-
figure forward and reverse DNS records.
For example, prior to deploying vCenter Server Appliance, you should assign a
static IP address and host name in DNS. The IP must have a valid (internal) domain
name system (DNS) registration. During the vCenter Server installation, you must
provide the fully qualified domain name (FQDN) or a static IP address. VMware
recommends using the FQDN. You should ensure that DNS reverse lookup returns
the appropriate FQDN when queried with the IP address of the vCenter appliance.
Otherwise, the installation of the Web Server component that supports the vSphere
Web client fails.
When you deploy vCenter Server Appliance, the installation of the web server com-
ponent that supports the vSphere Web Client fails if the installer cannot look up the
FQDN for the appliance from its IP address. Reverse lookup is implemented using
PTR records. If you plan to use an FQDN for the appliance system name, you must
verify that the FQDN is resolvable by a DNS server.
Starting with vSphere 6.5, vCenter Server supports mixed IPv4 and IPv6 environments.
If you want to set up vCenter Server Appliance to use an IPv6 address version, use the
FQDN or host name of the appliance.
It is important to ensure that each vSphere Web Client instance and each ESXi host
instance can successfully resolve the vCenter Server FQDN. It is also important to
ensure that the ESXi host management interface has a valid DNS resolution from
the vCenter Server and all vSphere Web Client instances. Finally, it is important to
ensure that the vCenter Server has a valid DNS resolution from all ESXi hosts and
all vSphere Web Clients.
NTP
It is important to provide time synchronization between the nodes. All vCenter
Server instances must be time synchronized. ESXi hosts must be time synchronized
to support features such as vSphere HA. In most environments, you should plan to
use NTP servers for time synchronization. Prior to implementing vSphere, verify
that the NTP servers are running and available.
Be prepared to provide the names or IP addresses for the NTP servers when install-
ing vSphere components such as vCenter Server and ESXi. For example, during the
deployment of vCenter Server Appliance, you can choose to synchronize time with
NTP servers and provide a list of NTP server names or IP addresses, separated by
commas. Alternatively, you can choose to allow the appliance to synchronize time
with the ESXi host.
Chapter 1: vSphere Overview, Components, and Requirements 23
NOTE If a vCenter Server Appliance instance is set for NTP time synchronization,
it ignores its time_tools-sync Boolean parameter. Otherwise, if the parameter is
TRUE, VMware Tools synchronizes the time in the appliance’s guest OS with the
ESXi host.
KMS
In order to leverage virtual machine encryption or vSAN data-at-rest encryption,
you must configure a standard key provider called a Key Management Services
(KMS) server. You can also configure a standard key provider along with a virtual
Trusted Platform Module (vTPM) to meet the TPM 2.0 requirements for Windows
11 VMs. With vCenter Server 8.0, you can configure a standard key provider, which
is called a KMS cluster in vSphere 6.x, to get keys from your KMS. Your KMS
should use Key Management Interoperability Protocol (KMIP) 1.1, and your KMS
vendor must be compatible with vSphere 8.0, per the VMware Compatibility Guide.
Other Requirements
This section describes a few additional requirements for some of the optional com-
ponents (refer to Table 1-3), available vSphere features (refer to Table 1-4), and add-
on products (refer to Table 1-5).
Additional Requirements
The following sections describe some of the requirements for a variety of commonly
used vSphere features.
User Interfaces
The vSphere Host Client and vSphere Client utilize HTML5. The flash-based
vSphere Web Client is not supported in vSphere 7.0 and later. For Windows and
Mac users of vSphere 8.0, VMware supports Microsoft Edge 79 and later, Mozilla
Firefox 60 and later, and Google Chrome 75 and later.
GUI Installer
You can use the GUI installer to interactively install vCenter Server Appliance. To
do so, you must run the GUI deployment from a Windows, Linux, or Mac machine
that is in the network on which you want to deploy the instance.
management cluster) where the vCenter HA nodes live are ESXi 6.0 and vCenter
Server 6.0. Although not required, VMware recommends that you use a minimum
of three ESXi hosts with DRS rules to separate the nodes onto separate hosts. You
must use a vCenter Server Appliance Small or larger deployment size (not Tiny) and
a vCenter Server Standard (not Foundation) license. A single vCenter Server license
is adequate for a single vCenter HA cluster. vCenter HA works with VMFS, NFS,
and vSAN datastores.
You must configure the appropriate virtual switch port groups prior to configuring
vCenter HA. The vCenter HA network connects the Active, Passive, and Witness
nodes, replicates the server state, and monitors heartbeats. The vCenter HA network
must be on a different subnet than the management network, must provide less than
10 ms latency between nodes, and must not use a default gateway. The vCenter HA
and management network IP addresses must be static.
You can use the Set Up vCenter HA wizard in the vSphere Client to configure
vCenter HA. You have the option to perform an automatic configuration or a
manual configuration. The automatic configuration requires a self-managed vCen-
ter Server rather than a vCenter Server that resides in a management cluster that
is managed by another vCenter Server. The automatic configuration automatically
clones the initial (Active node) vCenter Server to create the Witness and Passive
nodes. The manual configuration requires you to clone the Active node yourself but
gives you more control.
When configuration is complete, the vCenter HA cluster has two networks: the
management network on the first virtual NIC and the vCenter HA network on the
second virtual NIC.
SDDC Requirements
In a software-defined data center (SDDC) based on vSphere, ESXi provides the
hypervisor for running the virtual machines, and vCenter Server provides the virtual
infrastructure management.
To build an SDDC, you may plan to implement additional VMware products, such
as vSAN, NSX, and Aria Suite. Chapter 2, “Storage Infrastructure,” provides details
on vSAN, as required in the VCP-DCV exam objectives. Chapter 6, “VMware
Product Integration,” provides high-level information on the other products, whose
details are not explicitly stated in the exam objectives.
vSAN
When preparing to implement vSAN, verify that the ESXi hosts meet the vSAN
hardware requirements. All the devices, drivers, and firmware versions in your
26 VCP-DCV for vSphere 8.x Cert Guide
vSAN configuration must be certified and listed in the vSAN section of the VMware
Compatibility Guide.
You need to prepare a network for vSAN traffic. This is the network in which you will
connect a VMkernel network adapter for each ESXi host. For non-stretched vSAN
clusters, the network should provide a maximum round-trip time (RTT) of 1 ms.
NSX
When preparing to implement NSX, ensure that you address the hardware and net-
work latency requirements.
A typical NSX implementation involves deploying NSX Manager and one or more
NSX Edge instances. The compute and storage sizes of these objects depend on
various factors. You must prepare your environment with the required ESXi version,
compute resources, and storage resources based on your NSX design.
You should ensure that the network latency is no higher than 150 ms RTT for NSX
Manager connections with vCenter Server and ESXi hosts.
NOTE Starting with Version 4.0, VMware NSX-T Data Center is known as VMware
NSX.
Server Virtualization
VMware vSphere is the industry-leading virtualization and cloud platform. It pro-
vides virtualization (abstraction, pooling, and automation) of x86-64 based server
hardware and related infrastructure, such as network switches. It provides live work-
load migrations, high availability, and efficient management at scale in a secured
infrastructure.
VMware SDDC
A software-defined data center (SDDC) is a data center that leverages logical infra-
structure services that are abstracted from the underlying physical infrastructure.
It allows any application to run on a logical platform that is backed by x86-64, any
storage, and any network infrastructure. Pioneered by VMware, a SDDC is the ideal
architecture for private, public, and hybrid clouds. It extends virtualization concepts
to all data center resources and services.
Chapter 1: vSphere Overview, Components, and Requirements 27
VMC on AWS
VMware Cloud (VMC) on AWS is an integrated cloud offering jointly developed
by AWS and VMware that provides a highly scalable, secure service that allows
organizations to seamlessly migrate and extend their on-premises vSphere-based
environments to the AWS cloud. You can use it to deliver a seamless hybrid cloud by
extending your on-premises vSphere environment to the AWS cloud.
Cloud Automation
VMware Cloud Assembly and VMware Service Broker are software as a service
(SaaS) offerings that address similar use cases to the on-premises cases that VMware
Aria Automation addresses.
28 VCP-DCV for vSphere 8.x Cert Guide
2. You are planning to deploy vSphere 8.0. Where should the VMware Directory
Service run?
a. Nowhere as VMware Directory Service is not used
b. In an external PSC
c. Either in an external PSC or in an embedded PSC
d. In vCenter Server
3. You are planning to deploy ESXi in a vSphere 8.0 environment and want to
minimize memory per ESXi host. What is the minimum host memory that
VMware recommends for a production environment?
a. 4 GB
b. 12 GB
c. 16 GB
d. 24 GB
4. You are planning to install vCenter Server 8.0 and want to use the GUI
installer. Which of the following are supported locations from which to run
the installer? (Choose two.)
a. The vSphere Host Client on an ESXi host
b. The vCenter Server Appliance Management Interface
c. Windows
d. Mac
5. Which of the following is the industry’s most advanced hybrid cloud platform?
a. VMware Cloud Assembly
b. VCF
c. VMC on AWS
d. Aria Automation
This chapter covers the following topics:
Storage Infrastructure
This chapter provides details on the storage infrastructure, both physical and
virtual, involved in a vSphere 8.0 environment.
Table 2-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions Covered in This Section
Storage Models and Datastore Types 1, 2
vSAN Concepts 3, 4
vSphere Storage Integration 5, 6
Storage Multipathing and Failover 7
Storage Policies 8, 9
Storage DRS (SDRS) 10
2. You are preparing to implement vSphere with Tanzu. Which type of virtual
disk must you provide for storing logs, emptyDir volumes, and ConfigMaps?
a. Ephemeral storage
b. Container image
c. Persistent volume
d. Non-persistent volume
3. You are planning to implement a vSAN stretched cluster. Which of the follow-
ing statements is true?
a. You should not enable DRS in automatic mode.
b. You should disable HA datastore heartbeats.
c. If PFFT = 1, you may be able to use SMP-FT.
d. If one of the fault domains is inaccessible, you cannot provision virtual
machines.
4. You are planning to implement RAID 6 erasure coding for a virtual disk stored
in a vSAN datastore. What percentage of the total capacity will be usable?
a. 50%
b. 67%
c. 75%
d. 100%
6. You are planning to implement vVols. Which of the following are logical I/O
proxies?
a. Data-vVol instances
b. Storage providers
c. Storage containers
d. Protocol endpoints
Chapter 2: Storage Infrastructure 33
7. You are explaining how vSphere interacts with storage systems. Which of the
following steps may occur when VMware NMP receives an I/O request?
a. The PSP issues the I/O request on the appropriate physical path.
b. The SATP issues the I/O request on the appropriate physical path.
c. The PSP activates the inactive path.
d. The PSP calls the appropriate SATP.
9. You are configuring storage policies for use with your vSAN cluster. Which of
the following is not an available option?
a. Number of Replicas per Object
b. Number of Disk Stripes per Object
c. Primary Level of Failures to Tolerate
d. Secondary Level of Failures to Tolerate
10. You are testing Storage DRS (SDRS) in a scenario where the utilized space on
one datastore is 82% and the utilized space on another datastore is 79%. You
observe that SDRS does not make a migration recommendation. What might
be the reason?
a. The Space Utilization Difference threshold is set too low.
b. The Space Utilization Difference threshold is set too high.
c. The Space Utilization Difference threshold is set to 78%.
d. The Space Utilization Difference threshold is set to 80%.
34 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
VM VM VM VM VM
ESXi Host
Software
iSCS Initiator
SCSI Device
VMFS Datastore
SCSI Fibre iSCSI Network Network
VMDK Channel
HBA HBA HBA Adapter Adapter
SAN LAN
Virtual Disk
Virtual disks are sets of files that reside on a datastore that is deployed on physical
storage. From the standpoint of the virtual machine, each virtual disk appears as if it
were a SCSI drive connected to a SCSI controller. The physical storage is transpar-
ent to the virtual machine guest operating system and applications.
Local Storage
Local storage can be internal hard disks located inside an ESXi host and external
storage systems connected to the host directly through protocols such as SAS or
SATA. Local storage does not require a storage network to communicate with the
host.
Fibre Channel
Fibre Channel (FC) is a storage protocol that a storage area network (SAN) uses to
transfer data traffic from ESXi host servers to shared storage. It packages SCSI com-
mands into FC frames. The ESXi host uses Fibre Channel host bus adapters (HBAs)
to connect to the FC SAN, as illustrated in Figure 2-1. Unless you use directly con-
nected Fibre Channel storage, you need Fibre Channel switches to route storage
traffic. If a host contains FCoE (Fibre Channel over Ethernet) adapters, you can
connect to shared Fibre Channel devices by using an Ethernet network.
iSCSI
Internet SCSI (iSCSI) is a SAN transport that can use Ethernet connections
between ESXi hosts and storage systems. To connect to the storage systems, your
hosts use hardware iSCSI adapters or software iSCSI initiators with standard
network adapters.
With hardware iSCSI HBAs, the host connects to the storage through a hardware
adapter that offloads the iSCSI and network processing. Hardware iSCSI adapters
can be dependent and independent. With software iSCSI adapters, the host uses a
36 VCP-DCV for vSphere 8.x Cert Guide
iSER
In addition to traditional iSCSI, ESXi supports the iSCSI Extensions for RDMA
(iSER) protocol. When the iSER protocol is enabled, the iSCSI framework on the
ESXi host can use the Remote Direct Memory Access (RDMA) transport instead of
TCP/IP. You can configure iSER on your ESXi host. The main use case is when you
want to use a storage protocol that provides reduced latency, CPU load, and TCP/
IP processing compared to iSCSI.
FCoE
If an ESXi host contains FCoE adapters, it can connect to shared Fibre Channel
devices by using an Ethernet network.
NAS/NFS
vSphere uses NFS to store virtual machine files on remote file servers accessed over
a standard TCP/IP network. ESXi 6.0 and later uses Network File System (NFS)
Version 3 or Version 4.1 to communicate with NAS/NFS servers, as illustrated in
Figure 2-1. You can use NFS datastores to store and manage virtual machines in the
same way that you use the VMFS datastores.
VMFS
The datastores that you deploy on block storage devices use the native vSphere Vir-
tual Machine File System (VMFS) format. VMFS is a special high-performance file
system format that is optimized for storing virtual machines.
Virtual
Machine
Opens Reads/Writes
VMFS Mapped
Volume Device
Mapping
File
Address
Resolution
You can envision an RDM as a symbolic link from a VMFS volume to a storage
device. The mapping makes the storage device appear as a file in a VMFS volume.
The virtual machine configuration references the RDM, not the storage device.
RDMs support two compatibility modes:
■ Virtual compatibility mode: The RDM acts much like a virtual disk file,
enabling extra virtual disk features, such as the use of virtual machine snap-
shot and the use of disk modes (dependent, independent—persistent, and
independent—nonpersistent).
■ Physical compatibility mode: The RDM offers direct access to the SCSI
device, supporting applications that require lower-level control.
Virtual disk files are preferred over RDMs for manageability. You should use RDMs
only when necessary. Use cases for RDMs include the following:
■ You plan to install in a virtual machine software that requires features inherent
to the SAN, such as SAN management, storage-based snapshots, or storage-
based replication. The RDM enables the virtual machine to have the required
access to the storage device.
■ You plan to configure Microsoft Cluster Server (MSCS) clustering in a man-
ner that spans physical hosts, such as virtual-to-virtual clusters and physical-
to-virtual clusters. You should configure the data and quorum disks as RDMs
rather than as virtual disk files.
NOTE To support vMotion for NPIV-enabled virtual machines, place the RDM
files, virtual machine configuration file, and other virtual machines in the same datas-
tore. You cannot perform Storage vMotion when NPIV is enabled.
vSAN
vSAN is a layer of distributed software that runs natively on each hypervisor in a
cluster. It aggregates local or direct-attached capacity, creating a single storage pool
shared across all hosts in the vSAN cluster.
vVols
Virtual volumes are encapsulations of virtual machine files, virtual disks, and their
derivatives that are stored natively inside a storage system. You do not provision
virtual volumes directly. Instead, they are automatically created when you create,
clone, or snapshot a virtual machine. Each virtual machine can be associated to one
or more virtual volumes.
The Virtual Volumes (vVols) functionality changes the storage management para-
digm from managing space inside datastores to managing abstract storage objects
handled by storage arrays. With vVols, each virtual machine (rather than a datastore)
is a unit of storage management. You can apply storage policies per virtual machine
rather than per LUN or datastore.
I/O Filters
I/O filters are software components that can be installed on ESXi hosts and can
offer additional data services to virtual machines. Depending on the implementation,
the services might include replication, encryption, caching, and so on.
Datastore Types
In vSphere, you can use the datastore types described in the following sections.
VMFS Datastore
You can create VMFS datastores on Fibre Channel, iSCSI, FCoE, and local storage
devices. ESXi 6.5 and later support VMFS Versions 5 and 6 but not version 3.
Table 2-2 compares the features and functionalities of VMFS Versions 5 and 6.
40 VCP-DCV for vSphere 8.x Cert Guide
When working with VMFS datastores in vSphere 7.0 and later, consider the
following:
■ Datastore extents: A spanned VMFS datastore must use only homogeneous
storage devices—either 512n, 512e, or 4Kn. The spanned datastore cannot
extend over devices of different formats.
■ Block size: The block size on a VMFS datastore defines the maximum file
size and the amount of space a file occupies. VMFS Version 5 and Version 6
datastores support a 1 MB block size.
■ Storage vMotion: Storage vMotion supports migration across VMFS, vSAN,
and vVols datastores. vCenter Server performs compatibility checks to validate
Storage vMotion across different types of datastores.
■ Storage DRS: VMFS Version 5 and Version 6 can coexist in the same
datastore cluster. However, all datastores in the cluster must use homoge-
neous storage devices. Do not mix devices of different formats within the same
datastore cluster.
■ Device Partition Formats: Any new VMFS Version 5 or Version 6 datastore
uses the GUID Partition Table (GPT) to format the storage device, which
means you can create datastores larger than 2 TB. If your VMFS Version 5
datastore has been previously upgraded from VMFS Version 3, it continues to
use the Master Boot Record (MBR) partition format, which is characteristic
for VMFS Version 3. Conversion to GPT happens only after you expand the
datastore to a size larger than 2 TB.
NFS
You can create NFS datastores on NAS devices. ESXi 6.0 and later support NFS
Versions 3 and 4.1, using two different NFS clients. Table 2-3 compares the capa-
bilities of NFS Versions 3 and 4.1.
Table 2-4 compares vSphere 8.0 features and related solutions supported by NFS
Versions 3 and 4.1.
Table 2-4 Comparison of NFS Version 3 and Version 4.1 Support for vSphere Features and
Solutions
NFS Features and Version 3 Version 4.1
Functionalities
vMotion and Storage vMotion Yes Yes
High Availability (HA) Yes Yes
Fault Tolerance (FT) Yes Yes (Supports the new FT mechanism
introduced in vSphere 6.0 that supports up to
four vCPUs, not the legacy FT mechanism.)
Distributed Resource Scheduler Yes Yes
(DRS)
Host Profiles Yes Yes
Storage DRS Yes No
Storage I/O Control Yes No
Site Recovery Manager Yes Yes, but only with vSphere Replication
Virtual Volumes Yes Yes
vSphere Replication Yes Yes
vRealize Operations Manager Yes Yes
Chapter 2: Storage Infrastructure 43
When you upgrade ESXi from a version earlier than 6.5, existing NFS Version 4.1
datastores automatically begin supporting functionalities that were not available in
the previous ESXi release, such as vVols and hardware acceleration. ESXi
does not support automatic datastore conversions from NFS Version 3 to NFS
Version 4.1. You can use Storage vMotion to migrate virtual machines from NFS
Version 3 datastores to NFS Version 4.1 datastores. In some cases, storage vendors
provide conversion methods from NFS Version 3 to Version 4.1. In some cases, you
may be able to unmount an NFS Version 3 datastore from all hosts and remount it
as NFS Version 4.1. The datastore should never be mounted using both protocols at
the same time.
vVols Datastores
You can create a vVols datastore in an environment with a compliant storage system.
A virtual volume, which is created and manipulated out of band by a vSphere APIs
for Storage Awareness (VASA) provider, represents a storage container in vSphere.
The VASA provider maps virtual disk objects and their derivatives, such as clones,
snapshots, and replicas, directly to the virtual volumes on the storage system. ESXi
hosts access virtual volumes through an intermediate point in the data path called
the protocol endpoint. Protocol endpoints serve as gateways for I/O between ESXi
hosts and the storage system, using Fibre Channel, FCoE, iSCSI, or NFS.
vSAN Datastores
You can create a vSAN datastore in a vSAN cluster. vSAN is a hyperconverged
storage solution, which combines storage, compute, and virtualization into a single
physical server or cluster. The vSAN Concepts section describes the concepts, ben-
efits, and terminology associated with vSAN.
that subsequent pods can pull it from the cache rather than from the external
container registry.
Some Kubernetes workloads require persistent storage to store the data indepen-
dently of the pod. Persistent volume objects in vSphere with Tanzu are backed by
the First Class Disks on a datastore. A First Class Disk (FCD), which is also called
an Improved Virtual Disk, is a named virtual disk that is not associated with a VM.
To provide persistent storage, you can use the Workload Management feature in
the vSphere Client to associate one or more storage policies with the appropriate
namespace.
VMware NVMe
Non-Volatile Memory Express (NVMe) storage is a low-latency, low-CPU-usage,
and high-performance alternative to SCSI storage. It is designed for use with faster
storage media equipped with non-volatile memory, such as flash devices. NVMe
storage can be directly attached to a host using a PCIe interface or indirectly
through different fabric transport (NVMe over Fabrics [NVMe-oF]).
In an NVMe storage array, a namespace represents a storage volume. An NVMe
namespace is analogous to a storage device (LUN) in other storage arrays. In the
vSphere Client, an NVMe namespace appears in the list of storage devices. You can
use a device to create a VMFS datastore.
Table 2-6 describes the path selection schemes (PSS) HPP uses when selecting
physical paths for I/O requests.
vSAN Concepts
vSAN virtualizes the local physical storage resources of ESXi hosts by turning them
into pools of storage that can be used by virtual machines, based on their quality of
service requirements. With vSphere 8.0, vSAN Express Storage Architecture (ESA)
is available as an alternative architecture for vSAN. The architecture used in previ-
ous vSAN versions, vSAN Original Storage Architecture (OSA), is still available in
vSphere 8.0.
A two-tiered approach is used in vSAN OSA clusters, where you configure clusters
to use hybrid or all-flash disk groups. Hybrid clusters use flash devices for the cache
layer and magnetic disks for the storage capacity layer. All-flash clusters use flash
devices for both cache and capacity. If a host contributes storage to a vSAN cluster,
then it must contribute at least one device for cache and one for capacity in order
to form a disk group. Each disk group contains a flash cache device and at least one
capacity device. Each host can be configured to use multiple disk groups.
Instead of using disk groups, vSAN ESA clusters use single-tiered storage pools,
with all the participating storage devices in a host used for both caching and capac-
ity. In vSAN ESA, all disks are SSDs or NVMe devices, and they all contribute to
performance and capacity. vSAN ESA removes the concepts of a disk group and
a cache device that existed in the vSAN OSA. Any single device can fail without
impacting the availability of data on any of the other devices in the storage pool.
This design reduces the size of a failure domain. If a host contributes storage to a
vSAN cluster, then it must contribute at least four devices to form a storage pool.
You can enable vSAN on existing host clusters as well as on new clusters. You can
expand a datastore by adding to the cluster hosts with capacity devices or by adding
local drives to the existing hosts in the cluster. vSAN works best when all ESXi hosts
in the cluster are configured similarly, including similar or identical storage configu-
rations. A consistent configuration enables vSAN to balance virtual machine stor-
age components across all devices and hosts in the cluster. Hosts without any local
devices can also participate and run their virtual machines on the vSAN datastore.
These are some of the important benefits of vSAN over traditional SAN:
■ vSAN does not require a dedicated storage network, as is required on an FC
network or a SAN.
■ With vSAN, you do not have to pre-allocate and preconfigure storage volumes
(LUNs).
■ vSAN does not behave like traditional storage volumes based on LUNs or
NFS shares. You do not have to apply standard storage protocols, such as FC,
and you do not need to format the storage directly.
48 VCP-DCV for vSphere 8.x Cert Guide
■ You can deploy, manage, and monitor vSAN by using the vSphere Client
rather than other storage management tools.
■ A vSphere administrator, rather than a storage administrator, can manage a
vSAN environment.
■ When deploying virtual machines, you can use automatically assigned storage
policies with vSAN.
These are some of the important enhancements of vSAN ESA compared to vSAN
OSA:
■ vSAN ESA does not require dedicated cache and capacity devices.
■ It makes it possible to increase the write buffer from 600 GB to 1.6 TB.
■ It provides built-in snapshots with minimal VM impact due to long snapshot
chains and support with VMware VADP.
■ It provides improved erasure coding with space efficiency.
■ It provides improved compression—up to four times better than with vSAN
OSA.
■ It provides HCI mesh support for up to 10 client clusters.
■ It eliminates the complexity of disk groups and their impact related to cache
disk failures and compression.
■ It streamlines vSAN File Service failover.
■ It changes cluster-wide settings in vSAN OSA to per-VM settings.
■ It supports any number of disks defined by the hardware, whereas vSAN OSA
supports a maximum of 40 disks per host.
vSAN Characteristics
vSAN is like network-distributed RAID for local disks, transforming them into
shared storage. vSAN uses copies of VM data, where one copy is local and another
copy is on one of the other nodes in the cluster. The number of copies is configu-
rable. Here are some of the features of vSAN:
■ Shared storage support: VMware features that require shared storage (that is,
HA, vMotion, DRS) are available with vSAN.
■ On-disk format: Highly scalable snapshot and clone management are possible
on a vSAN cluster.
Chapter 2: Storage Infrastructure 49
■ All-flash and hybrid configurations: vSAN OSA can be used on hosts with
all-flash storage or with hybrid storage (that is, a combination of SSDs and tra-
ditional HDDs). While in VSAN Express Storage, all disk are SSDs or NVME
devices.
■ Fault domains: Fault domains can be configured to protect against rack or
chassis failures, preventing all copies of VM disk data from residing on the
same rack or chassis.
■ iSCSI target service: The vSAN datastore can be visible to and usable by
ESXi hosts outside the cluster and by physical bare-metal systems.
■ Stretched cluster: vSAN supports stretching a cluster across physical geo-
graphic locations.
■ Support for Windows Server failover clusters (WSFCs): SCSI-3 Persistent
Reservations (SCSI3-PR) is supported on virtual disks, which are required for
shared disks and WSFCs. Microsoft SQL Server 2012 or later is supported on
vSAN. The following limitations apply:
■ Maximum of 6 application nodes in each vSAN cluster
■ Maximum of 64 shared disks per ESXi host
■ vSAN health service: This service includes health checks for monitoring and
troubleshooting purposes.
■ vSAN performance service: This service includes statistics for monitoring
vSAN performance metrics. This can occur at the level of the cluster, ESXi
host, disk group, disk, or VM.
■ Integration with vSphere storage features: Snapshots, linked clones, and
vSphere Replication are all supported on vSAN datastores.
■ Virtual machine storage policies: Policies can be defined for VMs on vSAN.
If no policies are defined, a default vSAN policy is applied.
■ Rapid provisioning: vSAN enables fast storage provisioning for VM creation
and deployment from templates.
■ Deduplication and compression: Block-level deduplication and compression
are available space-saving mechanisms on vSAN. In vSAN OSA, compression
can be configured at the cluster level and applied to each disk group. In VSAN
ESA, compression can be configured on an individual object.
50 VCP-DCV for vSphere 8.x Cert Guide
■ Data at rest encryption: Data at rest encryption is encryption of data that is not
in transit and on which no processes (for example, deduplication or compression)
are being carried out. If drives are removed, the data on those drives is encrypted.
■ SDK support: vSAN supports an extension (written in Java) of the VMware
vSphere Management SDK. It has libraries, code examples, and documenta-
tion for assistance in automating and troubleshooting vSAN deployments.
vSAN Terminology
You should get familiar with the following terminology.
■ Disk group: In vSAN OSA, a disk group is a group of local disks on an ESXi
host that contribute to the vSAN datastore. It must include one cache device
and from one to seven capacity devices. In a hybrid cluster, a flash disk is the
cache device, and magnetic disks are used as capacity devices. In all-flash clus-
ters, flash storage is used for both cache and capacity devices.
■ Consumed capacity: This is the amount of physical space used up by virtual
machines at any point in time.
■ Object-based storage: Data is stored in vSAN by way of objects, which are
flexible data containers. Objects are logical volumes with data and metadata
spread among nodes in the cluster. Virtual disks are objects, as are snapshots.
For object creation and placement, vSAN takes the following into account:
■ Virtual disk policy and requirements are verified.
■ The number of copies (replicas) is verified; the amount of flash read
cache allocated for replicas, number of stripes for replica, and location are
determined.
■ Policy compliance of virtual disks is ensured.
■ Mirrors and witnesses are placed on different hosts or fault domains.
■ vSAN datastores: Like other datastores, a vSAN datastore appears in the Stor-
age Inventory view in vSphere. A vSAN cluster provides a single datastore for all
the hosts in the cluster, even for hosts that do not contribute storage to vSAN.
An ESXi host can mount VMFS and NFS datastores in addition to the vSAN
datastore. Storage vMotion can be used to migrate VMs between datastore types.
■ Objects and components: vSAN includes the following objects and
components:
■ VM home namespace: The VM home directory where all the VM files
are stored
■ VMDK: Virtual disks for VMs
Chapter 2: Storage Infrastructure 51
on the capacity tier, disk group statistics, CPU load, memory consumption,
and vSAN objects in memory and distributed across the cluster.
■ vSAN Ready Node: This preconfigured deployment is provided by VMware
partners. It is a validated design using certified hardware.
■ User-defined vSAN cluster: This vSAN deployment makes use of your
selected hardware.
NOTE In vSAN OSA, the capacity disks contribute to the advertised datastore
capacity. The flash cache devices are not included as capacity.
Standard Cluster
A standard vSAN cluster, as illustrated in Figure 2-3, consists of a minimum of 3
hosts and a maximum of 64 hosts, typically residing at the same location and con-
nected on the same Layer 2 network. 10 Gbps network connections are required for
all-flash clusters and are recommended for hybrid configurations.
54 VCP-DCV for vSphere 8.x Cert Guide
VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM
vSAN Cluster
ESXi Host ESXi Host ESXi Host
DISK GROUP DISK GROUP DISK GROUP DISK GROUP DISK GROUP DISK GROUP
vSAN Datastore
VM VM VM VM VM VM
vCenter
vSAN Cluster
Server
ESXi Host ESXi Host
Disk Group Disk Group Disk Group Disk Group Witness
Host
vSAN Datastore
Layer 3 Network
Stretched Cluster
You can create a stretched vSAN cluster that spans two geographic sites and contin-
ues to function if a failure or scheduled maintenance occurs at one site. Stretched
clusters, which are typically deployed in metropolitan or campus environments with
short distances between sites, provide an increased level of availability and inter-site
load balancing.
You can use stretched clusters for planned maintenance and disaster avoidance sce-
narios, with both data sites active. If either site fails, vSAN uses the storage on the
other site, and vSphere HA can restart virtual machines on the remaining active site.
You should designate one site as the preferred site; it then becomes the only used
site in the event that network connectivity is lost between the two sites. A vSAN
stretched cluster can tolerate one link failure at a time without data becoming
unavailable. During a site failure or loss of network connection, vSAN automatically
switches to fully functional sites.
NOTE A link failure is a loss of network connection between two sites or between
one site and the witness host.
Each stretched cluster consists of two data sites and one witness host. The witness
host resides at a third site and contains the witness components of virtual machine
objects. It contains only metadata and does not participate in storage operations.
Figure 2-5 shows an example of a stretched cluster, where the witness node resides
at a third site, along with vCenter Server.
Third Site
Witness Host
VM VM VM VM VM VM VM VM VM VM VM VM
The witness host acts as a tiebreaker for decisions regarding availability of datastore
components. The witness host typically forms a vSAN cluster with the preferred
site and forms a cluster with a secondary site if the preferred site becomes isolated.
When the preferred site is online again, data is resynchronized.
A witness host has the following characteristics:
■ It can use low-bandwidth/high-latency links.
■ It cannot run VMs.
■ It can support only one vSAN stretched cluster.
■ It requires a VMkernel adapter enabled for vSAN traffic with connections to
all hosts in the cluster. It can have only one VMkernel adapter dedicated to
vSAN but can have another for management.
■ It must be a standalone host. It cannot be added to any other cluster or moved
in inventory through vCenter Server.
■ It can be a physical ESXi host or a VM-based ESXi host.
Each site in a stretched cluster resides in a separate fault domain. Three default
domains are used: the preferred site, the secondary site, and a witness host.
Beginning with vSAN Version 6.6, you can provide an extra level of local fault pro-
tection for objects in stretched clusters by using the following policy rules:
■ Primary Level of Failures to Tolerate (PFTT): This defines the number of
site failures that a virtual machine object can tolerate. For a stretched cluster,
only a value of 0 or 1 is supported.
■ Secondary Level of Failures to Tolerate (SFTT): This defines the number
of additional host failures that the object can tolerate after the number of site
failures (PFTT) is reached. For example, if PFTT = 1 and SFTT = 2, and one
site is unavailable, then the cluster can tolerate two additional host failures.
The default value is 0, and the maximum value is 3.
■ Data Locality: This enables you to restrict virtual machine objects to a selected
site in the stretched cluster. The default value is None, but you can change it to
Preferred or Secondary. Data Locality is available only if PFTT = 0.
Chapter 2: Storage Infrastructure 57
NOTE If you set SFTT for a stretched cluster, the Fault Tolerance Method rule
applies to the SFTT. The failure tolerance method used for the PFTT is set to RAID 1.
Consider the following guidelines and best practices for stretched clusters:
■ DRS must be enabled on a stretched cluster.
■ You need to create two host groups, two virtual machines groups, and
two VM–Host affinity rules to effectively control the placement of virtual
machines between the preferred and secondary sites.
■ HA must be enabled on the cluster in such a manner that it respects the
VM–Host affinity rules.
■ You need to disable HA datastore heartbeats.
■ On-disk format Version 2.0 or later is required.
■ You need to set Failures to Tolerate to 1.
■ Symmetric Multiprocessing Fault Tolerance (SMP-FT) is supported when
PFFT is set to 0 and Data Locality is set to Preferred or Secondary. SMP-FT
is not supported if PFFT is set to 1.
■ Using esxcli to add or remove hosts is not supported.
■ If one of the three fault domains (preferred site, secondary site, or witness
host) is inaccessible, new VMs can still be provisioned, but they are noncom-
pliant until the partitioned site rejoins the cluster. This implicit forced provi-
sioning is performed only when two of the three fault domains are available.
■ If an entire site goes offline due to loss of power or network connection, you
need to restart the site immediately. Bring all hosts online at approximately the
same time to avoid resynchronizing a large amount of data across the sites.
■ If a host is permanently unavailable, you need to remove the host from the
cluster before performing any reconfiguration tasks.
■ To deploy witnesses for multiple clusters, you should not clone a virtual
machine that is already configured as a witness. Instead, you can first deploy a
VM from OVF, then clone the VM, and then configure each clone as a witness
host for a different cluster.
■ The vSAN network requires connectivity across all three sites, using a Layer 2
stretched network between the two data sites and a Layer 3 network between
the data sites and the witness host.
■ The virtual machine network requires connectivity between the data sites but
not the witness host. You can use a Layer 2 stretched network or Layer 3 net-
work between the data sites. A VM does not require a new IP address follow-
ing failover to the other site.
■ The vMotion network requires connectivity between the data sites but not the
witness host. You can use a Layer 2 stretched or a Layer 3 network between
data sites.
vSAN Limitations
Limitations of vSAN include the following:
■ No support for hosts participating in multiple vSAN clusters
■ No support for vSphere DPM and storage I/O control
■ No support for SE sparse disks
■ No support for RDM, VMFS, diagnostic partition, and other device access
features
SCSI UNMAP
SCSI UNMAP commands, which are supported in vSAN Version 6.7 Update 1 and
later, enable you to reclaim storage space that is mapped to deleted vSAN objects.
vSAN supports the SCSI UNMAP commands issued in a guest operating system
Chapter 2: Storage Infrastructure 59
to reclaim storage space. vSAN supports offline unmaps as well as inline unmaps.
On Linux, offline unmaps are performed with the fstrim(8) command, and inline
unmaps are performed when the mount -o discard command is used. On Windows,
NTFS performs inline unmaps by default.
NOTE Deduplication and compression may not be effective for encrypted VMs.
RAID 5 or RAID 6 erasure coding requires less storage space to protect your data
than RAID 1 mirroring. For example, if you protect a VM by setting PFTT to 1,
RAID 1 requires twice the virtual disk size, and RAID 5 requires 1.33 times the vir-
tual disk size. Table 2-7 compares RAID 1 with RAID 5/6 for a 100 GB virtual disk.
Before configuring RAID 5 or RAID 6 erasure coding in a vSAN OSA cluster, you
should consider the following:
■ All-flash disk groups are required.
■ On-disk format Version 3.0 or later is required.
■ A valid license supporting RAID 5/6 is required.
■ You can enable deduplication and compression on the vSAN cluster to achieve
additional space savings.
■ PFTT must be set to less than 3.
■ An enhancement in vSAN ESA over vSAN OSA is the ability to deliver RAID
5/6 space efficiency with the performance of RAID 1. Whereas vSAN OSA
uses a 3+1 scheme (3 data bits plus 1 parity bit) for RAID 5, vSAN ESA offers
a 4+1 scheme and a 2+1 scheme and automatically selects the best scheme,
based on the number of hosts in the cluster. In clusters with six or more hosts,
vSAN ESA could leverage the 4+1 scheme to use just 125 GB disk space to
store 100 GB user data, whereas vSAN OSA with RAID 5 would use 133 GB.
In clusters with just three hosts, vSAN ESA could leverage the 2+1 scheme
to use just 150 GB disk space to store 100 GB user data, whereas vSAN OSA
with RAID 1 would use 200 GB.
Chapter 2: Storage Infrastructure 61
vSAN Encryption
You can encrypt data in transit in a vSAN cluster, which means you encrypt data as
it moves between hosts. At the same time, you can encrypt data at rest in a vSAN
datastore to protect data on storage devices in the event that they are removed from
the cluster. Encryption occurs after all other processing, such as deduplication, is
performed. All files are encrypted, so all virtual machines and their data are pro-
tected. Only administrators with encryption privileges can perform encryption and
decryption tasks.
vSAN encryption requires an external key management server (KMS), the vCenter
Server system, and ESXi hosts. vCenter Server requests encryption keys from an
external KMS. The KMS generates and stores the keys, and vCenter Server obtains
the key IDs from the KMS and distributes them to the ESXi hosts. vCenter Server
does not store the KMS keys but keeps a list of key IDs.
vSAN uses encryption keys in the following manner:
■ vCenter Server requests an AES-256 key encryption key (KEK) from the
KMS.
■ vCenter Server stores only the ID of the KEK (and not the key itself).
■ The host encrypts disk data by using the industry-standard AES-256 XTS
mode.
■ Each disk has a unique, randomly generated data encryption key (DEK).
■ A host key is used to encrypt core dumps, not data. All hosts in the same
cluster use the same host key.
■ When collecting support bundles, a random key is generated to re-encrypt the
core dumps. You can specify a password to encrypt the random key.
NOTE Each ESXi host uses the KEK to encrypt its DEKs and stores the encrypted
DEKs on disk. The host does not store the KEK on disk. If a host reboots, it requests
the KEK with the corresponding ID from the KMS. The host can then decrypt its
DEKs as needed.
SPBM and on a per-share basis. vSAN File Service creates a single vDFS for the
cluster and places a file service virtual machine (FSVM) on each host. The FSVMs
manage file shares and act as NFS file servers using IP addresses from a static IP
address pool.
Clients
Clients
Appliance Appliance
VMs VMs
vSAN Cluster
ESXi
Hosts
ESXi Nodes
vCenter Server
vSAN Requirements
Prior to deploying a vSAN cluster, you should address the requirements outlined in
the following sections.
When selecting devices to use for vSAN cache hardware (such as PCIe vs. SDD
flash devices), in addition to cost, compatibility, performance, and capacity, you
should consider write endurance.
When selecting storage controllers for use in a vSAN cluster, in addition to com-
patibility, you should favor adapters with higher queue depth to facilitate vSAN
rebuilding operations. You should configure controllers for passthrough mode rather
than RAID 0 mode to simplify configuration and maintenance. You should disable
caching on the controller or set it to 100% read.
When sizing hosts, consider using at least 32 GB memory for full vSAN OSA
operations based on five disk groups per host and seven capacity devices per disk group.
Say that you have a vSAN cluster where you plan to place four hosts per rack. In
order to tolerate an entire rack failure, you need to create a fault domain for each
rack. To support PFTT = 1, you need to use a minimum of 12 hosts deployed to 3
racks. To support Full Data Migration Mode and the ability to again protect after a
failure, deploy a minimum of 16 hosts to 4 racks. If you want Primary Level of Fail-
ures to Tolerate set to 2, you need to configure 5 fault domains in the cluster.
When working with fault domains, you should consider the following best practices:
■ At a minimum, configure three fault domains in a vSAN cluster. For best
results, configure four or more fault domains.
■ Each host that is not directly added to a fault domain should reside in its own
single-host fault domain.
■ You can add any number of hosts to a fault domain. Each fault domain must
contain at least one host.
■ If you use fault domains, consider creating equal-sized fault domains (with the
same number of same-sized hosts).
Hardware Requirements
You should examine the vSAN section of the VMware Compatibility Guide to
verify that all the storage devices, drivers, and firmware versions are certified for the
specific vSAN version you plan to use. For vSAN ESA, each storage pool must have
at least four NVMe TLC devices, which are used for both capacity and cache.
Table 2-8 lists some of the vSAN OSA storage device requirements.
Component Requirements
Storage One SAS or SATA host bus adapter (HBA) or a RAID controller that is in
controllers passthrough mode or RAID 0 mode is required.
If the same storage controller is backing both vSAN and non-vSAN disks,
you should apply the following VMware recommendations to avoid issues:
■ Do not mix the controller mode for vSAN and non-vSAN disks. If the
vSAN disks are in RAID mode, the non-vSAN disks should also be in
RAID mode.
■ If VMFS is used on the non-vSAN disks, then use the VMFS datastore
only for scratch, logging, and core dumps.
■ Do not run virtual machines from a disk or RAID group that shares its
controller with vSAN disks or RAID groups.
■ Do not pass through non-vSAN disks to virtual machine guests as
RDMs.
The memory requirements for vSAN OSA depend on the number of disk groups
and devices that the ESXi hypervisor must manage. According to VMware Knowl-
edge Base (KB) article 2113954, the following formula can be used to calculate
vSAN memory consumption in vSAN 7.0.
vSANFootprint = HOST_FOOTPRINT + NumDiskGroups ×
DiskGroupFootprint
where:
DiskGroupFootprint = DISKGROUP_FIXED_FOOTPRINT +
DISKGROUP_SCALABLE_FOOTPRINT + CacheSize × CACHE_DISK_
FOOTPRINT + NumCapacityDisks × CAPACITY_DISK_FOOTPRINT
For vSAN ESA, each host must have at least 512 GB memory, but the minimum
required for your environment depends on the number of devices in the host’s stor-
age pool.
The ESXi Installer creates a coredump partition on the boot device, and the default
size of this partition is typically adequate. If ESXi host memory is 512 GB or less,
you can boot the host from a USB, SD, or SATADOM device. When you boot
a vSAN host from a USB device or SD card, the size of the boot device must be
at least 4 GB. If ESXi host memory is more than 512 GB, consider the following
guidelines:
■ You can boot the host from a SATADOM or disk device with a size of at least
16 GB. When you use a SATADOM device, use a single-level cell (SLC) device.
■ If you are using vSAN Version 6.5 or later, you must resize the coredump
partition on ESXi hosts to boot from USB/SD devices.
Chapter 2: Storage Infrastructure 67
Cluster Requirements
You should verify that a host cluster contains a minimum of three hosts that con-
tribute capacity to the cluster. A two-host vSAN cluster consists of two data hosts
and an external witness host. It is important to ensure that each host that resides in a
vSAN cluster does not participate in other clusters.
Software Requirements
For full vSAN OSA capabilities, the participating hosts must be Version 7.0
Update 1, which supports all on-disk formats. For vSAN ESA, ESXi 8.x is required.
Following a vSAN upgrade, if you keep the current on-disk format version, you
cannot use many of the new features.
Network Requirements
You should ensure that the network infrastructure and configuration support vSAN,
as described in Table 2-9.
License Requirements
You should ensure that you have a valid vSAN license that supports your required
features. If you do not need advanced or enterprise features, a standard license is
sufficient. An advanced (or enterprise) license is required for advanced features such
68 VCP-DCV for vSphere 8.x Cert Guide
vSAN Policies
Storage policies are used in vSAN to define storage requirements for virtual
machines. These policies determine how to provision and allocate storage objects
within the datastore to guarantee the required level of service. You should assign
at least one storage policy to each virtual machine in a vSAN datastore. Otherwise,
vSAN assigns a default policy with PFTT set to 1, a single disk stripe per object, and
a thin-provisioned virtual disks.
Storage policies, including those specific to vSAN, are covered later in this chapter.
VASA
Storage vendors or VMware can make use of VASA. Storage providers (VASA pro-
viders) are software components that integrate with vSphere to provide information
about the physical storage capabilities. Storage providers are utilized by either ESXi
hosts or vCenter to gather information about the storage configuration and status
and display it to administrators in the vSphere Client. There are several types of
storage providers:
■ Persistent storage providers: These storage providers manage storage arrays
and handle abstraction of the physical storage. vVols and vSAN use persistent
storage providers.
■ Data storage providers: This type of provider is used for host-based caching,
compression, and encryption.
■ Built-in storage providers: These storage providers are offered by VMware
and usually do not require registration. Examples of these are vSAN and I/O
filters included in ESXi installations.
■ Third-party storage providers: If a third party is offering a storage provider,
it must be registered.
The information that storage providers offer may include the following:
■ Storage data services and capabilities (which are referenced when defining a
storage policy)
■ Storage status, including alarms and events
■ Storage DRS information
70 VCP-DCV for vSphere 8.x Cert Guide
Unless the storage provider is VMware, the vendor must provide the storage
provider. There are other requirements related to implementing storage providers
as well:
■ Contact your storage vendor for information about deploying the storage
provider and ensure that it is deployed correctly.
■ Ensure that the storage provider is compatible by verifying it with the VMware
Compatibility Guide.
■ Do not install the VASA provider on the same system as vCenter.
■ Upgrade storage providers to new versions to make use of new functionalities.
■ Unregister and reregister a storage provider when upgrading.
NOTE If vSAN is being used, service providers are registered automatically and
cannot be manually registered.
VAAI
VAAI, also known as hardware acceleration or hardware offload APIs, enable ESXi
hosts to be able to communicate with storage arrays. They use functions called stor-
age primitives, which allow offloading of storage operations to the storage array
itself. The goal is to reduce overhead and increase performance. This allows storage
to be responsible for cloning operations and zeroing out disk files. Without VAAI
hardware offloading, the VMkernel Data Mover service is used to copy data from
the source datastore to the destination datastore, incurring physical network laten-
cies and increasing overhead. The VMkernel always attempts to offload to the stor-
age array by way of VAAI, but if the offload fails, it employs its Data Mover service.
Storage primitives were introduced in vSphere 4.1 and applied to Fibre Channel,
iSCSI, and FCoE storage only. vSphere 5.0 added primitives for NAS storage and
vSphere thin provisioning. The storage primitives discussed in the following sec-
tions are available in vSphere 8.0.
Chapter 2: Storage Infrastructure 71
■ XCOPY (Extended Copy): This option allows the VMkernel to offload clon-
ing or Storage vMotion migrations to the storage array, avoiding use of the
VMkernel Data Mover service.
■ Write Same (Zero): This option is used with eager zeroed thick-provisioned
virtual disks to allow the storage device to write the zeros for the disk. This
reduces overhead on the ESXi host in terms of CPU time, DMA buffers,
and use of the device queue. You use this option whenever you clone a virtual
machine with eager zeroed thick-provisioned disks, whenever a thin-
provisioned disk expands, or when lazy zeroed thick disks need to be zeroed
out (at first write).
■ Extended Statistics: This option allows an ESXi host to get insight into space
utilization on a NAS device. For example, when a NAS device is using thin
provisioning without the Extended Statistics primitive, the ESXi host lacks
visibility into the actual storage usage, leading you to run out of space.
■ Reserve Space: This option allows thick provisioning of virtual disks on NAS
datastores. Prior to this primitive, only thin provisioning could be used on
NAS storage devices.
VM VM VM
Profile Profile Profile
Data Path
VASA
Storage
Virtual Datastores Provider
Protocol Protocol
Endpoint Endpoint
Snapshot
Deduplication
Published
Capabilities
With recent versions of VASA and vSphere, several new features were added, as
shown in Table 2-10.
vSphere 8.0 adds NVMe-oF support for vSphere virtual volumes as part of the
VMware-I/O Vendor Program (IOVP) NVMe-FC certification program.
Multipathing Overview
Multipathing is used for performance and failover. ESXi hosts can balance the
storage workload across multiple paths for improved performance. In the event of
a path, adapter, or storage processor failure, the ESXi host fails over to an alternate
path.
76 VCP-DCV for vSphere 8.x Cert Guide
During path failover, virtual machine I/O can be delayed for a maximum of
60 seconds. Active/passive type arrays can experience longer delays than active/
active arrays. vSphere supports several types of failover:
■ Fibre Channel failover: For multipathing, hosts should have at least two
HBAs in addition to redundant Fibre Channel switches (the switch fabric) and
redundant storage processors. If a host has two HBAs, attached to two Fibre
Channel switches, connected to two storage processors, then the datastores
attached to the SAN can withstand the loss of any single storage processor,
Fibre Channel switch, or HBA.
■ Host-based failover with iSCSI: As with Fibre Channel failover, with host-
based failover with iSCSI, hosts should have at least two hardware iSCSI
initiators or two NIC ports used with the software iSCSI initiator. This is in
addition to at least two physical switches and at least two storage processors.
■ Array-based failover with iSCSI: On some storage systems, the storage
device abstracts the physical ports from the ESXi hosts, and the ESXi hosts see
only a single virtual port. The storage system uses this abstraction for load bal-
ancing and path failover. If the physical port where the ESXi host is attached
should be disconnected, the ESXi host automatically attempts to reconnect to
the virtual port, and the storage device redirects it to an available port.
■ Path failover and virtual machines: When a path failover occurs, disk I/O
could pause for 30 to 60 seconds. During this time, viewing storage in the
vSphere client or virtual machines may appear stalled until the I/O fails over
to the new path. In some cases, Windows VMs could fail if the failover is tak-
ing too long. VMware recommends increasing the disk timeout inside the
guest operating system registry to at least 60 seconds to prevent this.
VMkernel
Pluggable Storage Architecture (PSA)
VMware NMP
VMware NMP supports all storage arrays listed on the VMware storage HCL and
provides a default path selection algorithm based on the array type. It associates a
set of physical paths with a specific storage device (LUN). NMP uses submodules,
called Storage Array Type Plug-ins (SATPs) and Path Selection Plug-ins (PSPs).
NMP performs the following operations:
■ Manages physical path claiming and unclaiming
■ Registers and unregisters logical devices
■ Maps physical paths with logical devices
■ Supports path failure detection and remediation
■ Processes I/O requests to logical devices:
■ Selects an optimal physical path
■ Performs actions necessary to handle path failures and I/O command
retries
■ Supports management tasks, such as resetting logical devices
Each SATP performs the array-specific operations required to detect path state and
to activate an inactive path. This allows the NMP module to work with multiple
storage arrays without being aware of the storage device specifics.
NMP determines which SATP to use for a specific storage device and maps the
SATP with the storage device’s physical paths. The SATP implements the following
tasks:
■ Monitors the health of each physical path
■ Reports changes in the state of each physical path
■ Performs array-specific actions necessary for storage failover (For example, for
active/passive devices, it activates passive paths.)
NOTE You do not need to obtain or download any SATPs. ESXi automatically
installs an appropriate SATP for any array you use. Beginning with vSphere 6.5
Update 2, VMW_SATP_LOCAL provides multipathing support for the local devices,
except the devices in 4K native format. You are no longer required to use other
SATPs to claim multiple paths to the local devices.
PSA Summary
To summarize, the PSA performs the following tasks:
■ Loads and unloads multipathing plug-ins
■ Hides virtual machine specifics from a particular plug-in
■ Routes I/O requests for a specific logical device to the MPP managing that
device
■ Handles I/O queueing to the logical devices
■ Implements logical device bandwidth sharing between virtual machines
80 VCP-DCV for vSphere 8.x Cert Guide
The following process occurs when VMware NMP receives an I/O request for one
of its managed storage devices:
Step 1. The NMP calls the appropriate PSP.
Step 2. The PSP selects an appropriate physical path.
Step 3. The NMP issues the I/O request on the selected path.
Step 4. If the I/O operation is successful, the NMP reports its completion.
Step 5. If the I/O operation reports an error, the NMP calls the appropriate
SATP.
Step 6. The SATP interprets the errors and, when appropriate, activates the inac-
tive paths.
Step 7. The PSP selects a new path for the I/O.
When coordinating the VMware native modules and any installed third-party
MPPs, the PSA performs the following tasks:
■ Loads and unloads MPPs
■ Hides virtual machine specifics from MPPs
■ Routes I/O requests for a specific logical device to the appropriate MPP
■ Handles I/O queuing to the logical devices
■ Shares logical device bandwidth between virtual machines
■ Handles I/O queuing to the physical storage HBAs
Storage Policies
Storage policies can be used to define which datastores to use when placing virtual
machine disks. The following storage policies can be created:
■ VM storage policies for host-based data services: These policies are rules
for services that are offered by the ESXi hosts, such as encryption.
■ VM storage policies for vVols: These policies allow you to set rules for
VMs that apply to vVols datastores. This can include storage devices that
are replicated for disaster recovery purposes or have specific performance
characteristics.
Chapter 2: Storage Infrastructure 81
■ VM storage policies for tag-based placement: You can create custom poli-
cies for VMs and custom tags for storage devices. This is helpful for storage
arrays that do not support VASA and whose storage characteristics are not
visible to the vSphere client. For example, you could create a tag named Gold
and use it to identify your best-performing storage.
Policy Description
Disable Object Checksum A checksum is used end-to-end in validating the integrity of the data
to ensure that data copies are the same as the original. In the event of
a mismatch, incorrect data is overwritten. If this policy is set to yes, a
checksum is not calculated. The default setting for this policy is no.
IOPS Limit for Object This policy sets a limit for IOPS of an object. If set to 0, there is no limit.
SDRS Recommendations
For datastore clusters, where SDRS automation is set to No Automation (manual
mode), SDRS makes as many recommendations as necessary to enforce SDRS
rules, balance the space, and balance the I/O resources of the datastore cluster.
Chapter 2: Storage Infrastructure 85
Each recommendation includes the virtual machine name, the virtual disk name, the
datastore cluster name, the source datastore, the destination datastore, and a reason
for the recommendation.
SDRS makes mandatory recommendations when the datastore is out of space, when
anti-affinity or affinity rules are being violated, or when the datastore is entering
maintenance mode. SDRS makes optional recommendations when a datastore is
close to running out of space or when adjustments should be made for space and I/O
load balancing.
SDRS considers moving powered-on and powered-off virtual machines for space
balancing. Storage DRS considers moving powered-off virtual machines with snap-
shots for space balancing.
Anti-affinity Rules
To ensure that a set of virtual machines are stored on separate datastores, you can
create anti-affinity rules for the virtual machines. Alternatively, you can use an affin-
ity rule to place a group of virtual machines on the same datastore.
By default, all virtual disks belonging to the same virtual machine are placed on the
same datastore. If you want to separate the virtual disks of a specific virtual machine
on separate datastores, you can do so with an anti-affinity rule.
Review Questions
1. You are deploying datastores in a vSphere environment and want to use the
latest VMFS version that supports ESXi 6.5 and later. Which version should
you use?
a. VMFS Version 3
b. VMFS Version 4
c. VMFS Version 5
d. VMFS Version 6
3. You want to integrate vSphere with your storage system. Which of the
following provides software components that integrate with vSphere to
provide information about the physical storage capabilities?
a. VASA
b. VAAI
c. SATP
d. NMP
4. Which of the following is the default path selection policy for most active/
passive storage devices?
a. VMW_PSP_MRU
b. VMW_PSP_FIXED
c. VMW_PSP_RR
d. VMW_PSP_AP
Chapter 2: Storage Infrastructure 89
Network Infrastructure
This chapter provides details for the network infrastructure, both physical and
virtual, involved in a vSphere 8 environment.
2. You are configuring teaming policies in your vSphere 8.0 environment. Which
of the following teaming options is not available for a vSS?
a. Route Based on Originating Virtual Port
b. Route Based on Physical NIC Load
c. Route Based on Source MAC Hash
d. Use Explicit Failover Order
4. Using NIOC, you reserved 1.0 Gbps for virtual machine system traffic on a
distributed switch with eight 10 Gbps uplinks. If you reserve 512 Mbps for
a network resource pool, what is the maximum reservation you can set in
another network resource pool?
a. 0.5 Gbps
b. 1.0 Gbps
c. 7.5 Gbps
d. 79.6 Gbps
5. You want to tag voice over IP data in your vSphere environment. Which step
should you take?
a. Use a vSS
b. Implement a filtering rule
c. Implement a rule with Action = Tag
d. Navigate to Menu > Tags and Custom Attributes
6. You want to leverage LAGs with your vDS. Which of the following is
supported?
a. iSCSI software port binding
b. Nested ESXi
c. Multiple LAGs on a single vDS
d. Multiple LAGs on a single vSS
Chapter 3: Network Infrastructure 93
7. You want to enable a vDS health check for virtual switch teaming. Which of
the following is a requirement?
a. At least two active NICs and two hosts
b. At least one active NIC from each of two hosts
c. At least two active NICs from at least one host
d. At least one active NIC from one host
8. You want to be able to use the vSphere Client to identify the non-Cisco physi-
cal switch connected to a virtual switch uplink. Which of the following should
you implement?
a. A vSS with LLDP
b. A vSS with CDP
c. A vDS with LLDP
d. A vDS with CDP
9. You want to use DirectPath I/O in your vSphere 8.0 environment. Which of
the following features is supported?
a. The virtual machine running in a vSphere cluster
b. Hot adding virtual devices
c. Snapshots
d. Fault tolerance
10. You want to create a custom TCP/IP stack for your ESXi 8.0 server. Which
one of the following is an available service that you can directly enable for the
stack?
a. vSphere Replication NFC
b. NFS
c. vSphere HA heartbeat
d. iSCSI
94 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
Virtual NICs
Much as a physical server may have multiple NICs to connect to physical networks,
a virtual machine may have multiple virtual NICs (vNICs) to connect to virtual net-
works. Much like a physical NIC, each vNIC has a unique MAC address. The vNIC
appears as a traditional NIC to a virtual machine’s guest OS. The guest OS can
assign IP addresses to vNICs.
In addition to requiring network connectivity for virtual machine networking, ESXi
requires network connectivity for host management activities and other purposes.
To accommodate this need, you should configure one or more VMkernel virtual
network adapters on each host. For example, when connecting the vCenter Server
or the vSphere Host Client to an ESXi host, you provide the address (IP address
or fully qualified host name) of a VMkernel virtual network adapter that is enabled
for management traffic. Much as a virtual machine can use multiple virtual network
adapters, each ESXi host may use multiple VMkernel network adapters.
Each virtual switch has many virtual ports. You can configure port groups (standard
port groups) on a vSS. You can configure ports (distributed ports) and port groups
(distributed port groups) on a vDS.
VLANs
A virtual LAN (VLAN) is a logical partition of a physical network at the data link
layer (Layer 2). A VLAN is typically associated with a broadcast domain and is
used to isolate the traffic from other networks. A broadcast domain is a collection
of network devices that can receive traffic destined to a broadcast address. A physi-
cal switch, by default, adheres to this behavior. With VLAN technology, the switch
allows a single physical network to be divided into multiple network segments. This
is achieved by modifying a unique header of the Ethernet frame and adding a tag to
identify the membership within a specific VLAN. A VLAN can be used to subdivide
a broadcast domain to limit the number of network devices that can communicate
when a broadcast packet is sent.
For example, say that your organization uses separate VLANs for production traf-
fic (VLAN 101), test/development traffic (VLAN 102), QA traffic (VLAN 103), IP
storage traffic (VLAN 300), vMotion traffic (VLAN 310), and management traffic
(VLAN 500). You want a virtual machine running Wireshark to be able to receive all
virtual machine traffic and management traffic but not IP storage or vMotion traffic.
You can configure the distributed port group to use VLAN trunking range 101 to
103,500. Or, if you wanted to only exclude vMotion and IP storage traffic, you can
define the range 1 to 103,500 to 4094.
ESXi
Management vMotion
Traffic Traffic VM VM
vNIC (vmk0) vNIC (vmk1) vNIC vNIC
Physical Switch
Each virtual machine typically has one or more vNICs to allow network com-
munication. To connect a virtual machine to a vSS, you should connect one of its
vNICs to a virtual machine port group on the vSS. To allow the virtual machines to
communicate with virtual machines on other hosts, connect the port group to one
or more physical NIC uplinks in the vSS. The physical NIC should be connected
to a physical Ethernet switch. The inbound and outbound Ethernet frames travel
through the physical NIC uplink on the vSS. Virtual machines in a port group that
do not have a physical NIC uplink can only communicate with other vNICs on the
same host and port group.
The vSS provides features such as VLAN tagging, NIC teaming, network security
policies, and traffic shaping. The feature set provided by a vSS is smaller than the
feature set provided by a vDS or a physical Ethernet switch. The vDS feature set is
covered later in this chapter, along with a comparison of vSS and vDS.
A vSS does not have some of the vulnerabilities of a physical switch. For example, it
is not susceptible to MAC address flooding attacks because it does not use observed
data to populate its MAC address table. The following list contains other common
network vulnerabilities and brief explanations about why a vSS is safe from each of
them:
■ 802.1q tagging attacks: A vSS does not perform the dynamic trunking
required for this type of attack.
100 VCP-DCV for vSphere 8.x Cert Guide
MTU
The standard size for Ethernet packets, or frames, is 1500 bytes. Using larger
(jumbo) frames can provide better utilization of a fast network link. To allow jumbo
frames on a vSS or vDS, you must set the virtual switch’s Maximum Transmission
Unit (MTU) setting to a value larger than 1500 bytes, such as 9000 bytes. To use
jumbo frames, you must configure the network to support it end to end, including
physical NICs and physical switches. To allow a virtual machine to use jumbo
frames, you must configure the virtual machine to use the VMXNET3 virtual net-
work adapter. (E1000 and E1000E adapters do not support jumbo frames.) You must
also enable jumbo frames inside the guest operating system. To allow VMkernel
services such as IP-based storage, vMotion, fault tolerance, and VSAN to use jumbo
frames, you must set the MTU setting for the VMkernel network adapter to a value
greater than 1500 bytes.
Failure to properly configure MTU to support jumbo frames end to end typically
results in poor network performance. With a vDS, you can enable a health check
to warn of mismatched configuration between the vDS and the physical network
hardware.
You can set the policies directly on a vSS. To override a policy at the port group
level, just set a different policy on the port group.
A vDS supports additional policies. See the “vDS Network Policies” section, later in
this chapter, for details.
■ Use Explicit Failover Order: When this option is chosen, all outbound traffic
uses the first uplink that appears in the active uplinks list. If the first uplink
fails, the switch redirects traffic from the failed uplink to the second uplink in
the list.
The vDS has additional teaming options that are addressed later in this chapter.
NOTE For each of these methods, the virtual switch does not consider the virtual
machine’s active workload in the load-balancing decision making. A vDS offers a
load-based NIC teaming option that is addressed later in this chapter.
Table 3-2 lists some advantages and disadvantages for selecting Route Based on
IP Hash.
A guest OS can send frames with an impersonated source MAC address, which facil-
itates impersonation and malicious attacks. To guard against this risk, you can lever-
age security policies on vSS port groups and vDS distributed port groups. There are
three available options for the network security policies:
■ Promiscuous Mode: For a vSS port group, the default value is Reject. By
default, the vNIC receives only those frames that match the effective MAC
address. If this option is set to Accept, the virtual switch sends all frames on
the wire to the vNIC, allowing virtual machines to receive packets that are not
destined for them. This setting allows the use of tools such as tcpdump and
Wireshark inside a guest operating system.
■ MAC Address Changes: For a vSS port group, the default value is Accept.
By default, ESXi accepts the effective MAC address change. If this option is
set to Reject, the behavior changes such that ESXi does not honor requests to
change the effective MAC address to an address that is different from the ini-
tial MAC address. Instead, it disables the virtual switch port until the effective
MAC address matches the initial MAC address. The guest OS is unaware that
the request was not honored.
■ Forged Transmits: For a vSS port group, the default value is Accept. By
default, ESXi does not compare source and effective MAC addresses and does
not drop the packet due to a mismatch. If this option is set to Reject, ESXi
compares the source and effective MAC addresses and drops the packet if the
addresses do not match.
NOTE In a vDS, the default value for each of these three security options is Reject.
■ Peak Bandwidth: This is the allowed maximum number of kilobits per second
of traffic through a port when it is sending or receiving a burst of traffic. This
number tops the bandwidth that a port uses when it is using its burst bonus
that is configured using the Burst Size parameter. The Peak Bandwidth setting
cannot be smaller than the Average Bandwidth setting.
■ Burst Size: This is the maximum number of kilobytes to allow in a burst. If
this parameter is set, a port might gain a burst bonus when it does not use all
its allocated bandwidth. You can define an average bandwidth allotment for the
virtual machines connected to a port group. If the virtual machines have not
used the allotted bandwidth, the system may grant a burst bonus, allowing the
virtual machines to send some data, limited by the burst size, at a faster rate
(up to the peak bandwidth).
VLAN Policies
You can apply a VLAN policy to a vSS, such that all port groups on the vSS are asso-
ciated with a single VLAN. Optionally, you can override the VLAN setting per port
group, such that all the virtual machines in the port group are associated with the
same VLAN. A major use case for multiple virtual machine port groups is to provide
a simple means to place different sets of virtual machines onto separate VLANs.
In this case, you should apply a unique VLAN policy to each virtual machine port
group.
VLANs are described in the “VLANs” section of this chapter.
Management
vMotion VM Network
Network
vSphere Distributed Switch
Uplink Port Group
Management Management
vMotion VM Network vMotion VM Network
Network Network
Host Proxy Switch Host Proxy Switch
Physical Network
physical network. When you change settings that involve uplink port groups (such
as NIC teaming settings), the settings are automatically applied to each host and the
appropriate NICs.
automatically propagate to each distributed port. At the distributed port level, you
can override policies applied to the distributed port group and apply unique poli-
cies to a distributed port. Likewise, you can apply policies to uplink port groups and
override the policies at the uplink port level.
At the distributed port group level, you can control which network policies can be
overridden at the distributed port group level. For example, if you configure the
distributed port group to allow VLAN policy override at the port level, you can set a
VLAN ID directly on a distributed port. Otherwise, you cannot.
As with a vSS, you can apply the following network policies for vDS:
■ Teaming and Failover
■ Security
■ Traffic Shaping
■ VLAN
As mentioned earlier, you can apply these policies at the distributed port group and
distributed port levels.
With a vDS, you can apply the following additional policies, which are addressed in
upcoming sections in this chapter:
■ Monitoring
■ Traffic Filtering and Marking
■ Resources Allocation
■ Port Blocking
Compared to a vSS, a vDS provides additional teaming and failover options, which
are addressed in the “Load-Based NIC Teaming” and “LACP Support” sections in
this chapter. Compared to a vSS, a vDS provides additional traffic shaping options,
which are addressed in the “Inbound Traffic Shaping” section in this chapter.
Port-Blocking Policies
When needed, you can block traffic to specific distributed ports. For example, if a
virtual machine is broadcasting a lot of traffic due to a broken or hacked application
and starts consuming a large portion of the network bandwidth, you may want to
temporarily block traffic to its distributed port. This is particularly useful if you are a
network administrator who has permission to modify the vDS but do not have per-
mission to modify the virtual machine.
As with other policies, to allow individual port blocking, you first need to allow port
blocking policy override on the distributed port group. Optionally, you can block all
ports in a port group.
shares, reservations, and limit settings for each network port. The vDS recognizes
the following network traffic types: management, Fault Tolerance, NFS, vSAN,
vMotion, vSphere Replication, vSphere Data Protection Backup, NVMe over TCP,
and virtual machine traffic. With default settings, NIOC does not directly limit or
guarantee network bandwidth to any system traffic type. In other words, the reser-
vation for each traffic type is 0, and the limit is set to unlimited. By default, NIOC
provides a higher relative priority to virtual machine traffic, and this priority is
applied during periods of network contention. In other words, there are twice as
many default virtual machine traffic shares (100) as there are shares for the other
types of system traffic (50).
You can change the limit for any system traffic type to reflect the maximum band-
width (in Mbps or Gbps) that the traffic type can consume on a single physical NIC.
You can change the reservation for any system traffic type to establish a specific
bandwidth (in Mbps) that the traffic type is guaranteed on a single physical NIC.
This bandwidth cannot exceed 75% of the bandwidth of the lowest-capacity NIC
that is servicing the traffic type. If you reserve resources for virtual machine traffic,
you can use network resource pools to delegate the reserved resources.
VM VM VM VM VM
Distributed Switch
VM Traffic System
Reservation = 2 Gbps
Host 1 Host 2
The actual limit and reservation applied to a virtual network adapter may be
impacted by a distributed port group’s traffic shaping policy. For example, if a
vNIC’s limit is set to 300 Mbps, and the average bandwidth and peak bandwidth
applied by traffic shaping are 200 Mbps, then the effective limit becomes 200 Mbps.
To meet the network guarantees (reservation) for a virtual machine, vSphere
implements admission control at the host and cluster levels, based on bandwidth
reservation and teaming policy. A distributed switch applies bandwidth admission
control by using NIOC to verify the following:
■ A physical adapter is available that can supply the guaranteed bandwidth to the
VM network adapters.
■ The virtual network adapter’s reservation is less than the free quota in the
network resource pool.
With NIOC Version 3, a vSphere DRS cluster places the virtual machine on a host
that can fulfill the reserved bandwidth for the virtual machine, according to the
active teaming policy. In the following situations, vSphere DRS migrates a virtual
machine to another host to satisfy the virtual machine’s bandwidth reservation:
■ The reservation is changed to a value that the initial host can no longer satisfy.
■ A physical adapter that carries traffic from the virtual machine is offline.
Chapter 3: Network Infrastructure 111
A marking policy allows you to mark traffic with a priority tag that is used during
times of contention on a physical switch. In essence, it allows you to apply a tag to
the Ethernet header or IP header as the Ethernet frame enters and exits your vir-
tual switch. You can mark the traffic with a Class of Service (CoS) tag in a Layer 2
Ethernet header. Or you could mark the traffic with a Differentiated Service Code
Point (DSCP) tag in a Layer 3 IP header. Higher tagged packets move to the front
of the queue on a physical Ethernet switch during times of contention, and lower or
untagged packets are sent using best-effort service.
With a vDS, you can apply filters on data traveling between the vNIC and the
distributed port and between the uplink port and the physical NIC. These are the
major steps in the process:
Step 1. Enable traffic filtering and marking on the distributed port group or
uplink port group.
Step 2. Mark traffic on the distributed port group or uplink port group.
Step 3. Configure filters on the distributed port group or uplink port group.
Step 4. Define traffic rules for the distributed port group or uplink port group.
When marking traffic, you can create a rule in which you configure qualifiers to
identify the data to be tagged and set Action to Tag. You can use system traffic quali-
fiers (such as NFS), MAC traffic qualifiers (to match by MAC address and VLAN
ID), and IP traffic qualifiers (to match by IP version and IP address).
For example, to mark voice over IP (VoIP) traffic whose source IP is 192.168.2.0,
you can create a rule that specifies the following parameters:
■ Action: Tag
■ DSCP Value: 26
■ Traffic Direction: Egress
■ Traffic Qualifiers: IP Qualifier
■ Protocol: UDP
■ Destination Port: 5060
■ Source Address: IP address matches 192.168.2.0 with prefix length 24
Private VLANs
Private VLANs (PVLANs) are an extension of the VLAN standard that is not
double encapsulated but that allows a VLAN to effectively be subdivided into other
VLANs. This is useful for a hosting provider that has run out of VLANs or in any
environment where 4094 VLANs are not enough.
A VLAN that is to be subdivided becomes known as the primary private VLAN.
This primary PVLAN is then carved up into one or multiple secondary PVLANs
that exist only within the primary. When a virtual machine or VMkernel port sends a
packet, that packet is tagged at the distributed port group level on the vDS. Because
this is not double encapsulation, packets travel with only one VLAN tag at a time.
However, physical switches could be confused by seeing MAC addresses tagged with
more than one VLAN tag, unless the physical switches are PVLAN aware and have
their PVLAN tables configured appropriately. If the physical network is configured
correctly, it identifies that the secondary PVLAN exists as part of the primary.
There are three different types of secondary PVLANs:
■ Promiscuous: Nodes in a promiscuous secondary PVLAN can communicate
with other nodes in the same PVLAN and all nodes in any secondary
(community or isolated) PVLANs in the same primary PVLAN.
■ Community: Nodes in a community secondary PVLAN can communicate
with other nodes in the same PVLAN and nodes in a promiscuous secondary
PVLAN in the same primary PVLAN. Nodes in a community secondary
PVLAN cannot communicate with nodes in other community or isolated
secondary PVLANs.
■ Isolated: Nodes in an isolated secondary PVLAN can communicate
with nodes in a promiscuous secondary PVLAN in the same primary PVLAN.
Nodes in an isolated secondary PVLAN cannot communicate with other
nodes in the same PVLAN or with nodes in other community or isolated
secondary PVLANs.
■ Migrate virtual machines and VMkernel virtual network adapters to the vDS
■ Monitor alerts, tasks, and events
■ Monitor port state
■ Manage network resources
In vSphere 8.0, the following features are not supported by a DPU-backed vDS:
■ Network I/O control
■ Traffic-shaping policies
■ DV filter
■ Network resource pools
A vDS is required to use vDSE. A DPU-backed vDS with ESXi supports the
following modes:
■ Non-offloading mode before NSX is enabled: If NSX is not enabled, the
DPU is used as a traditional NIC, and no offloading is supported.
■ Offloading mode after NSX is enabled: If NSX 4.0.1.1 is enabled, certain
networking and NSX features are offloaded to the DPU.
With NSX 4.0.1.1, the following NSX capabilities are supported and will be handled
by the DPU:
■ Networking:
■ Geneve overlay and VLAN-based segments
■ Distributed IPv4 and IPv6 routing
■ NIC teaming across the SmartNIC/DPU ports
One use case for vDSE is to offload to the DPU the encapsulation and decapsulation
of Geneve packets for NSX networking and processing of NSX security.
statistics associated with the original port are not carried with the virtual machine.
The virtual machine is subject to the policies associated with the destination port
group and virtual switch.
Port Mirroring
Port mirroring allows administrators to duplicate everything that is happening on
one distributed port to then be visible on another distributed port. With port mir-
roring, you can do granular per-port network analysis by gathering the entire traffic
stream coming into and going out a monitored port. To get started, you create a port
mirroring session in which you identify the session type, session properties, traffic
source, and destination.
For the session type, you can specify one of the following options:
■ Distributed Port Monitoring: Mirrors packets from a set of distributed ports
to other distributed port groups.
■ Remote Mirroring Source: Mirrors packets from a set of distributed ports to
specific uplinks.
■ Remote Mirroring Destination: Mirrors packets from a set of VLANs to
distributed ports.
■ Encapsulated Remote Mirroring (L3) Source: Mirrors packets from a set of
distributed ports to the IP address of a remote agent.
The session properties are dependent on the session type and include the following
settings:
■ Name: Uniquely identifies the session.
■ Status: Enables or disables the session.
■ Description: Describes the session.
■ Sampling Rate: Sets the rate at which packets are sampled.
■ Normal I/O on Destination Ports: Available only for distributed port and
uplink destinations. You can disable this option to allow mirrored traffic out on
destination ports but disallow mirrored traffic in on destination ports.
■ Mirrored Packet Length: Limits the size of mirrored frames.
■ Traffic Source: Identifies the source of the traffic.
NOTE Having an available ephemeral port group is useful in cases where vCenter
Server is down and you need to assign a virtual machine to a port group. For example,
if a vCenter Server Appliance (VCSA) device is connected to a distributed port group
with static binding, you may fail to reconnect the VCSA device to the network after
restoring the VCSA device because vCenter is required to assign the port. In this case,
you should be successful in connecting the restored VCSA device to the ephemeral
distributed port group because the ESXi host will assign the port.
You can control the number of ports and the port allocation in a distributed port
group. The port allocation can be elastic or fixed:
■ Elastic: By default, ports in the port group are created and removed on
demand. For example, if the port group is configured for eight ports and
elastic port allocation, you can connect nine vNICs to the port group because
when you connect the eighth vNIC to the port group, eight more ports are
automatically added.
■ Fixed: The number of ports in the port group is static. Ports are not automati-
cally created or removed. For example, if the port group is configured for eight
ports and fixed port allocation, you cannot connect nine vNICs to the port
group. When you attempt to connect the ninth vNIC to the port group, you
get the error “no free port is available.”
In vSphere 8.0, the default settings for a distributed port group are static binding,
elastic port allocation, and eight ports.
In the past, the ephemeral setting seemed like the easiest way to go because it
required the least administrative effort to address an ever-growing environment.
That changed in vSphere 5.1, when static port binding became “elastic” by default.
118 VCP-DCV for vSphere 8.x Cert Guide
LACP Support
In vSphere 8.0, a vDS supports LACP. This means you can connect ESXi hosts to
physical switches by using dynamic link aggregation. You can create multiple link
aggregation groups (LAGs) on a distributed switch to aggregate the bandwidth of
physical NICs on ESXi hosts that are connected to LACP port channels. This enables
you to increase the network bandwidth, redundancy, and load balancing to the port
groups. You need to configure each LAG with two or more ports and connect physical
NICs to the ports. Within a LAG, the ports are teamed, such that the network traffic
is load balanced between the ports using an LACP hashing algorithm.
For each LAG on a vDS, a LAG object is created on each associated host proxy switch.
The same number of ports that you assign to the LAG on the vDS are assigned to the
corresponding LAG on the proxy switch on each host, as illustrated in Figure 3-4.
Management
vMotion VM Network
Network
vSphere Distributed Switch
LAG1 Uplink Port Group
Management Management
vMotion VM Network vMotion VM Network
Network Network
Host Proxy Switch Host Proxy Switch
Physical Network
On a host proxy switch, a physical NIC can connect to just one LAG port. On a
distributed switch, a LAG port can connect to multiple physical NICs from different
Chapter 3: Network Infrastructure 119
hosts. The physical NICs that are connected to the LAG ports must connect to links
that participate in an LACP port channel on the physical switch.
A vDS supports up to 64 LAGs. With ESXi 8.0, a host supports up to 32 LAGs. The
LAG configuration for a vDS may be limited by the physical network configuration.
The following limitations apply for LACP support in a vDS:
■ LACP support is not compatible with software iSCSI port binding. (iSCSI
multipathing is supported if iSCSI port binding is not used.)
■ LACP support settings do not exist in host profiles.
■ LACP is not supported with nested ESXi.
■ LACP support does not work with the ESXi dump collector.
■ LACP control packets (LACPDU) are not mirrored by vDS port mirroring.
■ The vDS teaming and failover health check (see the following section) does
not support LAG ports. (LAG port connectivity is checked by LACP.)
■ Enhanced LACP support works only when a single LAG handles traffic per
distributed port group.
The potential values for VLAN Health Status, MTU Health Status, and Teaming and
Failover Health Status include Normal, Warning, and Unknown. If the VLAN trunk
ranges configured on a distributed switch match the trunk ranges on a physical switch,
VLAN Health Status is set to Normal. If the MTU settings configured on the
distributed switch match the MTU settings on the physical switch, MTU Health
Status is set to Normal. If the physical switch ports participate in an EtherChannel
and the distributed port group teaming policy is IP hash, Teaming and Failover Health
Status is set to Normal. Also, if the distributed port group teaming policy is set to Port
Based, MAC Hash, or Explicit Failover, and physical switch ports do not participate in
an EtherChannel, Teaming and Failover Health Status is set to Normal.
Multicast Snooping
vDS 6.0.0 and later support multicast snooping, which forwards multicast traffic
based on the Internet Group Management Protocol (IGMP) and Multicast Listener
Discovery (MLD) messages from virtual machines. Multicast snooping supports
IGMP Version 1, IGMP Version 2, and IGMP Version 3 for IPv4 multicast group
addresses and MLD Version 1 and MLD Version 2 for IPv6 multicast group
addresses. The switch dynamically detects when a virtual machine sends a packet
containing IGMP or MLD membership information through a switch port
and creates a record about the destination IP address of the group. The switch
automatically removes the entry for a group from the lookup records whenever a
virtual machine does not renew its membership on time.
When using vDS multicast snooping mode, a virtual machine can receive multicast
traffic on a single switch port from up to 256 groups and 10 sources.
Discovery Protocol
Switch discovery protocols help vSphere administrators identify the physical switch
ports to which a vSS or vDS is connected. Cisco Discovery Protocol (CDP) support
was introduced with ESX 3.x. CDP is available for standard switches and distributed
switches that are connected to Cisco physical switches. Link Layer Discovery Pro-
tocol (LLDP) is supported in vSphere 5.0 and later for vDS (5.0.0 and later) but not
for vSS.
CDP enables you to determine which Cisco switch port is connected to a vSS or
a vDS. When CDP is enabled for a vDS, you can view the properties of the Cisco
switch, such as device ID, software version, and timeout. You can set CDP Type to
any of the following values:
■ Listen: ESXi collects and displays details about the associated Cisco switch
port but does not share information about the vDS with the Cisco switch.
■ Advertise: ESXi shares information about the vDS with the Cisco switch but
does not collect or display details about the associated Cisco switch port.
■ Both: ESXi collects and displays information about the associated Cisco
switch port and shares information about the vDS with the Cisco switch.
LLDP enables you to determine which physical switch port is connected to a vDS.
When LLDP is enabled for a vDS, you can view the properties of the physical
switch, such as chassis ID, system name and description, and device capabilities. You
can set the CDP Type to Listen, Advertise, or Both, as previously explained for CDP.
In the vSphere client, to view the physical switch information, you can select a host,
navigate to Configure > Networking > Physical Adapters, select an adapter, and
choose either the CDP or LLDP tab in the details pane.
122 VCP-DCV for vSphere 8.x Cert Guide
DirectPath I/O
DirectPath I/O allows a virtual machine to access physical PCI functions on
platforms that have an I/O memory management unit (IOMMU). You can enable
DirectPath I/O passthrough for a physical NIC on an ESXi host to enable efficient
resource usage and to improve performance. After enabling DirectPath I/O on the
physical NIC on a host, you can assign it to a virtual machine, allowing the guest OS
to use the NIC directly and bypassing the virtual switches.
NOTE Do not enable DirectPath I/O passthrough for the USB controller for an
ESXi host that is configured to boot from a USB device or an SD card attached to a
USB channel.
The following features are not available for DirectPath-enabled virtual machines:
■ Hot addition and removal of virtual devices
■ Suspend and resume
■ Record and replay
■ Fault tolerance
■ High availability
■ DRS (The virtual machine can be part of a cluster but cannot migrate across
hosts.)
■ Snapshots
Chapter 3: Network Infrastructure 123
The following features are not available for SR-IOV-enabled virtual machines, and
attempts to configure these features may result in unexpected behavior:
■ vSphere vMotion
■ Storage vMotion
■ vShield
■ NetFlow
■ VXLAN Virtual Wire
■ vSphere High Availability
■ vSphere Fault Tolerance
■ vSphere DRS
■ vSphere DPM
■ Virtual machine suspend and resume
■ Virtual machine snapshots
■ MAC-based VLAN for passthrough virtual functions
■ Hot addition and removal of virtual devices, memory, and vCPU
■ Participation in a cluster environment
■ Network statistics for a virtual machine NIC using SR-IOV passthrough
Each NIC must have SR-IOV-supported drivers and may require SR-IOV to be
enabled on the firmware.
An SR-IOV NIC can operate in one of three modes in ESXi:
■ Non SR-IOV Mode: The NIC is not used to provide VFs to virtual machines.
■ SR-IOV Only Mode: The NIC provides VFs to virtual machines but does not
back other virtual machine traffic. In the vSphere Client, the NIC appears in a
separate list (External SR-IOV Adapters) in the switch topology page.
■ Mixed Mode: The NIC services virtual machines with and without SR-IOV.
DirectPath I/O and SR-IOV offer similar performance benefits and trade-offs,
but you use them to accomplish different goals. You can use SR-IOV in workloads
with extremely high packet rates or very low latency requirements, where you want
Chapter 3: Network Infrastructure 125
multiple virtual machines to share the same physical NIC (with the same physical
function). With DirectPath I/O, you can map only one physical NIC to one virtual
machine.
When you create a VMkernel virtual network adapter, you should configure the
settings described in Table 3-6.
Review Questions
1. You are configuring traffic shaping policies for your vSS. Which one of the
following is not an available setting?
a. Peak Bandwidth
b. Minimum Bandwidth
c. Average Bandwidth
d. Burst Size
2. You want to implement network security policies at the lowest available level.
Which approach should you choose?
a. Use standard switches and apply policies on the individual ports.
b. Use standard switches and choose override on the port groups.
c. Use distributed switches and apply policies on the individual ports.
d. Use distributed switches and apply policies on the distributed port groups.
3. You created a distributed port group with default settings. Which of the
following statements is true?
a. The port group is set for fixed allocation and 8 ports.
b. The port group is set for elastic allocation and 8 ports.
c. The port group is set for fixed allocation and 16 ports.
d. The port group is set for elastic allocation and 16 ports.
5. You want to control the use of NetFlow within your distributed switch. Which
type of network policy should you implement?
a. Traffic shaping
b. Monitoring
c. Resource allocation
d. Filtering and marking
This page intentionally left blank
This chapter covers the following topics:
Table 4-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
Cluster Concepts and Overview 1
Distributed Resource Scheduler (DRS) 2–4
vSphere High Availability (HA) 5–7
Other Resource Management and Availability Features 8–10
2. In vSphere 8.0, you want to configure the DRS migration threshold such that
it is at the minimum level at which virtual machine happiness is considered.
Which of the following values should you choose?
a. Level 1
b. Level 2
c. Level 3
d. Level 4
e. Level 5
3. Which of the following is not a good use for resource pools in DRS?
a. To delegate control and management
b. To impact the use of network resources
c. To impact the use of CPU resources
d. To impact the use of memory resources
4. You want to use shares to give high-priority resource access to a set of vir-
tual machines in a resource pool, without concern for the relative number of
objects in the pool compared to other pools. Which feature is helpful?
a. Limits
b. Standard shares
c. Scalable shares
d. DRS advanced settings
5. You are configuring vSphere HA in a cluster. You want to configure the cluster
to use a specific host as a target for failovers. Which setting should you use?
a. Host Failures Cluster Tolerates
b. Define Host Failover Capacity By set to Cluster Resource Percentage
c. Define Host Failover Capacity By set to Slot Policy (Powered-on VMs)
d. Define Host Failover Capacity By set to Dedicated Failover Hosts
e. Define Host Failover Capacity By set to Disabled
6. You are enabling VM Monitoring in a vSphere HA cluster. You want to set the
monitoring level such that its failure interval is 60 seconds. Which of the
following options should you choose?
a. High
b. Medium
Chapter 4: Clusters and High Availability 133
c. Low
d. Normal
9. You are configuring vSphere Fault Tolerance (FT) in a vSphere 8.0 environ-
ment. What is the maximum number of virtual CPUs you can use with an
FT-protected virtual machine?
a. One
b. Two
c. Four
d. Eight
10. You are concerned about service availability for your vCenter Server. Which of
the following statements is true?
a. If a vCenter service fails, VMware Service Lifecycle Manager restarts it.
b. If a vCenter service fails, VMware Lifecycle Manager restarts it.
c. If a vCenter service fails, vCenter Server HA restarts it.
d. VMware Service Lifecycle Manager is a part of the PSC.
134 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
to be vMotion compatible. The clock speed, cache size, and number of cores can
differ between source and target processors. When you start a vMotion migration or
a migration of a suspended virtual machine, the wizard checks the destination host
for compatibility; it displays an error message if problems exist. By using EVC, you
can allow vMotion between some processors that would normally be incompatible.
The CPU instruction set that is available to a virtual machine guest OS is deter-
mined when the virtual machine is powered on. This CPU feature set is based on
the following items:
■ The host CPU family and model
■ Settings in the BIOS that might disable CPU features
■ The ESX/ESXi version running on the host
■ The virtual machine’s compatibility setting
■ The virtual machine’s guest operating system
EVC ensures that all hosts in a cluster present the same CPU feature set to vir-
tual machines, even if the actual CPUs on the hosts differ. If you enable the EVC
cluster setting, you can configure the EVC Mode with a baseline CPU feature set.
EVC ensures that hosts in a cluster use the baseline feature set when presenting an
instruction set to a guest OS. EVC uses AMD-V Extended Migration technology
for AMD hosts and Intel FlexMigration technology for Intel hosts to mask proces-
sor features; this allows hosts to present the feature set of an earlier processor gener-
ation. You should configure EVC Mode to accommodate the host with the smallest
feature set in the cluster.
The EVC requirements for hosts include the following:
■ ESXi 6.7 or later is required.
■ Hosts must be attached to a vCenter Server.
■ CPUs must be from a single vendor (either Intel or AMD).
■ If the AMD-V, Intel-VT, AMD NX, or Intel XD features are available in the
BIOS, they need to be enabled.
■ Check the VMware Compatibility Guide to ensure that CPUs are supported for
EVC Mode.
NOTE You can apply a custom CPU compatibility mask to hide host CPU features
from a virtual machine, but VMware does not recommend doing so.
You can configure the EVC settings by using the Quickstart > Configure Cluster
workflow in the vSphere Client. You can also configure EVC directly in the cluster
settings. The options for VMware EVC are Disable EVC, Enable EVC for AMD
Chapter 4: Clusters and High Availability 137
Hosts, and Enable EVC for Intel Hosts. You can also configure per-VM EVC, as
described in Chapter 5, “vCenter Server Features and Virtual Machines.”
If you choose Enable EVC for Intel Hosts, you can set the EVC Mode setting to
one of the options described in Table 4-2.
If you choose Enable EVC for AMD Hosts, you can set the EVC Mode setting to
one of the options described in Table 4-3.
Starting with vSphere 7.0 Update 1, EVC provides a feature for Virtual Shared
Graphics Acceleration (vSGA), allowing multiple virtual machines to share GPUs
and leverage the 3D graphics acceleration capabilities.
vSAN Services
You can enable DRS, vSphere HA, and vSAN at the cluster level. The following
sections provide details on DRS and vSphere HA. For details on vSAN, see Chapter 2.
Network-Aware DRS
In vSphere 6.5, DRS considers the utilization of host network adapters during initial
placement and load balancing, but it does not balance the network load. Instead, its
goal is to ensure that the target host has sufficient available network resources. It
works by eliminating hosts with saturated networks from the list of possible migra-
tion hosts. The threshold used by DRS for network saturation is 80% by default.
When DRS cannot migrate VMs due to network saturation, the result may be an
imbalanced cluster.
Beginning with vSphere 7.0, DRS uses a new cost modeling algorithm that is
flexible and balances network bandwidth along with CPU and memory usage.
power on. In vSphere 6.5, the new placement feature is not supported for the
following configurations:
■ Clusters where DPM, Proactive HA, or HA Admission Control is enabled
■ Clusters with DRS configured in Manual Mode
■ Virtual machines with the Manual DRS Override setting enabled
■ Virtual machines that are FT enabled
■ Virtual machines that are part of a vApp
In vSphere 6.7 and later, the new placement is available for all configurations.
DRS Rules
You can configure rules to control the behavior of DRS.
A VM–host affinity rule specifies whether the members of a selected virtual machine
DRS group can run on the members of a specific host DRS group. Unlike a virtual
machine–to–virtual machine (VM–VM) affinity rule, which specifies affinity (or
anti-affinity) between individual virtual machines, a VM–host affinity rule specifies an
affinity relationship between a group of virtual machines and a group of hosts. There are
required rules (designated by “must”) and preferential rules (designated by “should”).
A VM–host affinity rule includes the following components:
■ One virtual machine DRS group
■ One host DRS group
■ A designation of whether the rule is a requirement (“must”) or a preference
(“should”) and whether it is affinity (“run on”) or anti-affinity (“not run on”)
Chapter 4: Clusters and High Availability 143
NOTE A VM–VM rule does not allow the “should” qualifier. You should consider
these as “must” rules.
Resource Pools
Resource pools are container objects in the vSphere inventory that are used to
compartmentalize the CPU and memory resources of a host, a cluster, or a parent
resource pool. Virtual machines run in and draw resources from resource pools. You
can create multiple resource pools as direct children of a standalone host or a DRS
cluster. You cannot create child resource pools on a host that has been added to a
cluster or on a cluster that is not enabled for DRS.
You can use resource pools to organize VMs. You can delegate control over each
resource pool to specific individuals and groups. You can monitor resources and set
alarms on resource pools. If you need a container just for organization and permis-
sion purposes, consider using a folder. If you also need resource management, then
consider using a resource pool. You can assign resource settings such as shares,
reservations, and limits to resource pools.
Use Cases
You can use resource pools to compartmentalize a cluster’s resources and then use
the resource pools to delegate control to individuals or organizations. Table 4-4
provides some use cases for resource pools.
Option Description
Expandable You can enable expandable reservations to effectively allow a child resource
reservations pool to borrow from its parent. Expandable reservations, which are enabled by
default, are considered during admission control. When powering on a virtual
machine, if the resource pool does not have sufficient unreserved resources, the
resource pool can use resources from its parent or ancestors.
For example, say that in a resource pool where 8 GHz is reserved and
expandable reservations are disabled, you try to start nine virtual machines
each with 1 GHz, but the last virtual machine does not start. If you enable
expandable reservations in the resource pool, and its parent pool (or cluster) has
sufficient unreserved CPU resources, you can start the ninth virtual machine.
Limits A limit specifies an upper bound for CPU or memory resources that can be
allocated to a virtual machine or a resource pool.
You can set a limit on the amount of CPU and memory allocated to a resource
pool. The default is unlimited. For example, if you power on multiple CPU-
intensive virtual machines in a resource pool, where the CPU limit is 10 GHz,
then, collectively, the virtual machines cannot use more than 10 GHz CPU
resources, regardless of the pool’s reservation settings, the pool’s share settings,
or the amount of available resources in the parent.
Table 4-6 provides the CPU and memory share values for virtual machines when
using the High, Normal, and Low settings. For resource pools, the share values are
equivalent to those of a virtual machine with four vCPUs and 16 GB memory.
For example, the share values for a resource pool configured with normal CPU
shares and high memory shares are 4000 (that is, 4 × 1000) CPU shares and 327,680
(that is, 16 × 1024 × 20) memory shares.
NOTE The relative priority represented by each share changes with the addition
and removal of virtual machines in a resource pool or cluster. It also changes as you
increase or decrease the shares on a specific virtual machine or resource pool.
Chapter 4: Clusters and High Availability 147
Scalable Shares
In versions since vSphere 7.0, DRS provides scalable shares. The main use case for
scalable shares is a scenario in which you want to use shares to give high-priority
resource access to a set of virtual machines in a resource pool, without concern for
the relative number of objects in the pool compared to other pools. With standard
shares, each pool in a cluster competes for resource allocation with its siblings, based
on the share ratio. With scalable shares, the allocation for each pool factors in the
number of objects in the pool.
For example, consider a scenario in which a cluster with 100 GHz CPU capacity
has a high-priority resource pool with CPU Shares set to High and a low-priority
resource pool with CPU Shares set to Normal, as shown in Figure 4-1. This means
that the share ratio between the pools is 2:1, so the high-priority pool is effectively
allocated twice the CPU resources as the low-priority pool whenever CPU conten-
tion exists in the cluster. The high-priority pool is allocated 66.7 GHz, and the low-
priority pool is effectively allocated 33.3 GHz. In this cluster, 40 virtual machines
of equal size are running, with 32 in the high-priority pool and 8 in the low-priority
pool. The virtual machines are all demanding CPU resources, causing CPU conten-
tion in the cluster. In the high-priority pool, each virtual machine is allocated 2.1
GHz. In the low-priority pool, each virtual machine is allocated 4.2 GHz.
DRS Cluster
CPU Capacity = 100 GHz
32 8
VMs VMs
If you want to change the resource allocation such that each virtual machine in the
high-priority pool is effectively allocated more resources than the virtual machines
in the low-priority pool, you can use scalable shares. If you enable scalable shares
in the cluster, DRS effectively allocates resources to the pools based on the Shares
settings and the number of virtual machines in the pool. In this example, the CPU
shares for the pools provide a 2:1 ratio. Factoring this with the number of virtual
machines in each pool, the allocation ratio between the high-priority pool and the
low-priority pool is 2 times 32 to 1 times 8, or simply 8:1. The high-priority pool is
allocated 88.9 GHz, and the low-priority pool is allocated 11.1 GHz. Each virtual
machine in the high-priority pool is allocated 2.8 GHz. Each virtual machine in the
low-priority pool is allocated 1.4 GHz.
DRS Cluster
XVMs VMs
When you enable vSphere HA on a cluster, the cluster elects one of the hosts to act
as the primary host. The primary host communicates with vCenter Server to report
cluster health. It monitors the state of all protected virtual machines and secondary
hosts. It uses network and datastore heartbeating to detect failed hosts, isolation,
and network partitions. vSphere HA takes appropriate actions to respond to host
failures, host isolation, and network partitions. For host failures, the typical reac-
tion is to restart the failed virtual machines on surviving hosts in the cluster. If a
network partition occurs, a primary host is elected in each partition. If a specific host
is isolated, vSphere HA takes the predefined host isolation action, which may be to
shut down or power down the host’s virtual machines. If the primary host fails, the
surviving hosts elect a new primary host. You can configure vSphere to monitor and
respond to virtual machine failures, such as guest OS failures, by monitoring heart-
beats from VMware Tools.
NOTE Although vCenter Server is required to implement vSphere HA, the health
of an HA cluster is not dependent on vCenter Server. If vCenter Server fails, vSphere
HA still functions. If vCenter Server is offline when a host fails, vSphere HA can fail
over the affected virtual machines.
vSphere HA Requirements
When planning a vSphere HA cluster, you need to address the following
requirements:
■ The cluster must have at least two hosts, licensed for vSphere HA.
■ Hosts must use static IP addresses or guarantee that IP addresses assigned by
DHCP persist across host reboots.
150 VCP-DCV for vSphere 8.x Cert Guide
NOTE The Virtual Machine Startup and Shutdown (automatic startup) feature is
disabled and unsupported for all virtual machines residing in a vSphere HA cluster.
NOTE If multiple hosts fail, the virtual machines on the failed host migrate first in
order of priority, and then the virtual machines from the next host migrate.
Chapter 4: Clusters and High Availability 151
Heartbeats
The primary host and secondary hosts exchange network heartbeats every second.
When the primary host stops receiving these heartbeats from a secondary host,
it checks for ping responses or the presence of datastore heartbeats from the
secondary host. If the primary host does not receive a response after checking for
a secondary host’s network heartbeat, ping, or datastore heartbeats, it declares that
the secondary host has failed. If the primary host detects datastore heartbeats for
a secondary host but no network heartbeats or ping responses, it assumes that the
secondary host is isolated or in a network partition.
If any host is running but no longer observes network heartbeats, it attempts to ping
the set of cluster isolation addresses. If those pings also fail, the host declares itself to
be isolated from the network.
If you disable vSphere HA admission control, then you enable the cluster to allow
virtual machines to power on regardless of whether they violate availability con-
straints. In the event of a host failover, you may discover that vSphere HA cannot
start some virtual machines.
In vSphere 8.0, the default admission control setting is Cluster Resource Percentage,
which reserves a percentage of the total available CPU and memory resources in
the cluster. For simplicity, the percentage is calculated automatically by defining the
number of host failures to tolerate (FTT). The percentage is dynamically changed
as hosts are added to the cluster or removed from it. Another new enhancement is
the Performance Degradation VMs Tolerate setting, which controls the amount of
performance reduction that is tolerated after a failure. A value of 0% indicates that
no performance degradation is tolerated.
With the Slot Policy option, vSphere HA admission control ensures that a specified
number of hosts can fail, leaving sufficient resources in the cluster to accommodate
the failover of the impacted virtual machines. Using the Slot Policy option, when
you perform certain operations, such as powering on a virtual machine, vSphere HA
applies admission control in the following manner:
Step 1. HA calculates the slot size, which is a logical representation of memory
and CPU resources. By default, it is sized to satisfy the requirements for
any powered-on virtual machine in the cluster. For example, it may be
sized to accommodate the virtual machine with the greatest CPU reserva-
tion and the virtual machine with the greatest memory reservation.
Step 2. HA determines how many slots each host in the cluster can hold.
Step 3. HA determines the current failover capacity of the cluster, which is the
number of hosts that can fail while still leaving enough slots to satisfy all
the powered-on virtual machines.
Step 4. HA determines whether the current failover capacity is less than the
configured failover capacity (provided by the user).
Step 5. If the current failover capacity is less than the configured failover capacity,
admission control disallows the operation.
If a cluster has a few virtual machines that have much larger reservations than the
others, they will distort slot size calculation. To remediate this, you can specify an
upper bound for the CPU or memory component of the slot size by using advanced
options. You can also set a specific slot size (CPU size and memory size). The next
section describes the advanced options that affect the slot size.
Chapter 4: Clusters and High Availability 153
You can override the cluster’s settings for Restart Priority and Isolation Response
for each virtual machine. For example, you might want to prioritize virtual machines
providing infrastructure services such as DNS or DHCP.
At the cluster level, you can create dependencies between groups of virtual
machines. You can create VM groups, host groups, and dependency rules between
the groups. In the rules, you can specify that one VM group cannot be restarted if
another specific VM group is started.
The Maximum per-VM Resets setting can be used to configure the maximum
number of times vSphere HA attempts to restart a specific failing virtual machine
within the reset period.
Proactive HA
Proactive High Availability (Proactive HA) integrates with select hardware part-
ners to detect degraded components and evacuate VMs from affected vSphere hosts
before an incident causes a service interruption. Hardware partners offer a vCen-
ter Server plug-in to provide the health status of the system memory, local stor-
age, power supplies, cooling fans, and network adapters. As hardware components
become degraded, Proactive HA determines which hosts are at risk and places them
into either Quarantine Mode or Maintenance Mode. When a host enters Mainte-
nance Mode, DRS evacuates its virtual machines to healthy hosts, and the host is not
used to run virtual machines. When a host enters Quarantine Mode, DRS leaves the
current virtual machines running on the host but avoids placing or migrating virtual
machines to the host. If you prefer that Proactive HA simply make evacuation rec-
ommendations rather than automatic migrations, you can set Automation Level to
Manual.
The vendor-provided health providers read sensor data in the server and provide the
health state to vCenter Server. The health states are Healthy, Moderate Degrada-
tion, Severe Degradation, and Unknown.
156 VCP-DCV for vSphere 8.x Cert Guide
Predictive DRS
Predictive DRS is a feature in vSphere 6.5 and later that leverages the predictive
analytics of VMware Aria Operations, formerly known as vRealize Operations
(vROps), and vSphere DRS. Together, these two products can provide workload
balancing prior to the occurrence of resource utilization spikes and resource conten-
tion. Every night, Aria Operations calculates dynamic thresholds, which are used to
create forecasted metrics for the future utilization of virtual machines. Aria Opera-
tions passes the predictive metrics to vSphere DRS to determine the best placement
and balance of virtual machines before resource utilization spikes occur. Predictive
DRS helps prevent resource contention on hosts that run virtual machines with
predictable utilization patterns.
The following prerequisites are needed to run Predictive DRS:
■ vCenter Server 6.5 or later is required.
■ Predictive DRS must be configured and enabled in both vCenter Server and
Aria Operations.
■ The vCenter Server and Aria Operations clocks must be synchronized.
are used in the following order: IPMI, iLO, WOL. If a host does not support one of
these protocols, DPM cannot automatically bring a host out of Standby Mode.
DPM is very configurable. As with DRS, you can set DPM’s automation to be
manual or automatic.
NOTE Do not disconnect a host that is in Standby Mode or remove it from a DRS
cluster without first powering it on. Otherwise, vCenter Server is not able to power
the host back on.
To configure IPMI or iLO settings for a host, you can edit the host’s Power Man-
agement settings. You should provide credentials for the Baseboard Management
Controller (BMC) account, the IP address of the appropriate NIC, and the MAC
address of the NIC.
Using WOL with DPM requires that the following prerequisites be met:
■ ESXi 3.5 or later is required.
■ vMotion must be configured.
■ The vMotion NIC must support WOL.
■ The physical switch port must be set to automatically negotiate the link speed.
Before enabling DPM, use the vSphere Client to request the host to enter Standby
Mode. After the host powers down, right-click the host and attempt to power on.
If this is successful, you can allow the host to participate in DPM. Otherwise, you
should disable power management for the host.
You can enable DPM in a DRS cluster’s settings. You can set Automation Level to
Off, Manual, or Automatic. When this option is set to Off, DPM is disabled. When
it is set to Manual, DPM makes recommendations only. When it is set to Automatic,
DPM automatically performs host power operations as needed.
Much as with DRS, with DPM you can control the aggressiveness of DPM (that is,
the DPM threshold) with a slider bar in the vSphere Client. The DRS threshold and
the DPM threshold are independent of one another. You can override automation
settings per host. For example, for a 16-host cluster, you might want to set DPM
Automation to Automatic on only 8 of the hosts.
The following vSphere features are not supported for FT-protected virtual
machines:
■ Snapshots (An exception is that disk-only snapshots created for vStorage APIs
for Data Protection [VADP] backups are supported for FT but not for legacy
FT.)
■ Storage vMotion
■ Linked clones
■ Virtual Volumes datastores
■ Storage-based policy management (However, vSAN storage policies are
supported.)
■ I/O filters
■ Disk encryption
■ Trusted Platform Module (TPM)
■ Virtual Based Security (VBS)–enabled VMs
■ Universal Point in Time snapshots (a next-generation vSAN feature)
■ Physical raw device mappings (RDMs) (However, virtual RDMs are supported
for legacy FT.)
■ Virtual CD-ROMs for floppy drives backed by physical devices
■ USB devices, sound devices, serial ports, and parallel ports
■ N-Port ID Virtualization (NPIV)
■ Network adapter passthrough
■ Hot plugging devices (Note that the hot plug feature is automatically disabled
when you enable FT on a virtual machine.)
■ Changing the network where a virtual NIC is connected
160 VCP-DCV for vSphere 8.x Cert Guide
In vSphere 6.5, FT is supported with DRS only when EVC is enabled. You can
assign a DRS automation to the primary VM and let the secondary VM assume
the same setting. If you enable FT for a virtual machine in a cluster where EVC is
disabled, the virtual machine DRS automation level is automatically disabled. In ver-
sions since vSphere 6.7, EVC is not required for FT to support DRS.
To enable FT, you first create a VMkernel virtual network adapter on each host
and connect to the FT Logging network. You should enable vMotion on a separate
VMkernel adapter and network.
When you enable FT protection for a virtual machine, the following events occur:
■ If the primary VM is powered on, validation tests occur. If validation is passed,
then the entire state of the primary VM is copied and used to create the sec-
ondary VM on a separate host. The secondary VM is powered on. The virtual
machine’s FT status is Protected.
■ If the primary VM is powered off, the secondary VM is created and registered
to a host in the cluster but not powered on. The virtual machine FT Status
setting is Not Protected, VM not Running. When you power on the primary
VM, the validation checks occur, and the secondary VM is powered on. Then
FT Status changes to Protected.
Chapter 4: Clusters and High Availability 161
Legacy FT VMs can exist only on ESXi hosts running on vSphere versions earlier
than 6.5. If you require legacy FT, you should configure a separate vSphere 6.0
cluster.
NOTE Do not confuse VMware Service Lifecyle Manager with VMware vSphere
Lifecycle Manager, which provides simple, centralized lifecycle management for ESXi
hosts through the use of images and baselines.
162 VCP-DCV for vSphere 8.x Cert Guide
Review Questions
1. You are configuring EVC. Which of the following is not a requirement?
a. A vSphere cluster
b. A DRS cluster
c. CPUs in the same family
d. CPUs with the same base instruction set
2. In vSphere 8.0, you want to configure the DRS migration threshold such that
it is at the maximum level at which resource contention is considered but
virtual machine happiness is not. Which of the following values should you
choose?
a. Level 1
b. Level 2
c. Level 3
d. Level 4
e. Level 5
Table 5-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
vCenter Server and vSphere 1, 2
Virtual Machine File Structure 3
Virtual Machine Snapshots 4
Virtual Machine Settings 5, 6
Virtual Machine Migration 7–9
Virtual Machine Cloning 10
168 VCP-DCV for vSphere 8.x Cert Guide
1. You just installed a new vCenter Server. Using the vSphere Client, which of
the following objects can be the first object that you create in the inventory?
a. A cluster
b. A host
c. A virtual machine
d. A data center
e. A datastore
f. A virtual machine folder
2. You want to create a content library for your vCenter Server. Which type of
content library cannot be modified directly?
a. A library backed by vSAN
b. A local library
c. A published library
d. A subscribed library
3. You are providing support for a virtual machine named Server01 in a vSphere
8.0 environment. Which of the following is the virtual disk data file?
a. Server01.vmdk
b. Server01-flat.vmdk
c. Server01.vmx
d. Server01-data.vmdk
4. You have taken multiple snapshots for a virtual machine. In the vSphere Client
Snapshot Manager, where is the You Are Here icon located?
a. Under the parent snapshot
b. Under the child snapshot
c. Under the latest snapshot
d. Under the associate delta file
5. You are configuring a virtual machine in vSphere 8.0. Which of the following
devices cannot be configured or removed?
a. SIO controller
b. SCSI controller
c. Parallel port
d. PCI device
Chapter 5: vCenter Server Features and Virtual Machines 169
6. You are using the vSphere Client to edit a virtual machine in vSphere 8.0.
Which of the following is not available on the VM Options tab?
a. General Options
b. Encryption Options
c. Snapshot Options
d. vApp Options
7. From the vSphere Client, you want to migrate virtual machines to another
vCenter Server without needing to enter credentials for the target vCenter
Server. Which of the following is required? (Choose two.)
a. Advanced Cross vCenter vMotion
b. Separate single sign-on domains
c. Enhanced Linked Mode
d. Time synchronization
e. vSphere Standard License
9. You are optimizing your vSphere environment. Which of the following is not
helpful for improving vMotion performance?
a. Using NIOC to increase shares for vMotion traffic
b. Using traffic shaping to limit the bandwidth that is available to vMotion
traffic
c. Using multiple-NIC vMotion
d. Using jumbo frames
170 VCP-DCV for vSphere 8.x Cert Guide
10. You want to use instant clones in vSphere. Which of the following statements
is true?
a. You can use the vSphere Host Client to perform an instant clone.
b. You can use the vSphere Client to perform an instant clone.
c. A sample major use case for instant clones is a large-scale deployment in
a VMware Horizon VDI.
d. The source virtual machine must be powered down.
Chapter 5: vCenter Server Features and Virtual Machines 171
Foundation Topics
NOTE Many systems that rely on vCenter Server, such as VMware Horizon, also
refer to vCenter objects according to their names. Take care when renaming vCenter
inventory objects such as data centers, folders, and datastores if you have deployed
any external systems that rely on vCenter Server.
NOTE Inventory object names cannot exceed 214 bytes (UTF-8 encoded).
Data Centers
In the vSphere inventory, a data center is a container object that is an aggregation of
all the different types of objects used to work in a virtual infrastructure. Other than
an optional folder to contain data centers, you cannot create any object in the inven-
tory until you create a data center.
Data centers are often used to contain all the objects in a physical data center. For
example, if you use a single vCenter Server to manage vSphere assets in San Fran-
cisco and Chicago, you might want to use corresponding virtual data centers to
organize each city’s assets. You could create data center objects named San Francisco
172 VCP-DCV for vSphere 8.x Cert Guide
and Chicago and place each ESXi host, virtual machine, and other object in the
appropriate data center.
Within each data center, there are four separate hierarchies:
■ Virtual machines (and templates)
■ Hosts (and clusters)
■ Networks
■ Datastores
A data center is a namespace for networks and datastores. The names for these
objects must be unique within a data center. You cannot use identical datastore
names within the same data center, but you can use identical datastore names within
two different data centers. Virtual machines, templates, and clusters do not need to
have unique names within the data center but must have unique names within their
folder.
Folders
In the vSphere inventory, folders are container objects that allow you to group
objects of a single type. A folder can contain data centers, clusters, datastores, net-
works, virtual machines, templates, or hosts. For example, one folder can contain
hosts and a folder containing hosts, but it cannot contain hosts and a folder contain-
ing virtual machines.
You can create data center folders directly under the root vCenter Server and use
them to organize your data centers. Within each data center is one hierarchy of fold-
ers for virtual machines and templates, one for hosts and clusters, one for datastores,
and one for networks.
When creating or modifying a folder, the only available setting is the folder name.
You can use folders when assigning permissions and configuring alarms.
Clusters
A cluster is a set of ESXi hosts that are intended to work together as a unit.
When you add a host to a cluster, the host’s resources become part of the cluster’s
resources. vCenter Server manages the resources of all hosts in a cluster as one unit.
In addition to creating a cluster, assigning a name, and adding ESXi objects, you can
enable and configure features on a cluster, such as VMware EVC, vSphere DRS, and
vSphere HA.
Chapter 5: vCenter Server Features and Virtual Machines 173
If you enable VMware EVC on a cluster, you can ensure that migrations with vMo-
tion do not fail due to CPU compatibility errors. If you enable vSphere DRS on
a cluster, you can allow automatic resource balancing by using the pooled host
resources in the cluster. If you enable vSphere HA on a cluster, you can allow rapid
virtual machine recovery from host hardware failures by using the cluster’s available
host resource capacity.
Cluster features are covered in detail in Chapter 4, “Clusters and High Availability.”
Resource Pools
In the vSphere inventory, resource pools are container objects that are used to com-
partmentalize the CPU and memory resources of a host or cluster. Virtual machines
run in resource pools, using resources provided by the resource pools. You can cre-
ate multiple resource pools as direct children of a standalone host or cluster.
You can use resource pools to organize VMs. You can delegate control over each
resource pool to specific individuals and groups. You can monitor resources and set
alarms on resource pools. If you need a container just for organization and permis-
sion purposes, consider using a folder. If you also need resource management, then
consider using a resource pool.
If DRS is enabled, you can use the vSphere Client to create resource pools in the
cluster and assign resource settings, such as reservations and limits. Otherwise, you
can create resource pools directly on specific ESXi hosts.
You can configure resource settings for resource pools, such as reservations, limits,
and shares. See Chapter 4 for more details on resource pools.
Hosts
In the vSphere inventory, hosts are objects that represent your ESXi servers. After
installing an ESXi host, you can choose to add it to the vSphere inventory, in which
case you need to provide credentials for a user who is assigned the administrator role
directly on the host.
The vpxa agent in the ESXi server maintains communication with vCenter Server. It
is an interface between the vCenter Server and the ESXi hostd service, which drives
the main operations on the host, such as powering on a virtual machine.
For maintenance and troubleshooting activities, you can disconnect a host from the
vCenter Server; when you do this, you do not remove it from vCenter Server, but
you suspend related vCenter Server monitoring activities. You can connect hosts
that are disconnected. If you choose to remove a host from inventory, the host and
all its associated virtual machines are removed.
174 VCP-DCV for vSphere 8.x Cert Guide
If the SSL certificate used by vCenter Server is replaced or changed, the vCenter
Server is unable to decrypt the host passwords. You need to reconnect the certificate
and resupply the host credentials.
To remove a host from the vSphere inventory, you must first enter Maintenance
Mode.
Networks
In the vSphere inventory, a network is an object that is used to connect a set of vir-
tual network adapters. Each ESXi host may have multiple VMkernel virtual network
adapters. Each virtual machine may have multiple virtual network adapters. Each
virtual network adapter may be connected to a port group (on a standard virtual
switch) or a distributed port group (on a vSphere distributed switch). All virtual
machines that connect to the same port group belong to the same network in the
virtual environment, even if they are on different physical servers. You can manage
networks by monitoring, setting permissions, and setting alarms on port groups and
distributed port groups.
Chapter 3, “Network Infrastructure,” provides details on networks.
Datastores
In the vSphere inventory, datastores are objects that represent physical storage
resources in the data center. A datastore is the storage location for virtual machine
files. The physical storage resources can come from local SCSI disks of the ESXi
host, Fibre Channel SAN disk arrays, iSCSI SAN disk arrays, or network attached
storage (NAS) arrays. VMFS datastores can be backed by local SCSI, Fibre Channel,
or iSCSI. NFS datastores can be backed by NAS. vSAN datastores can be built in
VSAN clusters.
Chapter 2, “Storage Infrastructure,” provides details on datastores.
Virtual Machines
In the vSphere inventory, virtual machines are represented in a manner that reflects
the current inventory view. For example, in the Hosts and Clusters view, each virtual
machine is a descendant of the ESXi host on which it runs. In the Networks view,
each virtual machine is a descendant of the network to which it connects.
Templates
In the vSphere inventory, templates are objects that are effectively non-executable
virtual machines. A template is a primary copy of a virtual machine that can be used
Chapter 5: vCenter Server Features and Virtual Machines 175
to create and provision new virtual machines. A template can have a guest operating
system and application software installed. Templates are often customized during
deployment to ensure that each new virtual machine has a unique name and network
settings.
For more details on templates, see the “Virtual Machine Cloning” section, later in
this chapter.
vApps
A vApp is a container object in vSphere that provides a format for packaging and
managing applications. Typically, a vApp is a set of virtual machines that runs a
single application and allows you to manage the application as a single unit. You
can specify a unique boot order for the virtual machines in a vApp, which allows
you to gracefully start an application that spans multiple virtual machines. You can
apply resource management settings to a vApp in a similar manner as you would to a
resource pool.
Host Profiles
A host profile is a feature that enables you to encapsulate the configuration of one
host and apply it to other hosts. A host profile is especially helpful in an environ-
ment where an administrator manages multiple hosts and clusters with vCenter
Server. The following are characteristics of host profiles:
■ Host profiles are automated and centrally managed.
■ Host profiles are used for host configuration and configuration compliance.
■ Host profiles can improve efficiency by reducing the need for repetitive man-
ual tasks.
■ A host profile captures the configuration of a reference host and stores the
configuration as a managed object.
■ Host profiles provide parameters for configuring networking, storage, security,
and other host-level settings.
■ A host profile can be applied to individual hosts, a cluster, or a set of hosts and
clusters.
■ A host profile makes it easy to ensure that all hosts in a cluster have a consis-
tent configuration.
You can use the following workflow to leverage a host profile to apply a consistent
host configuration in your vSphere environment:
176 VCP-DCV for vSphere 8.x Cert Guide
NOTE If you want a host profile to use directory services for authentication, the ref-
erence host must be configured to use a directory service.
In previous releases, vSphere requires that the reference host be available for certain
tasks, such as editing, importing, and exporting the host profile. In versions since
vSphere 6.0, a dedicated reference host is not required for these tasks.
Auto Deploy uses host profiles to configure ESXi.
Content Libraries
A content library is a repository that can be used to share files such as virtual
machine templates, vApps, and image files among a set of vCenter Servers. Content
libraries, which were introduced in vSphere 6.0, address the fact that multiple vCen-
ter Servers do not directly share associated files such as Open Virtualization Format
(OVF) and image (ISO) files. A great use case is a company that has multiple sites,
each managed by a dedicated vCenter Server, where the OVF files and ISO files that
are used at one site are not directly available for use at other sites. In such a case,
you can create a content library at one site and publish it to serve the other sites. At
the other sites, you can create subscribed libraries that automatically synchronize
with the published library. For example, you can create a local content library using
the main office vCenter Server, publish it, and subscribe to it from branch office
vCenter Servers.
A subscribed content library can be configured to download metadata only when-
ever it receives notification of a change. In such a case, the subscribing library
reflects the most recent changes, but it is not burdened with supplying the storage
space for every published file. Instead, the administrator can choose whether to
download the data for the entire library or per item.
Three types of content libraries can be used: local, published, and subscribed. A local
content library is the simplest form. You can allow, modify, and delete content in a
Chapter 5: vCenter Server Features and Virtual Machines 177
content library. A published library is a local library where content is published for
subscription. A subscribed library is a library whose content you cannot change or
publish. It receives its content from a published library.
Each content library is built on a single storage entity, which may be a VMFS
datastore, an NFS datastore, a CIFS share, a local disk, or a vSAN datastore.
In vSphere 8.0, the following maximum limitations apply:
■ 1000 libraries per vCenter Server
■ 1000 items per library
■ 16 concurrent synchronization operations per published library
■ 9 virtual disk files per OVA/OVF template
After one library is set to subscribe to another library, synchronization occurs. Auto-
matic synchronization occurs every 24 hours by default and can be modified using
an API. The content library service, which is named vmware-vdcs, is installed as part
of the vCenter Server installation and uses the same database as vCenter Server.
Simple versioning is used to keep libraries synchronized. Version numbers are
assigned to the libraries and to each item in the library. These numbers are incre-
mented whenever content is added or modified. A library does not store previous
versions or provide rollback.
The following sequence occurs between a subscribed library and a published library:
Step 1. The library service on the subscriber connects to the library services
on the publisher by using the VMware Content Subscription Protocol
(VCSP) and checks for updates.
Step 2. The subscriber pulls the lib.json file from the publisher, and the lib.
json file for each library is examined to determine if discrepancies exist
between the publisher and the subscriber.
Step 3. The library service uses VCSP to determine what data has changed and
sends a request to the transfer service to copy the required files.
Step 4. The subscriber updates the versioning information in the database.
In versions since vSphere 6.5, you can mount an ISO file directly from the content
library, apply a guest OS customization specification during VM deployment, and
update existing templates. The content library’s performance is then improved.
The Optimized HTTP Sync option stores content in a compressed format, which
reduces the synchronization time. The content library leverages new features in
vCenter Server 6.5, including vCenter HA and backup/restoration.
178 VCP-DCV for vSphere 8.x Cert Guide
NOTE Do not directly change, move, or delete virtual machine files without
guidance from a VMware Technical Support representative.
Chapter 5: vCenter Server Features and Virtual Machines 179
Additional files can be created when you perform specific operations, such as when
you create snapshots. If you convert a virtual machine to a template, the .vmtx file
replaces the virtual machine configuration file (the .vmx file).
By default, when you create a virtual machine, the system creates a folder in the
datastore and assigns a folder name that is similar to the virtual machine name. In
cases where the default folder name is already in use, the system appends a number
to the new folder to make it unique.
Configuration File
A virtual machine’s configuration file is a text file that contains all of the virtual
machine’s settings, including a description of the virtual hardware. For example, a
portion of the contents of a VMX file for a CentOS virtual machine named server1
could include the following text:
displayName = "server1"
guestOS = "centos-64"
nvram = "server1.nvram"
scsi0:0.fileName = "server1.vmdk"
If this virtual machine is sized with two virtual CPUs and 1024 GB memory, the
contents of the VMX file may also include the following text:
numvcpus = "2"
memSize = "1024"
180 VCP-DCV for vSphere 8.x Cert Guide
The VMDK metadata file also contains the names of other files associated with the
virtual disk, such as data (extent) files, as shown in the following sample content:
# Extent description
RW 20971520 VMFS "server1-flat.vmdk"
Snapshot Files
When you take a snapshot of a virtual machine, the system creates a few files. For
example, if you take a snapshot of a powered-off virtual machine named server1
that has only one virtual disk and no previous snapshots, the following files may be
created:
■ server1-000001-sesparse.vmdk: A delta data disk that stores changes made
since the creation of the snapshot
■ server1-000001.vmdk: A VMDK metadata file for the delta disk
■ server1-Snapshot1.vmsn: Snapshot data
virtual machine as a tree, where the root node is the virtual machine and the branch
nodes are the snapshots. If you revert the virtual machine to a snapshot, the state
of your virtual machine is associated with that snapshot, as shown in Figure 5-2. If
you create another snapshot, you add branches to the snapshot tree, as shown in
Figure 5-3.
Parent Snapshots
The first virtual machine snapshot that you create is the base snapshot. Taking a
snapshot creates a delta disk file for each disk attached to the virtual machine and,
optionally, a memory file. The delta disk files and memory file are stored with the
base VMDK file. The parent (current) snapshot is always the snapshot that appears
immediately above the You Are Here icon in the Snapshot Manager. If you revert
to a snapshot, that snapshot becomes the parent of the You Are Here current state.
When you have multiple snapshots, each child snapshot has a parent snapshot.
NOTE The parent snapshot is not always the snapshot that you took most recently.
Snapshot Behavior
Taking a snapshot preserves the disk state by creating a series of delta disks for each
attached virtual disk or virtual raw device mapping (RDM). Taking a snapshot cre-
ates a snapshot object in the Snapshot Manager that represents the virtual machine
state and settings. Each snapshot creates a delta disk for each virtual disk. When you
take a snapshot, the system prevents the virtual machine from writing to the current
data (VMDK) file and instead directs all writes to the delta disk. The delta disk rep-
resents the difference between the current state of the virtual disk and the state that
existed at the time that you took the parent snapshot. Delta disk files can expand
quickly and can become as large as the configured size of the virtual disk if the guest
operating system writes to every block of the virtual disk.
When you take a snapshot, you capture the state of the virtual machine, the virtual
disks, and (optionally) the virtual memory in a set of files, such as the delta, database,
and memory files. By default, the delta disks are stored with the corresponding vir-
tual disk files, and the memory and database files are stored in the virtual machine
directory.
Flat File
A virtual disk involves a metadata file and a data file, each with the .vmdk exten-
sion. The metadata VMDK file contains information about the virtual disk, such as
184 VCP-DCV for vSphere 8.x Cert Guide
geometry and child–parent relationship information. The data VMDK file is called
the flat file, and its name contains the word flat. Only the names of the metadata
files appear in the vSphere Client datastore browser. In normal circumstances, the
virtual machine’s guest OS and applications write to the flat file.
Database File
The database file is a file with the .vmsd extension that contains snapshot details
required by the Snapshot Manager. It contains details on the relationships between
snapshots and child disks.
Memory File
The memory file is a file with the .vmsn extension that includes the active state of
the virtual machine’s memory. Capturing the memory state of the virtual machine
lets you revert to a powered-on state. Memory snapshots take longer to create
than nonmemory snapshots. The size of the memory impacts the amount of time
required to create the snapshot.
Limitations
The use of snapshots can impact a virtual machine’s performance and can be limited
in some scenarios, as summarized in the following list:
■ Snapshots are not supported for RDM physical mode disks or for iSCSI initia-
tors in a guest OS.
■ Snapshots of powered-on or suspended virtual machines with independent
disks are not supported.
■ A quiesced snapshot requires a supported guest operating system and active
VMware Tools services.
■ Snapshots are not supported with PCI vSphere DirectPath I/O devices.
■ Snapshots are not supported for virtual machines configured for bus sharing.
Chapter 5: vCenter Server Features and Virtual Machines 185
■ Although taking snapshots may be a useful step for a backup utility, a snapshot
is not a backup by itself. A snapshot does not provide a redundant copy of data.
If the base flat file is lost or corrupted, you cannot restore the virtual machine
by reverting to a snapshot.
■ Snapshots can negatively affect the performance of a virtual machine. The per-
formance degradation is impacted by factors such as the age of the snapshot,
the depth of the snapshot tree, and the amount of data in the delta files.
■ Snapshot operations can take much longer to finish when they involve virtual
disks larger than 2 TB.
■ Deleting a large snapshot that is part of the current path (as indicated by You
Are Here in the Snapshot Manager) can negatively impact the performance
and the health of the virtual machine. To minimize risk, you can shut down the
virtual machine prior to deleting the snapshot.
VM Hardware/Compatibility
You can configure a virtual machine’s compatibility setting to control which ESXi
host versions can be used to run the virtual machine. In the vSphere Client, you can
set the Compatible With option for a virtual machine to a compatible ESXi ver-
sion, such as ESXi 8.0 and later or ESXi 6.7 Update 2 and later. The compatibility
setting determines which ESXi host versions the virtual machine can run on and
the hardware features available to the virtual machine. At the host, cluster, or data
center level, you can set the Default VM Compatibility setting. (See Chapter 14 for
details.)
Virtual hardware devices perform the same function for the virtual machines as
physical hardware devices do for traditional servers. Each virtual machine has CPU,
memory, and disk resources. All modern operating systems provide support for vir-
tual memory, allowing software to use more memory than is present in the server
hardware. Similarly, ESXi can provide to its virtual machines VM memory totaling
more than the capacity of the host’s physical memory.
You can add virtual hardware devices to a virtual machine by editing the virtual
machine’s settings in the vSphere Client. Not all devices are configurable. For
example, the PCI and SIO virtual hardware devices are part of the virtual mother-
board but cannot be configured or removed. You can enable the Memory Hotplug
or CPU Hotplug settings in order to add memory or CPU resources to a running
186 VCP-DCV for vSphere 8.x Cert Guide
virtual machine. Memory Hotplug is supported on all 64-bit operating systems, but
some guest operating systems may not be able to make use of the added memory
without restarting. The ESXi license and other factors for the host where the virtual
machine runs may impact the available devices for the virtual machine. For a list of
hardware devices and their functions, see Table 5-3.
Device Description
PCI device If you configured devices to be reserved for PCI passthrough on the host,
you can add up to 16 PCI vSphere DirectPath devices to a virtual machine.
Pointing device The virtual pointing device is mapped to the user’s pointing device when
you connect to the virtual machine console.
Serial port You can configure a virtual machine with up to 32 virtual serial ports.
You can add, remove, or configure virtual serial ports.
SATA controller Provides access to virtual disks and DVD/CD-ROM devices.
The SATA virtual controller appears to the guest OS as an AHCI SATA
controller.
SCSI controller Provides access to virtual disks.
The SCSI virtual controller appears to the guest OS as different types of
controllers, including LSI Logic Parallel, LSI Logic SAS, and VMware
Paravirtual.
SIO controller Provides serial and parallel ports and floppy devices and performs system
management activities.
One SIO controller is available to the virtual machine, but it cannot be
configured or removed.
USB controller The virtual USB controller is the software virtualization of the USB host
controller function in the virtual machine.
USB device You can add multiple virtual USB devices to a virtual machine that you map
to USB devices connected to an ESXi host or a client computer.
VMCI The Virtual Machine Communication Interface (VMCI) device provides
a high-speed communication channel between a virtual machine and the
hypervisor.
You cannot add or remove VMCI devices.
NVMe controller NVM Express (NVMe) is a logical device interface specification for
accessing non-volatile storage media attached through a PCI Express
(PCIe) bus in real and virtual hardware.
NVDIMM Provides access to the non-volatile memory resources of the host.
controller
NVDIMM device You can add up to 64 virtual non-volatile dual in-line memory module
(NVDIMM) devices to a virtual machine.
TPM device You can add a virtual Trusted Platform Module (TPM) 2.0 device to a
virtual machine to allow the guest OS to store sensitive information,
perform cryptographic tasks, or attest the integrity of the guest platform.
188 VCP-DCV for vSphere 8.x Cert Guide
Your choice for the provisioning type depends on each virtual machine’s use case.
For example, if you want to minimize the virtual machine startup time and minimize
its risk, you may choose thick provision lazy zeroed.
VMware Tools
VMware Tools is a set of software modules and services, including services that can
communicate with the VMkernel. This communication allows integration with
vSphere for activities such as customizing the guest OS, running scripts in the guest
OS, and synchronizing time. If you use guest operating systems without VMware
Tools, many VMware features are not available. VMware Tools enhances the per-
formance of the guest OS by enabling the latest drivers for virtual devices, enabling
memory functions (such as ballooning), and more. It includes drivers such as SVGA,
Paravirtual SCSI, VMXNet NIC, mouse, audio, guest introspection, and memory
control drivers. Prior to upgrading the hardware for a virtual machine, you should
upgrade VMware Tools.
VMware Tools includes the VMware user process named vmtoolsd, which enables
copy and paste and mouse control and automatically sets the screen resolution for
some non-Windows guests. It enhances the performance of the virtual machine’s
guest operating system and improves management of the virtual machine. It includes
device drivers and other software that is essential for the VM. VMware Tools gives
you more control over the virtual machine interface.
data centers, clusters, or resource pools on which the virtual machine resides.
Table 5-4 describes the available virtual machine options.
NOTE To migrate virtual machines with disks larger than 2 TB, the source and des-
tination ESXi hosts must be Version 6.0 and later.
Cold Migrations
Moving a powered-off or suspended virtual machine to a new host, new datastore,
or both is considered a cold migration. The required privilege is Resource.Migrate
Powered Off Virtual Machine.
Hot Migrations
Moving a powered-on virtual machine to a new host, new datastore, or both is
considered a hot migration. During the migration, vCenter Server must take
steps to ensure that active connections and services of the virtual machine are not
interrupted.
Cross-Host Migrations
Moving a virtual machine, whether hot or cold, to a new host is considered a cross-
host migration. In vSphere Client wizards that involve cross-host migrations, you
can choose a destination host. Alternatively, when available and properly configured,
you can choose a DRS cluster, resource pool, or vApp as the destination.
The cross-host migration wizards include a Compatibility panel to identify any
compatibility issues or warnings. If the panel displays the message “Compatibility
Checks Succeeded,” you can proceed with no concern. If the panel displays an error,
the migration is disabled for the associated hosts. If it displays a warning message,
the migration is not disabled, and you can proceed, bearing in mind the warning.
For hot migrations, the compatibility check accommodates vMotion CPU compat-
ibility checking.
For a virtual machine using an NVDIMM device and PMem storage, the destina-
tion host or cluster must have available PMem resources to pass the compatibil-
ity check. For a cold migration involving a virtual machine that does not have an
NVDIMM device but uses PMem storage, you can choose a target host or cluster
without available PMem resources. The hard disks use the storage policy and data-
store selected for the virtual machine’s configuration files.
Cross-Datastore Migrations
Moving a virtual machine, whether hot or cold, to a new datastore is considered a
cross-datastore migration.
192 VCP-DCV for vSphere 8.x Cert Guide
With Advanced Cross vCenter vMotion (XVM), you can migrate virtual machines
between vCenter Server, without Enhanced Linked Mode, by providing the
credentials of the other vCenter Server when prompted by the wizard. To perform
a cross-vCenter migration using Advanced Cross vCenter vMotion, you must meet
the following requirements:
■ The vCenter Sever where you initiate the migration must be Version 7.0
Update 1c or later.
■ For powered-on virtual machines, you must have a vSphere Enterprise Plus
license.
■ For powered-off virtual machines, a vSphere Standard license will suffice.
depends on the network bandwidth for the VMkernel adapter enabled for
vMotion migration. For 1 GigE the limit is 4, and for 10 GigE it is 8.
■ Datastore limits: Datastore limits apply to vMotion and Storage vMotion
migrations. Each vMotion migration has a resource cost of 1 against the
shared datastore. Each Storage vMotion migration has a resource cost of 16
against both the source and destination datastores. The datastore limit per
datastore is 128.
■ Host limits: Host limits apply to vMotion, Storage vMotion, and cold migra-
tions. They also apply to virtual machine provisioning operations, including
new deployments, and cloning. Provisioning and vMotion operations have a
host cost of 1. Storage vMotion operations have a host cost of 4. The host limit
per host is 8.
For costing purposes, a hot migration that is both a cross-host and cross-datastore
migration (vMotion migration without shared storage) is considered to be a com-
bination of a vMotion and Storage vMotion migration and applies the associated
network, host, and datastore costs. vMotion migration without shared storage is
equivalent to Storage vMotion migration with a network cost of 1.
Consider the following examples for a four-node DRS cluster with a 10 GigE vMo-
tion network:
■ If you perform nine simultaneous vMotion migrations, the ninth migration is
queued due to the network limit, even if different hosts are involved.
■ If you perform nine simultaneous hot cross-host and cross-datastore migra-
tions involving the same datastore, the ninth migration is queued due to the
datastore limit, even if the migrations are split as to whether the datastore is
the source or the target.
■ You can simultaneously perform one Storage vMotion and four vMotion oper-
ations involving a specific host.
TCP/IP Stacks
You can use the vMotion TCP/IP stack to isolate vMotion traffic and assign it to a
dedicated default gateway, routing table, and DNS configuration. To use the vMo-
tion TCP/IP stack, select vMotion from the TCP/IP Stack drop-down menu when
configuring the associated VMkernel virtual network adapter. When you assign a
VMkernel virtual network adapter to the vMotion stack, you cannot use the adapter
for purposes other than vMotion. Likewise, you can use the provisioning TCP/IP
stack to isolate traffic for cold migration, cloning, and snapshots. To use the provi-
sioning TCP/IP stack, select Provisioning from the TCP/IP Stack drop-down menu
194 VCP-DCV for vSphere 8.x Cert Guide
when configuring the associated VMkernel virtual network adapter. When you
assign a VMkernel virtual network adapter to the provisioning stack, you cannot use
the adapter for purposes other than provisioning.
vMotion Details
This section provides details on the vMotion feature in vSphere.
vMotion Overview
A hot cross-host migration is called a vMotion migration. A hot migration across
hosts and datastores is often called a vMotion migration without shared storage. A
hot cross-vCenter Server migration is often called a cross-vCenter Server vMotion
migration. Although the term vMotion migration may be used to describe any hot
cross-host migration, this section provides details on just the traditional vMotion
migration, in which shared storage is used and cross-datastore migration does not
occur.
During a vMotion migration, the entire state of the virtual machine is moved to the
new host. The state includes the current memory content and all the information
that defines and identifies the virtual machine. The memory content includes the
components of the operating system, applications, and transaction data that are in
the memory. The state includes all the data that maps to the virtual machine hard-
ware elements, such as BIOS, devices, CPU, MAC addresses for the Ethernet cards,
chipset states, and registers. The associated virtual disk remains in the original loca-
tion on storage that is shared between the source and destination hosts. After the
virtual machine state is migrated to the destination host, the virtual machine contin-
ues execution on the destination host.
vMotion Requirements
As explained in the section “Enhanced vMotion Compatibility (EVC)” in Chapter
4, vMotion requires that the destination host’s processors be compatible with the
source host’s processors to support live migration. Specifically, the destination pro-
cessors must come from the same family and provide the same instruction set as
the source processors. You can enable EVC in the cluster to broaden the vMotion
compatibility.
Starting with vSphere 6.7, you can enable EVC at the virtual machine level to facili-
tate the migration of the virtual machine beyond the cluster and across vCenter
Server systems and data centers. You can change the per-VM EVC mode only when
the virtual machine is powered off. The per-VM EVC overrides but cannot exceed
the cluster EVC setting.
Chapter 5: vCenter Server Features and Virtual Machines 195
Before using vMotion, you must address its host configuration requirements. Each
host must meet the licensing, shared storage, and networking requirements for
vMotion.
For standard vMotion migration, you must configure the source and destination
hosts with shared storage to enable the migrated virtual machines to remain in the
same datastore throughout the migration. Shared storage may be implemented
with Fibre Channel, iSCSI, or NAS storage. The datastore may be VMFS or NFS.
You can also leverage a vSAN datastore to meet the shared storage requirement for
vMotion migrations between cluster members.
NOTE Hot migrations that are cross-host and cross-datastore migrations do not
required shared storage, and they are often called vMotion migrations without shared
storage.
For vMotion migration, you must configure each host with a VMkernel virtual
network interface connected to a virtual switch with an uplink that uses at least
one physical network interface card (NIC). VMware recommends that the network
connection be made to a secured network. The vMotion network must provide at
least 250 Mbps of dedicated bandwidth per concurrent vMotion session. For long-
distance migrations, the maximum supported network round-trip time for vMotion
migrations is 150 milliseconds. For faster vMotion migrations, consider using 10
Gbps NICs instead of 1 Gbps NICs. As of vSphere 8.0, you can notify applica-
tions running inside the guest OS whenever a vMotion event starts and finishes.
This notification allows latency-sensitive applications to prepare and even delay a
vSphere vMotion operation.
To improve vMotion migration times even further, consider implementing multi-
NIC vMotion. With multi-NIC vMotion, multiple paths are used simultaneously
to carry the vMotion workload. To configure multi-NIC vMotion, you can enable
vMotion traffic for two VMkernel virtual network adapters that are configured to
use separate paths. For example, you can follow these steps to enable multi-NIC
vMotion, as illustrated in Figure 5-5:
Step 1. On a virtual switch, attach two uplink adapters connected to the vMotion
network.
Step 2. Connect two VMkernel adapters enabled for vMotion.
Step 3. For the first VMkernel adapter, set the first uplink path to Active and the
second uplink path to Standby.
Step 4. For the second VMkernel adapter, set the first uplink path to Standby and
the second uplink path to Active.
196 VCP-DCV for vSphere 8.x Cert Guide
Virtual
Switch Uplink-1
vmk1
vmk2
Uplink-2
For more vMotion performance improvements, you can use Network I/O Control
(NIOC) to guarantee network bandwidth to vMotion traffic. You can also use jumbo
frames. To avoid network saturation, you can use traffic shaping to limit the average
and peak bandwidth available to vMotion traffic.
By default, you cannot use vMotion to migrate a virtual machine that is attached to
a standard switch with no physical uplinks. To change this behavior, you can set the
vCenter Server advanced setting config.migrate.test.CompatibleNetworks.VMOn-
VirtualIntranet to False.
NOTE During a vMotion migration without shared storage, the virtual disk data is
transferred over the vMotion network.
In vSphere 8.0, if you enable network offloads to a data processing unit (DPU)
device, you can use vMotion when both hosts have DPU devices, but you must
prepare the vCenter Server system and VMware NSX as follows:
■ Enable network offload compatibility on the vSphere Distributed Switch
(vDS).
■ Connect hosts to the vDS according to the DPU model.
■ Deploy NSX and configure an NSX transport node for the vDS.
■ Enable Universal Pass Through (UPT) support on the virtual machine that is
to be migrated.
stopped on the source ESXi host, and the VM is resumed on the target ESXi host.
The process involves the following phases:
■ Compatibility check: Intended to ensure that requirements are met and that
the destination host can run the virtual machine.
■ Pre-copy: Briefly stuns the source memory and starts memory trackers.
Copies memory page from source to target. Tracks which source pages are
modified after the pre-copy so these pages (dirty pages) can be re-sent later.
■ Iterations of pre-copy: If dirty pages exist, repeats the pre-copy of just the
dirty pages and scans for new dirtied pages. Continues iteration until no
dirty pages exist or until vMotion determines that the final page copy can be
completed in less than 500 ms.
■ Switchover: Quiesces and suspends the virtual machine execution on the
source host, transfers checkpoint data, and starts the execution of the virtual
machine using the checkpoint data on the target host.
The stun time (that is, the time at which the virtual machine is not running
anywhere) is typically between 100 ms and 200 ms. Stun time is much higher than
this when vGPUs are involved.
Encrypted vMotion
When migrating encrypted virtual machines, vSphere vMotion always uses
encryption. For non-encrypted virtual machines, you can select one of the following
vMotion encryption options:
■ Disabled: Do not use encryption.
■ Opportunistic: Use encryption if the source and destination hosts support it.
■ Required: If the source or destination host does not support encrypted
vMotion, do not allow the migration.
NOTE Only ESXi Versions 6.5 and later use encrypted vSphere vMotion. To use
vMotion to migrate encrypted virtual machines across vCenter Server instances, you
must use the vSphere API.
NOTE Migration with Storage vMotion changes virtual machine files on the desti-
nation datastore to match the inventory name of the virtual machine. The migration
renames all virtual disk, configuration, snapshot, and NVRAM files. If the new names
exceed the maximum filename length, the migration fails.
Step 2. A hidden (shadow) virtual machine starts using the copied files. The
underlying processes (worlds) are visible to the esxtop utility. The virtual
machine continues to run in preexisting worlds.
Step 3. An initial copy of the source virtual disk is made to the destination data-
store, and change block tracking (CBT) is leveraged to track blocks that
are changed after they are copied.
Step 4. Step 3 is repeated until the number of changed blocks is small enough to
support a fast switchover.
Step 5. The system invokes a fast suspend and resume operation that transfers
the running virtual machine to the idling hidden virtual machine. The
virtual machine now runs in the new worlds. The preexisting worlds that
were associated with the virtual machine are removed.
Clones
When you clone a virtual machine, vCenter Server creates a virtual machine that is
a copy of the original virtual machine. The virtual disk files, configuration file, and
other files are copied from the original virtual machine to the new virtual machine.
The new virtual machine is commonly referred to as a clone. The new virtual
machine files are named and stored based on parameters you provide during the
deployment. You can choose to make some configuration changes and customiza-
tions during the cloning process. The contents of some of the files, such as the con-
figuration file, are modified. At the end of the operation, you can manage both the
original virtual machine and the new virtual machine as inventory objects in vCenter
Server.
Cold Clones
A cold clone occurs when the source virtual machine is powered down prior to start-
ing the clone operation. In this case, vCenter Server does not have to worry about
interrupting the execution of the source virtual machine.
Hot Clones
A hot clone occurs when the source virtual machine is running during a clone oper-
ation. In this case, the vCenter Server must avoid disrupting the execution of the
source virtual machine. To do so, it takes a virtual machine snapshot prior to copying
data and removes the snapshot at the end of the operation.
200 VCP-DCV for vSphere 8.x Cert Guide
Linked Clones
A linked clone is a virtual machine that is cloned in such a manner that it shares
its virtual disk files with the original virtual machine (parent). The shared files are
static. Much like a virtual machine that has a snapshot, a linked clone writes its
virtual disk changes to separate data files. Compared to a full clone, a linked clone
operation is faster and conserves disk space. You cannot use the vSphere Client to
directly create linked clones. You can use PowerCLI (via the -LinkedClone param-
eter with the New-VM command) or other VMware products to create linked
clones. For example, in VMware Horizon you can create desktop pools based on
linked clones, and in vCloud Director you can use fast provisioning.
Instant Clones
Starting with vSphere 6.7, you can use the instant clone technology to hot clone
a running virtual machine in a manner that is like a combination of vMotion and
Chapter 5: vCenter Server Features and Virtual Machines 201
linked clone technology. The result of an instant clone operation is a new virtual
machine (destination virtual machine) that is identical to the source virtual machine.
The processor state, virtual device state, memory state, and disk state of the des-
tination virtual machine match those of the source virtual machine. To avoid net-
work conflicts, you can customize the MAC addresses of the virtual NICs, but the
guest customization feature is not supported for instant clones. You cannot use the
vSphere Client to perform an instant clone operation.
A common use case for instant clones is just-in-time deployment in a VMware
Horizon virtual desktop infrastructure (VDI). Instant clones enable you to perform
large-scale deployments by creating virtual machines from a controlled point in
time. For example, VMware Horizon uses Instant Clone to improve the provision-
ing process for virtual desktops. Compared to View Composer, which uses linked
clones, instant clones eliminate some steps (such as reconfiguration and checkpoints)
and replace other steps to greatly reduce the provisioning time. Other use cases are
large deployments of identical virtual servers in the cloud and situations where you
want to reduce boot storms and provisioning times.
During an instant clone (vmFork) operation, the system quiesces and stuns the
source virtual machine, creates and transfers a checkpoint, customizes the destina-
tion MAC address and UUID, and forks the memory and disk. The destination
virtual machine shares the parent virtual machine’s disk and memory for reads. For
writes, the destination machine uses copy on write (COW) to direct disk and mem-
ory changes to delta files and private memory space.
The requirements for instant clones may depend on the software applications that
use the API to perform the cloning operations. For example, VMware Horizon 7.1
requires static port binding, ESXi 6.0 Update 1 or later, and a distributed virtual
switch.
Instant cloned virtual machines are fully independent vCenter Server inventory
objects. You can manage instant clone destination virtual machines as you would
regular virtual machines, without any restrictions.
202 VCP-DCV for vSphere 8.x Cert Guide
Review Questions
1. Which of the following is not a valid use case for virtual machine snapshots?
a. Rolling back guest OS changes
b. Recovering from the accidental deletion of a flat file
c. Troubleshooting
d. Linking a clone in a vRA blueprint
2. You are troubleshooting a virtual machine by using the vSphere Client. Which
of the following is not a valid debugging and statistics advanced setting?
a. Record Trivial
b. Record Debugging
c. Run Normal
d. Record Statistics
3. Which of the following is the proper order of phases that occur during a vMo-
tion operation?
a. Compatibility check, pre-copy, switchover
b. Pre-copy, compatibility check, switchover
c. Pre-copy, switchover, compatibility check
d. Compatibility check, switchover, pre-copy
4. You want to hot migrate a virtual machine from one ESXi host and VMFS
datastore on one storage array to another ESXi host and VMFS datastore on a
separate storage array. Which of the following statements is true?
a. This operation is not supported in vSphere 8.0.
b. The virtual disk data is transferred over the management network.
c. The virtual disk data is transferred over the vMotion network.
d. You must perform the operation in two separate steps: in vMotion and in
Storage vMotion.
■ vSphere Add-ons
■ Aria Suite
■ Desktop and Application Virtualization
■ Replication and Disaster Recovery
■ Private, Public, and Hybrid Clouds
■ Networking and Security
Table 6-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
vSphere Add-ons 1
Aria Suite 2, 3
Desktop and Application Virtualization 4–6
Replication and Disaster Recovery 7
Private, Public, and Hybrid Clouds 8, 9
Networking and Security 10
3. You want to decrease time and effort spent on root cause analysis in your data
center. Which of the following products should you use?
a. VMware Aria for Logs
b. VMware Aria Operations
c. VMware Aria Automation
d. VMware Aria Operations for Networks
4. You want to deliver VDI using stateless virtual desktops and just-in-time deliv-
ery of user profile data and applications. Which products should you choose?
(Choose two.)
a. VMware Horizon
b. Dynamic Environment Manager
c. vSphere Replication
d. HCX
e. App Volumes
5. You want to use App Volumes in your Horizon VDI environment. Which
other environments can benefit from App Volumes? (Choose two.)
a. VCF
b. VMware on AWS
c. Citrix XenApp
d. RDSH
6. You want to provide replication for your vSphere virtual machines to a remote
site. Which of the following includes the required software?
a. vSphere Essentials
b. Aria Suite
c. vSphere Foundations
d. vSphere Standard
Chapter 6: VMware Product Integration 207
7. Which of the following are use cases for VMware Site Recovery Manager?
(Choose two.)
a. Replicate data
b. Planned migrations
c. Disaster recovery
d. VDI
e. Data center automation
8. You want to use a platform that provides Cloud Builder and SDDC Manager.
Which product should you choose?
a. HCX
b. Aria Automation
c. VCF
d. Aria Operations for Networks
10. You want to adopt zero-trust security and automated network deployment.
Which of the following products should you use?
a. VMware NSX
b. HCX
c. VCF
d. AppDefense
208 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
vSphere Add-ons
This section addresses the following products that are part of vSphere or directly
related to vSphere but that are not covered in detail in other chapters of this book:
■ vSphere with Tanzu: A vSphere edition that natively provides support for
containers in the hypervisor
■ vSphere+: A product that transforms an on-premise vSphere environment to a
SaaS (software as a service)-based infrastructure.
■ vCenter Converter: A product that facilitates the conversion of physical and
other servers into virtual machines running in vSphere
■ vSphere Replication: A virtual machine replication feature that is included
with specific vSphere editions
■ VMware Skyline: A proactive support offering for many VMware products,
including vSphere
vSphere Namespace
Kubernetes Workloads Kubernetes Workloads
Tanzu Tanzu
vSphere Kubernetes vSphere Kubernetes
VMs VMs
Pods Grid Pods Grid
Cluster Cluster Developer
vSphere Namespace
Supervisor
A vSphere namespace is a domain and resource boundary where vSphere pods, VMs,
and Tanzu Kubernetes Grid clusters can run. A vSphere administrator can create
vSphere namespaces on the supervisor. Initially, a namespace has unlimited resources
within the supervisor. However, it is possible to set limits on the namespace’s com-
pute and storage resource, which is backed by vSphere resource pools and Kuber-
netes storage quotas. You can provide DevOps engineers and other user groups with
access to vSphere namespaces by applying permissions to user groups available via
vCenter Single Sign-on identity sources or via an OpenID Connect (OIDC) pro-
vider registered with the supervisor. Figure 6-2 shows the architecture of a single-
cluster supervisor.
You can provide high availability for Kubernetes workloads against cluster-level fail-
ures by using vSphere zones. You can use the vSphere Client to create vSphere zones
and map them to vSphere clusters. You can deploy a supervisor on three vSphere
zones for high availability. Alternatively, you can deploy a supervisor on a single
vSphere cluster, which creates a vSphere zone automatically. You can also deploy a
supervisor to a cluster that is already mapped to a zone.
210 VCP-DCV for vSphere 8.x Cert Guide
vSphere Pod
CRX
Supervisor
Control
Tanzu Plane VM
VM Cluster
Kubernetes Spherelet
Operator API
Grid VM
Zone A
vSphere Cluster
vSphere Namespace
Supervisor
Control
Tanzu Plane VM
VM Cluster
Kubernetes
Operator API
Grid VM
In vSphere 8.0 with Tanzu, NSX for the networking stack supports vSphere pods,
Tanzu Kubernetes clusters, Embedded Harbor Registry, and load balancing. vDS for
the networking stack does not support vSphere Pods or Embedded Harbor Registry.
Each choice for the networking stack involves a unique implementation workflow.
For example, here are the main steps for deploying a three-node supervisor with
NSX as the networking stack:
Step 1. Configure the compute resources by deploying three vSphere clusters
and configuring DRS and HA.
Step 2. Use the vSphere Client to map a zone to each cluster by selecting the
vCenter Server and choosing Configure > vSphere Zones > Add New
vSphere Zone.
Step 3. Configure vSAN or other shared storage and create storage policies.
Step 4. Create a vDS, create distributed port groups, and add the hosts to the
vDS.
Step 5. Deploy and configure NSX Manager by deploying NSX Manager nodes,
adding a Compute Manager, creating transport zones, creating IP pools,
creating uplinks and profiles, and configuring NSX on the cluster.
Step 6. Deploy and configure NSX Edge transport nodes by creating an NSX
Edge cluster, creating an NSX Tier-0 uplink segment, and creating an
NSX Tier-0 gateway.
Step 7. Deploy and configure the supervisor.
These are the high-level steps for deploying and configuring a supervisor:
Step 1. In the vSphere Client, use Home > Workload Management > Get
Started to provide a name, vSphere cluster, storage, load balancer, net-
work mode, and other settings for the supervisor.
Step 2. Assign a license to the supervisor by selecting Workload Management >
Supervisors > Configure > Licensing.
Step 3. Select Workload Management > Namespaces > Create Namespace to
create the namespace and assign its compute resource limits, storage lim-
its, permissions, and security policy.
Step 4. Select Workload Management > Supervisors > Configure to generate
the CSR and then select Workload Platform Management > Actions >
Replace Certificate.
Step 5. Integrate the Tanzu Kubernetes Grid on the supervisor with Tanzu
Mission Control by setting the registration URL at Workload
Management > Configure > TKG Service Tanzu Mission Control.
Chapter 6: VMware Product Integration 213
Step 6. Set the default container network interface (CNI) by selecting Workload
Management > Configure > TKG Service.
Step 7. Change the control plane size and the management network settings of
the supervisor by selecting Workload Management > Supervisors >
Configure and setting the Network and Control Plane Size options.
To view the state and settings of a vSphere namespace using the vSphere Client,
expand the vSphere cluster in the inventory pane, select the Namespaces resource
pool, and examine the Status, Permissions, Storage, Capacity and Usage, and Tanzu
Kubernetes cards. To change permissions, storage, or resource limit settings, select
the appropriate option in the appropriate card, such as Manage Permissions, Edit
Storage, or Edit Limits.
You can create a Tanzu Kubernetes Grid workload cluster by using these high-level
steps:
Step 1. Install the Tanzu CLI in a bootstrap machine (Windows, Linux, or Mac).
Step 2. Install Kubernetes CLI and other tools in the bootstrap machine.
Step 3. Connect the Tanzu CLI to the supervisor.
Step 4. Create a configuration file with a Kubernetes-style object specification
for the cluster object
Step 5. Create the cluster with the tanzu cluster create command.
vSphere+
VMware vSphere+ brings together on-premises and cloud components to form a
hybrid solution. It is a cloud-connected subscription-based offering that connects
the existing vCenter Server and ESXi hosts you have running on premises today
with VMware Cloud. Workloads continue to run on premises, but the management
platform runs in the cloud. vSphere+ is designed to transform existing on-premises
deployments into SaaS-enabled infrastructure, providing centralized management
and high-value cloud services through the VMware Cloud console. The on-premises
vCenter Server is connected to a Cloud console through a VMware cloud gateway.
The Cloud console centralizes many tasks that would normally need to be per-
formed separately from multiple vCenter instances. It provides administrative ser-
vices, such as vCenter lifecycle management, global inventory, event view, security
health check, VM provisioning, and configuration management services.
With vSphere+, you get developer services, such as Tanzu Kubernetes Grid service,
VM service, network service, storage service, Tanzu integrated service, and Tanzu
Mission Control Essentials.
214 VCP-DCV for vSphere 8.x Cert Guide
vSphere+ Integration
The transition from on-premises vSphere to vSphere+ involves an in-place upgrade
and a license conversion. The upgrade involves connecting the on-premises vCenter
Server to VMware Cloud via one or more cloud gateways. It may require upgrading
vCenter Server to the latest release. After that, you convert your vSphere licenses to
subscriptions.
vCenter Converter
VMware vCenter Converter (also called Converter Standalone) is a free solution that
automates the process of converting existing Windows and Linux machines into
virtual machines running in a vSphere environment. The source machines can be
physical servers or virtual machines in non-ESXi environments. You can use Con-
verter to convert virtual machines running in VMware Workstation, VMware Fusion,
Hyper-V, and Amazon EC2 Windows to virtual machines running in vSphere.
With Converter, you can hot clone Windows servers without disrupting users of the
source Windows Server. With hot cloning, you can minimize downtime when con-
verting existing Windows and Linux servers to virtual machines running in vSphere.
Converter offers a centralized management console that allows users to queue and
monitor multiple simultaneous remote and local conversions.
VMware SkyLine
VMware Skyline is a proactive support technology, developed by VMware Global
Services, that is available to customers with an active Production Support or Premier
Services agreement. Skyline helps you avoid problems before they occur and reduces
the amount of time spent on support requests.
The Skyline architecture includes Skyline Collector, a standalone on-premises vir-
tual appliance for secure, automatic data collection. It also includes Skyline Advisor,
a self-service web portal for accessing your VMware inventory, proactive findings,
recommendations, and risks. You can segment data by factors such as region and
lines of business. You can use VMware Cloud Services console to control user access
and permissions. With a Premier Services agreement, you can access executive sum-
mary reports and view more powerful recommendations.
You can use Skyline Advisor to access Skyline Log Assist, which automatically (with
your permission) uploads support log bundles to VMware Technical Support and
eliminates manual procedures for log gathering and uploading. If you approve
a request in Skyline Advisor, the requested logs are automatically uploaded to
VMware Support. Likewise, you can choose to proactively push log files to VMware
Support by using Log Assist within Skyline Advisor.
Aria Suite
This section covers the Aria Suite, formerly known as vRealize Suite, which is a
set of products that provides a layer for operations, automation, and analysis for
software-defined data centers and hybrid clouds.
Aria Operations
Aria Operations Manager (formerly known as vRealize Operations) provides opera-
tions management for private, hybrid, and multi-cloud environments in a single
pane of glass. It offers full-stack visibility from physical, virtual, and cloud infrastruc-
ture to virtual machines, containers, and applications. It provides continuous perfor-
mance optimization, efficient capacity planning, cost management, and integrated
compliance. It offers self-driving operations and intelligent remediation. It is avail-
able as an on-premises offering and as a SaaS offering.
Aria Operations provides intelligent alerts, trending, and forecasting functionality.
It uses current, historical, and predicted data for capacity analysis. For example, it
calculates and provides a Days Remaining metric for many managed objects, such as
vSphere clusters and datastores. This metric represents the number of days until the
resource is predicted to have insufficient capacity. It applies customizable policies for
everything it does. For example, you can use policies to adjust headroom buffers and
provisioning lead times that impact capacity analysis.
Aria Operations provides many native dashboards for management and trouble-
shooting. In addition, it offers many management packs to extend its operations
beyond just vSphere. For example, you can install VMware-provided and third-party
management packs that support operations for vSAN, NSX, third-party network
gear, third-party storage system, and third-party software applications. Each man-
agement pack has its own unique requirements, which typically include installing the
pack and connecting it to a management endpoint for the managed entity.
When connecting the vCenter Server to Aria for Logs, you must provide a service
account with appropriate privileges. To collect structured data from the vCenter
Server, the service account must have the System.View privilege. To collect syslog
data from ESXi hosts, the account must have the following privileges:
■ Host.Configuration.Change settings
■ Host.Configuration.Network configuration
■ Host.Configuration.Advanced Settings
■ Host.Configuration.Security Profile and Firewall
See the “Aria for Logs” section in Chapter 10 for instructions on configuring vRLI
to integrate with vCenter Server.
Aria Automation
Aria Automation (formerly known as vRealize Automation) is an automation plat-
form for private and multi-cloud environments. It delivers self-service automation,
DevOps for infrastructure, and network automation that help you increase your
business’s agility, productivity, and efficiency. With Aria Automation, your internal
IT teams, DevOps engineers, developers, and others get the infrastructure, applica-
tions, and resources they need as a service with a public cloud–like experience. Cus-
tomers benefit from increased speed, flexibility, reliability, and scalability, and you
maintain security and control.
Aria Automation includes Cloud Assembly, Service Broker, and Code Stream:
■ You can use Cloud Assembly to iteratively develop and deploy blueprints for
your vSphere environment and other clouds.
■ You can use Service Broker to create, manage, and use self-service catalog items.
■ You can use Code Stream to create pipelines that automate your entire
DevOps lifecycle, including automation of software testing and release.
With Cloud Assembly, you can build blueprints that automatically provision virtual
machines based on existing virtual machines and templates in your vSphere envi-
ronment. In a blueprint, you define the provisioning method, such as full clone or
linked clone. You can configure the blueprint to provision multiple virtual machines,
applications, and networks. For example, you can develop a blueprint to deploy a
multitier application involving multiple virtual machines, networks, and software
components. You can publish the blueprints and use Service Broker to make them
available as a service in the self-service catalog. You can configure Aria Automa-
tion to allow consumers to provision the multitier application and its networks on
demand and to destroy it when it is no longer needed.
Chapter 6: VMware Product Integration 219
Aria Orchestrator
Aria Orchestrator (formerly known as vRealize Orchestrator) is a modern workflow
automation platform that simplifies complex infrastructure processes. It is a key
component of Aria Automation for providing custom workflows within on-demand
services and providing anything as a service (XaaS). It can be used independently to
run prebuilt workflows and to create custom workflows. It automates management
and operational tasks of VMware and third-party systems, such as ticketing systems,
change management systems, and IT asset management systems.
220 VCP-DCV for vSphere 8.x Cert Guide
In a vSphere environment, you may frequently perform some operational tasks. For
example, say that you frequently receive requests to support the update procedure
for a complex application involving multiple virtual machines. For each update, you
are required to take the following actions:
Step 1. Shut down the virtual machines, one by one, in a specific order, ensur-
ing that each shutdown operation completes prior to beginning the next
shutdown.
Step 2. Create a snapshot of each virtual machine.
Step 3. Power on the virtual machines, one by one, in a specific order, ensuring
that the guest OS and application services for each one are running prior
to beginning the next power on.
Step 4. Inform the application team that the application is ready for update.
Step 5. Following a successful update, delete the snapshots.
With Aria Orchestrator, you can build workflows to automate all or portions of such
an operation. For example, Aria Orchestrator provides out-of-the-box workflows for
virtual machine power and snapshot operations. You can build a custom workflow
that leverages the existing workflows as nested workflows. In the custom workflow,
you can add data input, conditional paths, looping, and monitoring.
To support IPFIX, you also need the Modify and Port Configuration Operation
privilege on the distributed switches and Modify and Policy Operation on the dis-
tributed port groups.
To identify VM-to-VM paths, you must install VMware Tools in the virtual
machines.
222 VCP-DCV for vSphere 8.x Cert Guide
VMware Horizon
VMware Horizon is a platform for securely delivering virtual desktops and applica-
tions in private clouds and hybrid clouds. It enables provisioning and management
of desktop pools that have thousands of virtual desktops each. It streamlines the
management of images, applications, profiles, and policies for desktops and their
users. It integrates with VMware Workspace ONE Access, which establishes and
verifies end-user identity with multifactor authentication and serves as the basis
for conditional access and network microsegmentation policies for Horizon virtual
desktops and applications.
Horizon includes instant clones and works with VMware Dynamic Environment
Manager and VMware App Volumes to dynamically provide just-in-time (JIT) deliv-
ery of user profile data and applications to stateless desktops.
Horizon provisions large pools of virtual desktops from a small set of base virtual
desktops by integrating with vCenter Server. Horizon makes the provisioning
requests, which are carried out by vCenter Server in the appropriate vSphere clus-
ters. vSphere provides the environment, including the compute, storage, and net-
work resources for running the virtual desktops. With vSphere DRS and vSphere
HA, it provides load balancing and high availability.
user credentials. You can use the administrator account in the SSO domain (admin-
istrator@vsphere.local by default) or, preferably, an account that is assigned the
minimum privileges. The minimum privileges include virtual machine provisioning,
configuring, and interaction, plus other privileges such as folder management and
datastore allocation. The use of instant clones requires additional privileges.
App Volumes
VMware App Volumes is a set of application and user management solutions for
VMware Horizon, Citrix Virtual Apps and Desktops, and Remote Desktop Services
Host (RDSH) virtual environments. It streamlines your ability to deliver, update,
assign, and manage applications and users across virtual desktop infrastructure
(VDI) and published application environments. With App Volumes, you install an
application once, using a provisioning computer, collect the application components
in application packages, and centrally control the mapping of application packages
to desktops.
Application packages and companion writable volumes are stored in virtual disk files
and attached to virtual machines to deliver applications. Updates to applications
involve updating or replacing application packages or their mappings to desktops.
In RDSH environments, applications are installed on servers and delivered via
Remote Desktop. Using App Volumes with RDSH simplifies the installation and
management of the application on the server. Instead of attaching an application
package to desktops, you attach the application package to RDSH servers and allow
RDSH to deliver the application to users.
vSphere Replication
vSphere Replication is an extension to VMware vCenter Server that provides
hypervisor-based virtual machine replication and recovery. It provides virtual
machine replication between the following source and destination combinations:
■ Data center to data center
■ Cluster to cluster within a data center
■ Multiple source sites to a shared target site
You can leverage alarms in vCenter Server to get alerts about issues in vSphere
Replication, such as issues with the connection, a VRS instance, or a specific
replication. For example, you configure an alarm to be triggered whenever a
configured replication exceeds the configured RPO.
vSphere Replication 8.6 offers the following additional options when replicating a
virtual machine:
■ Recovery point objective (RPO)
■ Guest file system quiescing
■ Data compression
■ Data encryption
■ Multiple points in time (MPIT)
■ Replication seeds
SRM is tightly integrated with vSphere Replication in vSphere 8.0. To use SRM,
you begin by navigating to Home > Site Recovery in the vSphere Client.
SRM Integration
Prior to installing SRM, you should implement a supported replication technology,
such as EMC RecoverPoint or vSphere Replication. You need to deploy SRM to
both the source and target sites. You can install a Windows-based version of SRM in
a supported Windows server, or you can deploy the SRM virtual appliance. In most
cases, you should deploy the SRM appliance, which includes an embedded vPost-
greSQL database that supports a full-scale SRM environment.
At each site, you need to deploy an SRM server and register it with a vCenter Server.
SRM requires a separate vCenter Server at the source site and at the target site.
SRM uses Transport Layer Security (TLS) and solution user authentication for
secured connections with vCenter Server. It assigns a private key and a certificate
to the solution user and registers it with the vCenter Single Sign-On service. When
you pair SRM instances across vCenter Servers that do not use Enhanced Linked
Mode, Site Recovery Manager creates an additional solution user at the remote site.
Each version of VCF includes a set of specific VMware products and specific ver-
sions. For example, these are the main components in a private cloud powered by
VCF 4.5:
■ Cloud Builder 4.5
■ SDDC Manager 4.5
■ vCenter Server 7.0U3h
■ ESXi 7.0U3g
■ vSAN 7.0U3g
■ NSX-T 3.2.1.2
■ Aria Suite 8.8.2
Cloud Builder is the VCF component that automates the deployment of the entire
software-defined stack. SDDC Manager is the VCF component that automates the
entire system lifecycle and simplifies day-to-day management and operations.
The standard model for VCF uses separate virtual infrastructure domains for run-
ning management and user workloads. VCF also supports a consolidated model, in
which the management and user workloads run in the same virtual infrastructure
domain.
VCF Integration
To get started with VCF, you should prepare ESXi hosts for the implementation of
the management domain, address network and environment prerequisites, fill in the
deployment parameter workbook, deploy the VMware Cloud Builder appliance, and
use Cloud Builder to deploy the management domain, including vCenter Server.
HCX Integration
To integrate HCX into an on-premises vSphere environment, you need to imple-
ment HCX components that connect the environment to another environment,
such as a hosted private cloud or hybrid cloud. The following are the key compo-
nents, which provide the services described in Table 6-2:
■ HCX Connector and HCX Cloud Installation
■ HCX-IX Interconnect Appliance
Chapter 6: VMware Product Integration 231
VMware HCX is used in VMware on AWS, Azure VMware Solution, and other
hybrid cloud solutions.
NSX
VMware NSX Data Center (NSX) is a network virtualization and security platform
that enables a software-defined approach to networking that extends across data
centers, clouds, and application frameworks. NSX enables you to provision and
manage networks independently of the underlying hardware, much as you do with
virtual machines. You can reproduce a complex network in seconds and create mul-
tiple networks with diverse requirements.
NSX provides a new operational model for software-defined networking and
extends it to the virtual cloud network. It provides a complete set of logical network-
ing, security capabilities, and services, such as logical switching, routing, firewalling,
load balancing, virtual private networking, quality of service (QoS), and monitoring.
NOTE Starting with Version 4.0.0.1 (which is equivalent to Version 4.0 for
on-premises NSX), VMware NSX-T Data Center is now known as VMware NSX.
VMware NSX-T Data Center (NSX-T) was originally developed for non-vSphere
environments, but now it now supports vSphere. Although VMware previously
offered separate NSX-V (end-of-life) and NSX-T products, starting with Version 4.0,
VMware NSX-T Data Center is known as VMware NSX.
The NSX platform provides the following components:
■ NSX managers
■ NSX edge nodes
■ NSX distributed routers
■ NSX service routers
■ NSX segments (logical switches)
NSX Integration
To prepare for an NSX installation, you need to meet the requirements for deploy-
ing its components, such as the NSX managers and edge nodes. Typically, a three-
node NSX Manager cluster is deployed to a management vSphere cluster, and the
NSX edges are deployed in a shared edge and compute cluster.
After deploying the required virtual appliances from OVF, you log in to NSX Man-
ager and add a vCenter Server as a compute manager. When adding the vCenter
Server compute manager, you should use the administrator account of the Single
Sign-On domain (administrator@vsphere.local by default) or use a custom account
configured with the appropriate privileges. Next, you deploy NSX edges to vSphere
clusters managed by the vCenter Server and create the transport zones and transport
nodes.
Starting with vSphere 7.0 and NSX-T 3.0, you can run NSX directly on a vDS
(Version 7.0 or later). This provides simpler integration in vCenter Server as well as
some other benefits. When creating transport nodes on ESXi hosts, you use vDS as
the host switch type.
234 VCP-DCV for vSphere 8.x Cert Guide
Review Questions
1. You want to build custom workflows to support XaaS. Which product should
you use?
a. Aria for Logs
b. Aria Orchestrator
c. Aria Operations
d. App Volumes
2. You need to provide virtual desktops and applications to remote users and call
centers. Which product should you implement?
a. VCF
b. Aria Suite
c. AppDefense
d. Horizon
3. You want to configure vSphere Replication using the vSphere Client. Which
of the following is the correct navigation path?
a. Home > vCenter Server > vSphere Replication
b. Home > Site Recovery > Open Site Recovery
c. Home > Host and Clusters > Replications
d. Home > Administration > Replication
5. For your virtual infrastructure, you want to adopt zero-trust security, imple-
ment multi-cloud networking, and use automated network deployment. Which
product should you consider?
a. VMware Horizon
b. VMware SRM
c. VMware Aria
d. VMware NSX
This chapter covers the following topics:
■ vSphere Certificates
■ vSphere Permissions
■ ESXi and vCenter Server Security
■ vSphere Network Security
■ Virtual Machine Security
■ Available Add-on Security
vSphere Security
Table 7-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundations Topics Section Questions Covered in This Section
vSphere Certificates 1, 2
vSphere Permissions 3, 4
ESXi and vCenter Server Security 5, 6
vSphere Network Security 7
Virtual Machine Security 8, 9
Available Add-on Security 10
1. You are preparing to import certificates for your vSphere 8.0 environment.
Which of the following is not a requirement?
a. x509 Version 3
b. PKCS8 and PKCS1 PEM format
c. Digital signature and key encipherment keys
d. 1024 to 16,384-bit keys
238 VCP-DCV for vSphere 8.x Cert Guide
2. You are making plans for ESXi host certificates. Which of the following is not
a valid certificate mode?
a. VMware Endpoint Certificate Store Mode
b. VMware Certificate Authority Mode
c. Custom Certificate Authority Mode
d. Thumbprint Mode
3. You are preparing to apply permissions in vCenter Server. Which of the fol-
lowing is a system role?
a. Read-only
b. Virtual machine user
c. Datastore consumer
d. Content library administrator
5. You are hardening your ESXi hosts. Which of the following is true concerning
normal Lockdown Mode?
a. All users with administrator privileges on the host can access the DCUI.
b. All users in the Exception Users list can access the DCUI.
c. No one can access the DCUI.
d. Users identified in the host’s DCUI.Access advanced option can access
the DCUI.
6. You are creating user accounts in the vCenter SSO domain. With default set-
tings, which of the following is a valid password?
a. VMware1!
b. VMworld!
c. VMwareR0cks
d. VMwarerocks!!
Chapter 7: vSphere Security 239
7. You are configuring IPsec on your ESXi hosts. Which of the following com-
mands can you use to list the available security associations on an ESXi host?
a. esxcli network ipsec sa list
b. esxcli network ip ipsec sa list
c. esxcli network ip ipsec list
d. esxcli network ip sa list
8. You want to migrate virtual machines across vCenter instances. Which of the
following statements is true concerning vMotion migration across vCenter
Server instances?
a. You cannot use vMotion across vCenter Servers.
b. The source and target vCenter Servers must share the same KMS
cluster.
c. vMotion migration of encrypted virtual machines is not supported.
d. Encrypted vMotion migration of non-encrypted virtual machines is not
supported.
10. You want to use microsegmentation to protect the applications and data in
your vSphere environment. What should you implement?
a. VMware AppDefense
b. VMware NSX
c. VMware vRealize Automation
d. VMware vRealize Log Insight
240 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
vSphere Certificates
This section describes the use of certificates in a vSphere environment.
vSphere
VMCA
Signed Signed Signed
Machine-Certs
VECS is a local (client-side) repository for certificates, private keys, and other certif-
icate information that can be stored in a keystore. You can choose not to use VMCA
as your certificate authority and certificate signer, but you must use VECS to store
all vCenter certificates and keys. ESXi certificates are stored locally on each host and
not in VECS. The stores included in VECS are described in Table 8-9 in Chapter 8,
“vSphere Installation.”
VMware recommends that you use either VMCA default certificates or a hybrid
mode. If you use VMCA in a hybrid approach, you replace the vCenter Server SSL
certificates and allow VMCA to manage certificates for solution users and ESXi
hosts. Optionally, for high-security deployments, you can replace the ESXi host SSL
certificates. Table 7-3 summarizes VMware’s recommended modes for managing
certificates.
Certificate Requirements
The following requirements apply to all imported certificates:
■ The key size is 2048 bits to 16,384 bits.
■ VMware supports PKCS8 and PKCS1 (RSA key) PEM formats. When you
add keys to VECS, they are converted to PKCS8.
■ x509 Version 3 is required.
■ SubjectAltName must contain DNS Name=machine_FQDN.
■ CRT format is required.
■ The digital signature and key encipherment keys are available.
■ Enhanced Key Usage can either be empty or contain Server Authentication.
If you do not generate certificate signing requests (CSRs) using Certificate Manager,
you need to ensure that a CSR includes the fields listed in Table 7-4.
If you use VMCA as an intermediate CA, you can use the vSphere Certificate
Manager to create a CSR or you can create a CSR manually. When you create a
CSR manually, in addition to the previously stated requirements, you should con-
sider the requirements in Table 7-5, which are based on the specific certificate types.
NOTE Do not use CRL distribution points, authority information access, or certifi-
cate template information in any custom certificates.
NOTE Do not confuse the machine solution user certificate with the machine SSL
certificate. The machine solution user certificate is used for SAML token exchange.
The machine SSL certificate is used for secure SSL connections for a machine.
NOTE If you apply custom certificates to hosts but do not change the certificate
mode to Custom Certificate Authority, VMCA might replace custom certificates
when you select Renew in the vSphere Client.
You can use the vSphere Client to view expiration data for certificates, whether they
are signed by VMCA or a third party. The vCenter Server raises yellow alarms for
hosts where certificates expire shortly (that is, in less than 8 months) and red alarms
where certificates are in the Expiration Imminent state (that is, expire in less than 2
months).
ESXi hosts that boot from installation media have autogenerated certificates. When
a host is added to the vCenter Server system, it is provisioned with a certificate that
is signed by VMCA as the root CA.
246 VCP-DCV for vSphere 8.x Cert Guide
vSphere Permissions
This section describes the permissions model in vSphere.
root object
(global permissions level)
vCenter Server
content library
(vCenter Server instance level)
data center
virtual
machine
An object might have multiple permissions but only one permission for each user or
group. In other words, you cannot assign to an object two permissions that specify
the same group. If multiple permissions are applied to a specific object using mul-
tiple groups and if a specific user belongs to more than one of these groups, then
the effective permission for that user on that object is the union of the privileges in
applicable roles.
Privileged users can define permissions on managed objects, including the following:
■ Clusters
■ Data centers
■ Datastores
■ Datastore clusters
■ Folders
248 VCP-DCV for vSphere 8.x Cert Guide
■ Hosts
■ Networks (except vSphere Distributed Switches)
■ Distributed port groups
■ Resource pools
■ Templates
■ Virtual machines
■ vSphere vApps
A role is composed of a set of privileges. Out of the box, the vCenter Server provides
many roles. You cannot modify the vCenter Server system roles. The main system
roles are described in Table 7-9. You can modify the sample roles, but VMware rec-
ommends that you not modify these roles directly but instead clone the roles and
modify the clones to suit your case.
NOTE Changes to roles take effect immediately, even for users who are currently
logged in to vCenter Server. One exception is with searches, where a change is not
realized until the next time the user logs in to vCenter Server.
Chapter 7: vSphere Security 249
To become familiar with the privileges in a role, you can edit the role and explore
the privileges that are included in the role. For example, if you edit the virtual
machine console user role, you see that it only includes some privileges in the Vir-
tual Machine > Interaction category and no other privileges. Specifically, it includes
only these privileges:
■ Acknowledge alarm
■ Answer question
■ Configure CD media
■ Configure floppy media
■ Connect devices
250 VCP-DCV for vSphere 8.x Cert Guide
■ Console interaction
■ Install VMware tools
■ Power off
■ Power on
■ Reset
■ Suspend
NOTE If you create a role, it does not inherit privileges from any of the system roles.
Permissions
The permissions model for vCenter Server systems relies on assigning permissions
to objects in the object hierarchy. A permission is the assignment of a user (or group)
and a role to an inventory object. A permission is set on an object in the vCenter
object inventory. Each permission associates the object with a group (or user) and
a role, as illustrated in Figure 7-3. For example, you can select a virtual machine
object, add one permission that gives the read-only role to Group 1, and add a
second permission that gives the administrator role to User 2.
Permission
Privilege
Privilege
•
•
•
Privilege User of Group
Global Permissions
Most entities that appear in the vCenter Server inventory are managed objects
whose access can be controlled using permissions. You cannot modify permissions
Chapter 7: vSphere Security 251
on entities that derive permissions from the root vCenter Server system, such as the
following:
■ Custom fields
■ Licenses
■ Roles
■ Statistics intervals
■ Sessions
The global root object is used to assign permissions across solutions. The vCenter
Server is an example of a solution, and it is attached as a child to the global root
object in the hierarchy. The content library and tag category objects are also
attached as children to the global root object. Global permissions are permissions
that are applied to the global root object and span solutions. For example, a global
permission can be applied to both vCenter Server and Aria Orchestrator. Each
solution has its own root object in the hierarchy, whose parent is the global root
object. You can give a group of users read permissions to all objects in both object
hierarchies.
For example, you can assign a permission to a virtual machine folder and enable
propagation to ensure that the permission applies to all VMs in the folder.
■ Use the no access role to mask or hide specific areas of the hierarchy. The no
access role restricts access for the users or groups with that role.
NOTE Changes to licenses propagate to all linked vCenter Server systems in the
same vCenter Single Sign-On domain.
Table 7-10 shows the required privileges for a few common tasks.
Group-02 - Administrator
host-01 Group-04 - Read Only
Group-04 - No Access
■ User-B:
■ Can perform all tasks on the cluster object
■ Can perform all tasks on the host-01 object
■ Can perform all tasks on the host-02 object
■ User-C:
■ Cannot view or perform any task on the cluster object
■ Can perform all tasks on the host-01 object
■ Can only view the host-02 object
Chapter 7: vSphere Security 257
■ User-D
■ Can only view the cluster object
■ Can only view the host-01 object
■ Cannot view or perform any task on the host-02 object
■ User-E
■ Cannot view or perform any task on the cluster object
■ Can perform all tasks on the host-01 object
■ Can only view the host-02 object
cases because the service has been modified to run only functions that a web
client requires for administration and monitoring.
■ VMware monitors all security alerts that can affect ESXi security and issues
security patches when needed.
■ Secure services such as SSH and SFTP are available and should be used
instead of insecure counterparts, such as Telnet and FTP.
■ ESXi provides the option of using UEFI Secure Boot.
■ When a TPM 2.0 chip is available in the hardware and configured in the sys-
tem UEFI BIOS, ESXi works with Secure Boot to enhance security and trust
assurance rooted in hardware.
Security Profiles
You can customize many of the essential security settings for a host through the
Security Profile panel in the vSphere Client. You can use security profiles to custom-
ize services and configure the ESXi firewall. Table 7-11 describes the services that
are available for viewing and managing through the vSphere Client for a default
vSphere installation, along with the default state for each of them. You can use the
vSphere Client to start, stop, and restart individual services.
Table 7-12 lists the firewall ports that are installed by default in ESXi 7.0. On a
specific host, the list of actual services and firewall ports can be impacted by the cur-
rently installed VMware Installation Bundles (VIBs).
Proxy access control list. By default, the vSphere Authentication Proxy autho-
rizes the host based on its IP address. You can enable client authentication to have
vSphere Authentication Proxy check the host’s certificate. If you are using Auto
Deploy, you can configure a reference host to point to the Authentication Proxy, set
up a rule that applies the reference host’s profile to other hosts provisioned by Auto
Deploy, let Auto Deploy store the host’s IP address in the access control list, and join
the host to the AD domain.
Storage
User Access
The user accounts defined in the local operating system (localos) of the Linux-
based vCenter Server Appliance have no permissions defined in the vCenter
Server environment. The localos user accounts—such as root, sshd, and vdtc—are
264 VCP-DCV for vSphere 8.x Cert Guide
not members of any SSO domain (vsphere.local) group to which permissions are
applied. No one should attempt to use these accounts to log in to the vSphere
Client. You should not use these accounts when configuring permissions or group
memberships. Do not allow users to log in directly to the localos of the vCenter
Server appliance. Log in locally only when required.
By default, the only accessible user account in the SSO domain is administra-
tor, which has full control of the environment. If you use the default SSO domain
name, the user account is admnistrator@vsphere.local. Ideally, you should integrate
vSphere with a supported enterprise directory service, such as Active Directory, to
allow users seamless access without requiring additional user accounts. Alternatively,
you can create other user accounts in the SSO domain for your users. You should
ensure that each user can access the environment with a unique account that is
assigned the minimally required privileges.
NOTE Do not confuse the administrator (root) of the localos with the SSO admin-
istrator (administrator@vsphere.local by default). By default, no localos user account
has administrator privileges in vCenter Server.
For users who require the administrator role, you should assign the role to the appro-
priate user accounts or group accounts to avoid using the SSO administrator account.
The vCenter Server connects to each ESXi host with the vpxuser account defined
on the host. By default, vCenter Server changes the vpxuser password automatically
every 30 days on each connected ESXi host. To change this behavior, you can change
the value of the vCenter Server advanced setting VimPasswordExpirationInDays.
In addition, the password cannot be more than 20 characters long, and it cannot
contain non-ASCII characters. SSO administrators can change the default password
policy.
Chapter 7: vSphere Security 265
Time Synchronization
You should ensure that all systems, such as vCenter Server, ESXi, and supporting
services, use the same relative time source. The time source must be in sync with
an acceptable time standard, such as Coordinated Universal Time (UTC). Time
synchronization is critical for many vSphere features, such as vSphere HA. It is also
critical for securing vSphere.
Time synchronization is essential for certificate validation. Time synchronization
simplifies troubleshooting and auditing. Incorrect time settings make it difficult to
analyze and correlate log files related to detecting attacks and conducting security
audits.
266 VCP-DCV for vSphere 8.x Cert Guide
Firewalls
You can use traditional physical firewalls, virtual machine–based firewalls, and
hypervisor-based firewalls (such as NSX Distributed Firewall) to protect traffic to
and from the vCenter Server, ESXi hosts, virtual machines, and other vSphere com-
ponents. Ideally, you could use firewalls to allow only the required traffic between
specific vSphere components, virtual machines, and network segments.
You should isolate the vSphere management network, which provides access to the
management interface on each component. In most cases, you should place the
vSphere management port group in a dedicated VLAN and ensure that the network
segment is not routed except to other management-related networks. Likewise, you
should isolate IP-based storage traffic and vMotion traffic.
parameters. You can configure security policies to determine when the system should
encrypt traffic. Security policies include information such as source, destination,
protocol, direction, mode, and a security association.
To list the available security associations, you can use this command in ESXi:
esxcli network ip ipsec sa list
To add a security association, you can use the esxcli network ip ipsec sa add
command with one or more of the options listed in Table 7-13.
■ Ensure that port groups are not configured to VLAN values reserved by
upstream physical switches.
■ Ensure that port groups are not configured to VLAN 4095 except in the case
of Virtual Guest Tagging (VGT).
■ On distributed virtual switches, restrict port-level configuration overrides. The
port-level override option is disabled by default.
■ Ensure that vDS port mirror traffic is sent only to authorized collector ports
or VLANs.
On a distributed virtual switch, you can override the security policy per virtual port.
Chapter 7: vSphere Security 269
its invocation can result in a temporary denial of service, you should disable
disk shrinking by using the following lines in the VMX file:
isolation.tools.diskWiper.disable = "TRUE"
isolation.tools.diskShrink.disable = "TRUE"
■ Copying and pasting: Copy and paste operations are disabled by default in
new virtual machines. In most cases, you should retain this default to ensure
that one user of the virtual machine console cannot paste data that was origi-
nally copied from a previous user. Ensure that the following lines remain in
the VMX files:
isolation.tools.copy.disable = "TRUE"
isolation.tools.paste.disable = "TRUE"
Alternatively, to limit the number of log files for virtual machines on an ESXi
host, add the previous line to the host’s /etc/vmware/config file. A more
aggressive measure is to disable virtual machine logging with the following
statement in the VMX file:
logging = "FALSE"
■ VMX file size: By default, the size of each VMX file is 1 MB because uncon-
trolled file sizes can lead to denial of service if the datastore runs out of disk
space. Occasionally, setinfo messages that define virtual machine characteristics
or identifiers are sent as name/value pairs from the virtual machine to the
VMX file. If needed, you can increase the size of the VMX file limit by using
the following statement in the VMX file and replacing the numeric value with
a larger value:
tools.setInfo.sizeLimit = "1048576"
272 VCP-DCV for vSphere 8.x Cert Guide
tools.guestlib.enableHostInfo = "FALSE"
Starting with vSphere 6.7, the vSphere Hardening Guide is replaced with the vSphere
Security Configuration Guide. The risk profiles are removed, primarily because the
only remaining Risk Profile 1 setting is ESXi.enable-strict-lockdown-mode. Instead
of identifying risk profiles, the new guide simply describes the current guidelines for
configuring the vCenter, ESXi, hardware, virtual machines, and guest OS.
control VMCI isolation for virtual machines running on ESX/ESXi 4.x and ESXi
5.0, but it has no effect on virtual machines running on ESXi 5.1 and later. Any DoS
concerns related to VMCI in previous vSphere versions do not apply to vSphere 8.0.
Non-administrative users in the guest operating system can shrink virtual disks to
reclaim the disk’s unused space. However, if you shrink a virtual disk repeatedly, the
disk can become unavailable, leading to denial of service. To prevent this, you could
disable the ability to shrink virtual disks by following these steps:
Step 1. Shut down the virtual machine.
Step 2. Modify the advanced settings in the virtual machine options.
Step 3. Set isolation.tools.diskWiper.disable and isolation.tools.diskShrink.dis-
able to TRUE.
If these parameters are set to FALSE, then in a guest operating system, any user or
process, with or without root or administrator privileges, could use VMware Tools
to change device connectivity and settings. The user or process could then connect
or disconnect devices, such as network adapters and CD-ROM drives, and modify
device settings. This functionality could allow the user or process to connect a
CD-ROM with sensitive data or disconnect a network adapter, which could lead to
denial of service for other users.
You can use the vSphere Client or the vSphere API to add key provider instances
to a vCenter Server system. vCenter Server uses Key Management Interoperability
Protocol (KMIP) to allow flexibility in choosing a KMS server. If you use multiple
key provider instances, all instances must be from the same vendor and must replicate
keys. If you use different KMS server vendors in different environments, you can add
a key provider for each KMS server and specify a default key provider. The first key
provider that you add becomes the default key provider, but you can change it.
Only vCenter Servers (not the ESXi hosts) have the credentials for logging in to the
KMS server. vCenter Server obtains keys from the KMS server and pushes them to
the hosts. Two types of keys are used for virtual machine encryption:
■ Data encryption keys (DEKs): DEKs are internal keys that are generated by
the ESXi host and used to encrypt virtual machines and disks. DEKs are XTS-
AES-256 keys.
■ Key encryption key (KEKs): KEKs are the keys that vCenter Server requests
from the KMS server. KEKs are AES-256 keys. vCenter Server stores only
the ID of each KEK and not the key itself. These keys are used to encrypt the
DEKs as they are written to an encrypted virtual machine’s VMX file.
You can encrypt an existing virtual machine or virtual disk by changing its stor-
age policy. Encryption works with any guest OS because encryption occurs at the
hypervisor level. Encryption keys and configuration are not contained in the virtual
machine’s guest OS. Encryption works with any supported storage type, including
VMware vSAN.
You can encrypt virtual disks only for encrypted virtual machines. You cannot
encrypt the virtual disk of an unencrypted VM. You can encrypt virtual machine
files (NVRAM, VSWP, and VMSN files), virtual disk files, and coredump files. Log
files, virtual machine configuration files, and virtual disk descriptor files are not
encrypted. For each virtual machine, you can use the vSphere Client to encrypt and
decrypt virtual disks independently.
Coredumps are always encrypted on ESXi hosts where Encryption Mode is enabled.
Coredumps on the vCenter Server system are not encrypted. To perform crypto-
graphic operations, you must be assigned the cryptographic operations privilege.
ESXi uses KEKs to encrypt the internal keys and stores the encrypted internal keys
on disk. ESXi does not store the KEK on disk. If a host reboots, vCenter Server
requests the KEK with the corresponding ID from the KMS server and makes it
available to ESXi, which decrypts the internal keys as needed. In addition to VMDK
files, most virtual machine files that contain guest data are encrypted, such as the
NVRAM, VSWP, and VMSN files. The key that vCenter Server retrieves from the
KMS server unlocks an encrypted bundle in the VMX file that contains internal
keys and other secrets.
Chapter 7: vSphere Security 275
VM encryption uses vSphere APIs for I/O Filtering (VAIO), which is typically called
IOFilter. IOFilter is an ESXi framework that allows for the interception of virtual
machine I/O in the virtual SCSI (vSCSI) emulation layer, which is just below the
virtual machine and above the file system. It enables VMware and third-party devel-
opers to develop services using virtual machine I/O, such as encryption, caching,
and replication. It is implemented entirely in user space, which cleanly isolates it
from the core architecture and core functionality of the hypervisor. In the event of
any failure, only the virtual machine in question is impacted. Multiple filters can be
enabled for a particular virtual machine or a virtual disk, which are typically chained
in a manner such that I/O is processed serially by each of these filters before the I/O
is passed down to VMFS or completed within one of the filters.
The default administrator system role includes all cryptographic operations privi-
leges. A new default role, the no cryptography administrator role, supports all
administrator privileges except for the cryptographic operations privileges. You can
create a custom role that contains granular cryptographic operations privileges such
as by setting Cryptographic Operations to Encrypt (which allows a user to encrypt
a virtual machine or virtual disk) or setting Cryptographic Operations to Add Disk
(which allows a user to add a disk to an encrypted virtual machine).
The vSphere Client can be used to encrypt and decrypt virtual machines. To re-
encrypt a virtual machine, you must use the API. You can use the API to perform
a deep re-encryption (replacing the DEK and KEK) or a shallow re-encryption
(replacing just the KEK) of a virtual machine. A deep re-encryption requires that the
virtual machine be powered off and free from snapshots. A shallow re-encryption
is permitted on a virtual machine with one snapshot (not multiple snapshots). The
crypto-util command-line utility can be used to decrypt coredumps, check for file
encryption, and perform management tasks on the ESXi host.
The specific steps and keys used during an encryption operation depend on the
provider type. For the Standard key provider:
■ The ESXi host generates internal XTS-AES-256 keys to use as data encryp-
tion keys (DEKs), which it uses to encrypt virtual machines and virtual disks.
■ vCenter Server requests AES-256 keys from the KMS server to use as the key
encryption key (KEK). vCenter Server stores only the KEK ID, not the key
itself.
■ ESXi uses the KEK to encrypt the internal keys. It stores the encrypted
internal key on disk but does not store the KEK on disk. If the host reboots,
vCenter Server requests the KEK using the corresponding ID from the KMS
server and provides it to the host.
276 VCP-DCV for vSphere 8.x Cert Guide
The following rules concerning encrypted vMotion across vCenter Server instances
apply:
■ Encrypted vMotion of unencrypted and encrypted virtual machines is
supported.
■ The source and destination vCenter Server instances must share the KMS
cluster that was used to encrypt the virtual machine.
■ The name of the shared KMS cluster must be the same on each vCenter
Server instance.
Chapter 7: vSphere Security 277
NOTE Only ESXi Versions 6.5 and later use encrypted vSphere vMotion.
You can add a vTPM as you create a virtual machine by selecting Customize Hard-
ware > Add New Device > Trusted Platform Module. Likewise, you can add a vTPM
to an existing (powered-down) virtual machine. In the vSphere Client, you can iden-
tify which virtual machines are enabled with vTPM by using Show/Hide Column
for a selected object, such as a host or cluster.
Beginning with vSphere 8, you can leverage the TPM Provision Policy feature
when cloning a virtual machine that includes a vTPM. The policy lets you choose
if you want to clone or replace the vTPM. Cloning the vTPM results in copying its
workload-related keys. When you choose Replace, the vTPM is replaced, and you
avoid the risk of the cloned virtual machine having access to any stored secrets from
the source virtual machine.
When vSGX is enabled on a virtual machine, the following features are not sup-
ported for that machine:
■ vMotion/DRS migration
■ Virtual machine suspend and resume
■ Memory snapshots (Virtual machine snapshots are supported without snap-
shotting the memory.)
■ Fault tolerance
Aria Operations collects compliance data from vSphere objects, generates compli-
ance alerts, and creates reports based on the compliance results.
VMware NSX
You can implement VMware NSX to add a distributed logical firewall, microseg-
mentation, and additional security measures to your vSphere environment.
NSX provides Distributed Firewall (DFW), which runs in the VMkernel as a VIB
package on all NSX-prepared ESXi hosts. DFW offers near-line-rate performance,
virtualization, identity awareness, automated policy creation, advanced service inser-
tion, and other network security features. DFW enhances your physical security
by removing unnecessary hairpinning from the physical firewalls and reduces the
amount of traffic on the network. It enables micro-segmentation, which effectively
enables you to place a firewall on each VM network connection.
Micro-segmentation decreases the level of risk and increases the security posture of
a vSphere environment. Micro-segmentation involves the following capabilities:
■ Distributed stateful firewalling
■ Topology-agnostic segmentation
■ Centralized policy control
■ Granular control
■ Network-based isolation
With NSX, isolation can be achieved by leveraging VXLAN technology and virtual
networks (that is, logical switches). Isolation can also be achieved by using tradi-
tional networking methods, such as implementing ACLs, firewall rules, and rout-
ing policies. For example, in a brownfield environment, you could choose to keep
existing VLAN segmentation to isolate VMkernel traffic and VM zones while using
NSX DFW to implement application segmentation.
With NSX, you can implement virtual machine–to–virtual machine protection,
which is commonly referred to as east–west protection, in more than one manner.
For example, you could implement multiple Layer 2 segments with Layer 3 isolation
(see Figure 7-6), or you could implement a single Layer 2 segment and use DFW
rules for isolation (see Figure 7-7).
Chapter 7: vSphere Security 281
NSX provides other security features, such as Service Composer, which you can use
to configure security groups and security policies. A security policy is a collection of
firewall rules, endpoint services, and network introspection services. Security groups
may be populated statically or dynamically based on containers (such as folders and
clusters), security tags, Active Directory groups, and regular expressions. You can
map a security policy to a security group.
.1 .1
.1
VM VM VM VM VM VM
.1
VM VM VM VM VM VM
NSX includes other security features, such as SpoofGuard, the Edge firewall, and a
virtual private network (VPN).
282 VCP-DCV for vSphere 8.x Cert Guide
Review Questions
1. You are preparing to implement certificates in your vSphere environment.
Which of the following does VCMA support in custom certificates when it is
used as a subordinate CA?
a. CRL distribution points
b. Authority information access
c. CRT format
d. Certificate template information
3. You are examining the default security profile in your vSphere environment.
Which of the following services is stopped by default?
a. DCUI
b. Load-Based Teaming Daemon
c. CIM Server
d. SNMP Server
4. You are hardening a vCenter Server and see that it contains some expired
certificates. What is the main purpose of removing expired and revoked certifi-
cates from vCenter Server?
a. To avoid DoS attacks
b. To avoid MITM attacks
c. To avoid automatic virtual machine shutdown due to expired certificates
d. To avoid ARP spoofing
284 VCP-DCV for vSphere 8.x Cert Guide
5. You want to enable UEFI boot for your virtual machines. Which of the follow-
ing is a requirement?
a. Virtual hardware Version 11 or later
b. VMware Tools Version 11 or later
c. Virtual hardware Version 12 or later
d. VMware Tools Version 10.1 or later
This page intentionally left blank
This chapter covers the following topics:
vSphere Installation
Table 8-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundations Topics Section Questions Covered in This Section
Installing ESXi Hosts 1, 2
Deploying vCenter Server Components 3, 4
Configuring Single Sign-On (SSO) 5–7
Initial vSphere Configuration 8–10
1. You are preparing to deploy vSphere 8.0. Which of the following is a pre-
requisite for installing ESXi interactively?
a. Download the ESXi installer ISO.
b. Download the ESXi installer OVF.
c. Download the GUI installer for Windows or Mac.
d. Download the ESXi MSI.
288 VCP-DCV for vSphere 8.x Cert Guide
3. You are preparing to install vCenter Server 8.0 using a deployment command.
To perform a pre-deployment check, which command should you use?
a. vcsa-deploy-precheck path-to-JSON-file
b. vcsa-deploy install --precheck path-to-JSON-file
c. vcsa-deploy install --verify-only path-to-JSON-file
d. vcsa-deploy precheck path-to-JSON-file
4. You are installing vSphere 8.0 and want to document the location of certifi-
cates. Where are the ESXi certificates stored?
a. Locally on the ESXi hosts
b. In VECS
c. In the vCenter Server database
d. In VMCA
6. You are deploying a new vSphere environment and need to control which
users can manage certificates. For which vCenter Server group should you
manipulate Single Sign-On domain group membership?
a. DCAdmins
b. SolutionUsers
c. CAAdmins
d. SystemConfiguration_Administrators
Chapter 8: vSphere Installation 289
8. You are deploying vCenter Server in a secured network that has no Internet
access. What do you need to install in order to download updates?
a. Update Manager Download Service
b. Update Manager Proxy Service
c. Lifecycle Manager Download Service
d. Lifecycle Manager Proxy Service
9. You are implementing vCenter HA. How will you connect the nodes to the
vCenter HA network?
a. Connect NIC 1 on the Active and Passive nodes and NIC 0 to the vCen-
ter HA network. Do not connect the Witness node to the vCenter HA
network.
b. Connect NIC 1 on the Active and Passive nodes and NIC 0 on the Wit-
ness node to the vCenter HA network.
c. Connect NIC 0 on the Active, Passive, and Witness nodes to the vCenter
HA network.
d. Connect NIC 1 on the Active, Passive, and Witness nodes to the vCenter
HA network.
10. You are installing new ESXi hosts and want to configure boot options. Which
of the following kernelopt options has been deprecated in ESXi 7.0?
a. autoCreateDumpFile
b. autoPartitionCreateUSBCoreDumpPartition
c. skipPartitioningSsds
d. autoPartitionOnlyOnceAndSkipSsd
290 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
The default behavior is to configure the ESXi management network using DHCP.
You can override the default behavior and use static IP settings for the management
network after the installation is completed. If your host is not yet assigned an IP
address or if you want to change the IP address, you can use the following procedure
to select the appropriate network adapter, configure the VLAN, and set the IP con-
figuration for the host’s management network interface:
Step 1. Log on to the Direct Console User Interface (DCUI), which appears on
the host’s monitor.
Step 2. If needed, use the DCUI to change the network adapter used for
management:
a. Select Configure Management Network and press Enter.
b. Select Network Adapters and press Enter.
c. Select a network adapter and press Enter.
292 VCP-DCV for vSphere 8.x Cert Guide
Step 3. If needed, use the DCUI to change the VLAN used for management:
a. Select Configure Management Network and press Enter.
b. Select VLAN and press Enter.
c. Enter the appropriate VLAN ID for the network connection.
Step 4. If needed, use the DCUI to change the IP configuration used for
management:
a. Select Configure Management Network and press Enter.
b. Select IPv4 Configuration and press Enter.
c. Select Set Static IPv4 Address and Network Configuration.
d. Enter the IP address, subnet mask, and default gateway and press
Enter.
NOTE It is important for the IP address of the management network to remain consis-
tent. If you do not select a static IP address, make sure that you create a DHCP reserva-
tion for the MAC address of your first physical NIC, which ESXi calls VMNIC0.
You can use the DCUI to configure DNS by following this procedure:
Step 1. Select Configure Management Network and press Enter.
Step 2. Select DNS Configuration and press Enter.
Step 3. Select Use the Following DNS server Addresses and Hostname.
Step 4. Enter the primary server, an alternative server (optional), and the host
name.
When ESXi is installed and the management network is configured, you can manage
the host and make other configuration changes by using the vSphere Host Client.
■ NFS server
■ USB flash drive
■ CD-ROM drive
To start the installation script, you can enter boot options at the ESXi installer
boot command line. At boot time, you can press Shift+O in the boot loader (see
Figure 8-1) to specify boot options and access the kickstart file. If you are installing
using PXE boot, options can be passed through the kernelopts line of the boot.
cfg file. The location of the installation script is defined by setting the ks=filepath
option, where filepath is the location of the kickstart file. If ks=filepath is not included
in the script, the text installer runs.
ks=http://192.168.100.10/kickstart/ks-script-01.cfg
nameserver=192.168.1.100 ip=192.168.100.101 netmask=
255.255.255.0 gateway=192.168.100.101
294 VCP-DCV for vSphere 8.x Cert Guide
There is a default installation script included with the ESXi installer, and it can be
used to install ESXi onto the first disk that is detected. The default ks.cfg installa-
tion script is in the initial RAM disk at /etc/vmware/weasel/ks.cfg. The location of
the default ks.cfg file can be defined with the ks=file://etc/vmware/weasel/ks.cfg
boot option. When using the ks.cfg script for the installation, the default root pass-
word is myp@ssw0rd. The installation script on the installation media can’t be modi-
fied. After the ESXi host has been installed, the vSphere Host Client or the vSphere
Web Client logged in to the vCenter Server that manages the ESXi host can be used
to change any of the default settings.
Chapter 8: vSphere Installation 295
Example 8-1 shows the contents of the default script provided with ESXi 8.0, which
includes an option to support DPUs.
# Set the root password for the DCUI and Tech Support Mode
rootpw myp@ssw0rd
You can see that this default script sets the root password to myp@ssw0rd, installs on
the first disk, overwrites any existing VMFS datastore, and sets the network interface
to use DHCP. When creating your own script, you can specify many options, a few
of which are shown in Table 8-4.
With stateful installations, Auto Deploy is used to boot the host, but the installation
and configuration are written to a local disk. On subsequent boots, the host boots
from the local disk where this host configuration is stored.
Auto Deploy can be configured and managed using a graphical user interface (GUI)
in vSphere 6.5 and later. The PowerCLI method is also available, but the GUI pro-
vides an easier-to-use option. For the Auto Deploy GUI to be visible in the vSphere
Web Client, both the Image Builder and Auto Deploy services must be running
when you’re logging in to vCenter Server. The Image Builder feature in the GUI
enables you to download ESXi images from the VMware public repository or to
upload ZIP files containing ESXi images or drivers. You can customize the images
by adding or removing components and optionally export images to ISO or ZIP
files for use elsewhere. You can compare two images to see how their contents differ.
You can use the Deployed Hosts tab to view hosts that are provisioned with Auto
Deploy and to perform tests and remediations.
The architecture for Auto Deploy includes many components, as described in
Table 8-5 and illustrated in Figure 8-2.
Component Description/Purpose
vSphere Installation Packages a collection of files (such as drivers) into an archive similar
Bundle (VIB) to a ZIP file. Each VIB is released with an acceptance level that
cannot be changed. The host acceptance level assigned to each host
determines which VIBs can be installed to the host. These are the
acceptance levels, from highest to lowest:
■ VMwareCertified
■ VMwareAccepted
■ Partner Supported
■ CommunitySupported
Auto Deploy
PowerCLI
Plug-in
Host Profile
Engine
ESXi Host VIBs and image
profiles in a public
depot
HTTP Fetch of images/VIBs, host
profiles, etc.
By default, Auto Deploy provisions hosts with certificates that are signed by the
VMware Certificate Authority (VMCA), but you can change this to make the Auto
Deploy server a subordinate certificate authority of your third-party certificate
authority. With ESXi 8.0, Auto Deploy provides a third option that allows you to
generate a certificate outside vSphere. For this option, you could generate custom
certificates with a script or provider such as Verisign, assign certificates to stateless
hosts based on the boot NIC’s MAC address or BIOS UUID, update the VMware
Endpoint Certificate Store (VECS) using PowerCLI, and add the CA public certifi-
cate to the TRUSTED_ROOTS store in VECS.
You control the behavior of the vSphere Auto Deploy server by using rules. The rules
engine checks the rule set for matching host patterns to decide which items (image
Chapter 8: vSphere Installation 299
profile, host profile, vCenter Server location, or script object) to use to provision
each host. Rules can assign image profiles and host profiles to a set of hosts. A rule
can identify target hosts by boot MAC address, Basic Input/Output System (BIOS),
universally unique identifier (UUID), System Management BIOS (SMBIOS) infor-
mation, vendor, model, or fixed DHCP IP address. You can create rules by using the
vSphere Web Client or vSphere Auto Deploy cmdlets with PowerCLI. For example,
to create a new deployment rule named Rule-01 that places all hosts in a folder named
Auto-deployed Hosts, you can use the following PowerCLI command:
New-DeployRule -Name Rule-01 -Item "Auto-deployed Hosts" -allhosts
To modify the rule so that it applies only to a set of hosts in a specific IP range, you
can use the Set-DeployRule cmdlet:
Set-DeployRule -DeployRule Rule-01 -Pattern
"ipv4=192.168.100.101-192.168.100.112"
Table 8-6 describes some of the common Auto Deploy PowerCLI cmdlets.
cmdlet Description
Test-DeployRulesetCompliance Checks whether the items associated with a specified
host are in compliance with the active rule set.
Repair-DeployRulesetCompliance Given the output of Test-DeployRulesetCompliance,
this cmdlet updates the image profile, host profile, and
location for each host in the vCenter Server inventory.
The cmdlet might apply image profiles, apply host
profiles, or move hosts to the prespecified folders or
clusters on the vCenter Server system.
Apply-EsxImageProfile Associates the specified image profile with the specified
host.
Get-VMHostImageProfile Retrieves the image profile in use by a specified host.
This cmdlet differs from the Get-EsxImageProfile
cmdlet in the Image Builder PowerCLI.
Repair-DeployImageCache Deploys a new image cache. Use this cmdlet only if the
Auto Deploy image cache is accidentally deleted.
Get-VMHostAttributes Retrieves the attributes for a host that are used when the
Auto Deploy server evaluates the rules.
Get-DeployMachineIdentity Returns a string value that Auto Deploy uses to logically
link an ESXi Host in vCenter to a physical machine.
Set-DeployMachineIdentity Logically links a host object in the vCenter Server
database to a physical machine. Use this cmdlet to add
hosts without specifying rules.
Get-DeployOption Retrieves the Auto Deploy global configuration options.
This cmdlet currently supports the vlan-id option,
which specifies the default VLAN ID for the ESXi
Management Network of a host provisioned with Auto
Deploy. Auto Deploy uses the value only if the host
boots without a host profile.
Set-DeployOption Sets the value of a global configuration option.
Currently supports the vlan-id option for setting the
default VLAN ID for the ESXi Management Network.
The first time a host boots using Auto Deploy, the following sequence of events
occurs:
1. The host starts a PXE boot sequence. The DHCP server assigns an IP address
and redirects the host to the TFTP server.
2. The host downloads and executes the iPXE file (configured by the DHCP
server) and applies the associated configuration file.
Chapter 8: vSphere Installation 301
3. The host makes an HTTP boot request to the vSphere Auto Deploy server.
The HTTP request includes hardware and network information.
4. The vSphere Auto Deploy server queries the rules engine and streams data
(the ESXi image) from the image profile and the host profile.
5. The host boots using the image profile. If the vSphere Auto Deploy server
provided a host profile, the host profile is applied to the host.
6. vSphere Auto Deploy adds the host to the proper inventory location and clus-
ter in the vCenter Server system.
7. If the host is part of a DRS cluster, virtual machines from other hosts might be
migrated to the host.
NOTE If a host profile requires a user to specify certain information, such as a static
IP address, the host is placed in Maintenance Mode when the host is added to the
vCenter Server system. You must reapply the host profile and update the host custom-
ization to have the host exit Maintenance Mode.
listed as part of the PSC. For example, in vSphere 7.0, the vSphere Authentication
publication replaces the Platform Services Controller Administration publication.
The vCenter Server 8.0 deployment wizard helps you determine the resource allo-
cation for the virtual appliance, based on the size of your environment. To prepare
for a vCenter Server 8.0 deployment, you should download the vCenter Server
Appliance installer ISO file and mount it to a virtual machine or physical machine
from which you want to perform the deployment. To use the vCenter Server Appli-
ance GUI (or CLI) installer, you can use a machine that is running a supported ver-
sion of a Windows, Linux, or Mac operating system, as shown in Table 8-7.
■ Provide the FQDN (or IP address) and credentials for the target
vCenter Server (that is managing the hosts on which this new vCenter
Server will be deployed), provide the appropriate certificate, and spec-
ify the appropriate location in the vSphere inventory.
Step 6. On the next page, set the appliance’s name and root user password, fol-
lowing these rules:
■ The appliance name must not contain a percent sign (%), backslash (\),
or forward slash (/) and must be no more than 80 characters in length.
■ The password must contain only lowercase ASCII characters without
spaces, must have at least eight characters, and must contain a number,
uppercase and lowercase letters, and a special character, such as an
exclamation point (!), hash symbol (#), at sign (@), or parentheses (()).
Step 7. Select the deployment size: Tiny, Small, Medium, Large, or
X-Large (refer to Chapter 1, “vSphere Overview, Components, and
Requirements”).
Step 8. Select the storage size for the appliance (as explained in Chapter 1).
Step 9. Select an available datastore and select the disk provisioning type.
Optionally, with vSphere 8.0, you can choose to create a new vSAN
cluster or vSAN Express Storage Architecture (vSAN ESA) cluster and
choose the appropriate disks to claim.
Step 10. On the Configure Network Settings page, fill in the network settings,
such as virtual switch port group, IP configuration, and communication
ports.
Step 11. On the Ready to Complete page, click Finish.
Step 12. Wait for the OVA to deploy and then click Continue to proceed with
Stage 2.
Step 13. On the Introduction page, click Next.
Step 14. Choose a time configuration option:
■ Synchronize Time with the ESXi Host
■ Synchronize Time with NTP Servers
Step 15. Optionally, enable SSH connections into the appliance.
Step 16. Create a new SSO domain or join an existing domain:
■ Create a new SSO domain: Enter the domain (such as vsphere.local),
set the SSO administrator account (which is administrator@vsphere.
local by default) password, provide an SSO site name, and confirm the
password.
Chapter 8: vSphere Installation 305
■ Join an existing SSO domain: Enter the PSC FQDN containing the
SSO server, provide the HTTPS port that PSC will use, provide the
target SSO domain name (such as vsphere.local), and enter the SSO
administrator account password.
Step 17. Optionally, choose the option to join the VMware Customer Experience
Improvement Program (CEIP).
Step 18. On the Ready to Complete page, click Finish and then click OK.
Table 8-8 shows some of the available JSON templates for vCenter Server 8.0.
NOTE When using the CLI installer, you must strictly use only ASCII characters
for the command-line and JSON configuration file values, including usernames and
passwords.
Prior to running the deployment command, you can run a pre-deployment check by
using this command:
vcsa-deploy install --verify-only path-to-JSON-file
When you are ready, you can run the deployment command:
vcsa-deploy install --accept-eula --acknowledge-ceip optional_
arguments path-to-JSON-file
If you install the plug-in from an Internet Explorer browser, you must first disable
Protected Mode and enable pop-up windows on your web browser.
Store Description
Solution user stores: VECS includes one store for each solution user:
■ Machine ■ License Server (machine)
■ vpxd ■ vCenter service daemon (vpxd)
■ vpxd-extension ■ vCenter Extensions (vpxd-extension)
■ vsphere-webclient ■ vSphere Client (vsphere-webclient)
■ wcp ■ vSphere with Tanzu (wcp)
vSphere Certificate Manager utility Used by VMCA to support certificate reversion.
backup store (BACKUP_STORE)
Other stores Other stores might be added by solutions. For example,
the Virtual Volumes solution adds an SMS store.
NOTE
The VMCA in vSphere 8.0 does not support the use of CRLs, and it does not
enforce certificate revocation. If you suspect that a certificate was compromised, you
should remove it and consider replacing all certificates.
When you use VMCA in the default manner, so that it acts as the CA for vSphere,
no real configuration is required other than to configure web browsers to trust
VMCA. VMCA can handle all certificate management in a vSphere environment
where the administrator has historically elected not to replace certificates. During
an upgrade to vSphere 6.0, all self-signed certificates are replaced with certificates
signed by VMCA.
Using VMCA in a subordinate CA manner requires you to replace the VMCA root
certificate with a certificate signed by a third-party CA, making the VMCA certifi-
cate an intermediate certificate of the CA. To use VMCA in the subordinate CA
manner, follow this procedure:
Step 1. Launch the vSphere Certificate Manager utility.
Step 2. Select Option 2, which is to replace the VMCA root certificate with a
custom signing certificate and replace all certificates.
Chapter 8: vSphere Installation 309
Step 3. When prompted to do so, provide the password for the SSO domain
administrator account.
Step 4. Select Option 1 to generate a certificate signing request (CSR) and key.
When prompted to do so, specify the directory where you want to save
the CSR and key.
Step 5. Provide the CSR (root_signing_cert.csr) to your CA to generate the sub-
ordinate signing certificate.
Step 6. Use a text editor to copy content from intermediate CA certificates and
the root CA certificate into a single file (root_signing_chain.cer).
Step 7. In Certificate Manager, return to Option 2 and follow the prompts to
replace the certificates on the local machine.
Step 8. Import the root signing certificate (root_signing_chain.cer) and root
signing key (root_signing_cert.key).
Step 9. When prompted to do so, provide a value for each item, such as country,
name, and organization.
When you complete these steps, the VMCA root certificate is replaced with a cus-
tom signing certificate.
The Active Directory over LDAP identity source is preferred over the Active Direc-
tory (Integrated Windows Authentication) option. A future update to Microsoft
Windows will require strong authentication and encryption for Active Directory,
which will impact how vCenter Server authenticates to Active Directory. To con-
tinue using Active Directory as the identity source for vCenter Server, you should
plan to enable Secure LDAP (LDAPS).
You can configure a default domain for SSO. The default SSO domain allows users
to authenticate without identifying a domain name. Users from other identity
sources must identify the domain name during authentication. To configure a default
domain using the vSphere Client, follow these steps:
Step 1. Navigate to Home > Administration > Single Sign On > Configuration.
Step 2. Click Identity Sources and then click Add Identity Source.
Step 3. Select an identity source and click Set as Default.
Chapter 8: vSphere Installation 311
After the appliance reboots, you can add an Active Directory (Integrated Windows
Authentication) identity source.
When adding an Active Directory (Integrated Windows Authentication) identity
source, you need to provide information for the following parameters:
■ Domain Name: Enter the FDQN of the domain.
■ Use Machine Account: Select this option to use the local machine account
as the Server Principal Name (SPN). Do not use this option if you plan to
rename the machine.
■ Use Service Principal Name (SPN): Select this option instead of Use
Machine Account if you prefer to specify a unique SPN instead of using the
machine name as the SPN. If you choose this option, you must also provide
the SPN, UPN, and password, as follows:
■ Service Principal Name (SPN): If you selected the Use Service Prin-
cipal Name option, you need to provide a unique name that includes the
domain name, such as STS/domain.com.
312 VCP-DCV for vSphere 8.x Cert Guide
■ User Principal Name (UPN): If you selected the User Service Principal
Name option, you need to provide a username that can authenticate the
Active Directory domain.
■ Password: If you selected the Use Service Principal Name option, you
need to provide a password that is associated with the UPN.
NOTE The user account must have read access to the organizational units that con-
tain users and groups. If a user’s account does not have sufficient permission or is locked or
disabled, then authentications and searches in the Active Directory domain fail.
When adding an Active Directory over LDAP identity source, you need to provide
information for the following parameters:
■ Name: Specify the logical name for the identity source.
■ Base DN for Users: Specify the base distinguished name for users.
■ Base DN for Groups: Specify the base distinguished name for groups.
■ Domain Name: Specify the FDQN of the domain.
■ Domain Alias: Specify the domain’s NetBIOS name.
■ Username: Specify a username in the domain that has at least read access to
the specified user and group base DNs.
■ Password: Specify the password that is associated with the username.
■ Connect To: Specify which domain controller to connect to.
■ Primary Server URL: Specify the primary domain controller’s URL, in the
form ldap://hostname:port or ldaps://hostname:port.
■ Secondary Server URL: Specify the secondary domain controller’s URL, in
the form ldap://hostname:port or ldaps://hostname:port.
■ SSL Certificate: When using LDAPS in the URL parameters, specify the
certificate.
You can add additional user accounts from other identity sources to the SSO admin-
istrators group. To add additional user accounts from other identity sources to the
administrators group in the SSO domain, you can follow these steps:
Step 1. Log in to the vSphere Web Client with the SSO domain administrator
account.
Step 2. Navigate to Home > Administration > Single Sign-On > Users and
Groups.
Chapter 8: vSphere Installation 313
Step 3. Navigate to Group > Administrators > Group Members and select the
Add Member icon.
Step 4. Select the additional identity source from the Domain drop-down menu.
Step 5. Select the account you would like to add.
Step 6. Click OK.
When configuring OpenLDAP, you need to provide information for the following
parameters:
■ Name: Specify the logical name for the identity source.
■ Base DN for Users: Specify the base distinguished name for users.
■ Base DN for Groups: Specify the base distinguished name for groups.
■ Domain Name: Specify the FDQN of the domain.
■ Domain Alias: Specify the domain name in capital letters if no alias is defined.
■ Username: Specify a username in the domain that has at least read access to
the specified user and group base DNs.
■ Password: Specify the password that is associated with the username.
■ Primary Server URL: Specify the primary server’s URL, in the form
ldap://hostname:port or ldaps://hostname:port.
■ Secondary Server URL: Specify the secondary server’s URL, in the form
ldap://hostname:port or ldaps://hostname:port.
■ SSL certificate: When using LDAPS in the URL parameters, specify the
certificate.
314 VCP-DCV for vSphere 8.x Cert Guide
In a similar manner, you can create an SSO group by selecting the Users tab in step 3
and providing details in step 4. You can also use the Groups tab to select a group and
use the Add Member icon (in the details section) to add users to the group. When
adding a user to a group, use the Domain drop-down to select the SSO domain or
another identity source and select a user account from the provided list.
To disable or enable an SSO user account, select the user account in Users and
Groups, click the ellipsis icon, and click Disable or Enable.
The SSO domain—which is called vsphere.local by default—provides several pre-
defined groups. You can add users from Active Directory domains or other identity
sources to these predefined groups. Some SSO privileges are determined solely
based on membership in these groups. For example, a user who is a member of
the CAAdmins group can manage VMCA, and a user who is a member of the
LicenseService.Administrators group can manage licenses.
The SSO domain contains many predefined groups, including the following:
■ Users: This group contains all users in the SSO domain.
■ DCAdmins: Members of this group can perform domain controller adminis-
trator actions on VMware Directory Service.
■ SolutionUsers: Each solution user authenticates individually to vCenter
Single Sign-On with a certificate. By default, VMCA provisions solution users
with certificates. Do not explicitly add members to this group.
■ CAAdmins: Members have administrator privileges for VMCA. Adding mem-
bers to these groups is not usually recommended, but a user must be a member
of this group to perform most certificate management operations, such as
using the certool command.
Chapter 8: vSphere Installation 315
Step 6. On the Identity Provider tab, click Change Identity Provider, select
Microsoft ADFS, and click Next.
Step 7. Enter the following information:
■ Client identifier
■ Shared secret
■ OpenID address of the AD Federation Services server
Click Next.
Step 8. Enter the user and group information for Active Directory over LDAP to
search for users and groups and click Next.
Step 9. Review the configuration information and click Finish.
Step 10. Go to Home > Administration > Single Sign On > Users and Groups.
Step 11. On the Groups tab, click Administrators (group) and click Add
Members.
Step 12. From the drop-down, select Microsoft ADFS, and in the text box under
the drop-down menu, enter vcenter and wait for the drop-down to show
a selection. Then select vCenter Admins and add it to the group.
Step 13. Click Save.
Step 14. Log in to vCenter with an AD user’s credentials to verify functionality.
no special steps are required to install vLCM unless you need to install the optional
module VMware vSphere Update Manager Download Service (UMDS).
In scenarios where vCenter Server is installed in a secured network with no Internet
access, you can install UMDS and use it to download updates. You can use UMDS
to export the updates to a portable media drive that you then present to vLCM.
Or, if network connectivity exists between the vCenter Server and UMDS, you can
automate the export process by leveraging the web server on the UMDS machine.
NOTE See Chapter 13, “Managing vSphere and vCenter Server,” for more details on
vSphere Lifecycle Manager.
■ For a host with more than 512 LUNs and 2048 paths, verify that the vCenter
Server instance is set to support a Large or X-Large environment.
To implement vCenter HA, you can use the following procedure to configure
vCenter HA:
Step 1. In the vSphere Client, select the vCenter Server in the inventory pane.
Step 2. Select Configure > Select vCenter HA > Set Up vCenter HA.
Step 3. If your vCenter Server is managed by another vCenter Server in a differ-
ent SSO domain, complete the following steps:
a. Click Management vCenter Server Credentials. Provide the
FQDN and Single Sign-On credentials and click Next.
b. If you see a certificate warning displayed, review the SHA1 thumbprint
and click Yes to continue.
Step 4. In the Resource Settings section, select the vCenter HA network for the
active node from the drop-down menu.
Step 5. Click the checkbox if you want to automatically create clones for Passive
and Witness nodes.
Step 6. For the Passive node, follow these steps:
a. Click Edit and provide details for the Passive node virtual machine,
such as the name, compute resources, and datastore.
b. Select the Management (NIC 0) and vCenter HA (NIC 1) networks.
c. Complete the settings and click Finish.
NOTE This section provides details on using host profiles to configure ESXi hosts.
Starting with vSphere 8, you can use vSphere configuration profiles to manage host
configuration at the cluster level, using a declarative model. You can only enable
vSphere configuration profiles on clusters managed with a single image. Enabling
vSphere configuration profiles is a permanent change that prevents you from using
host profiles for the hosts in the cluster.
You can use this procedure to attach a profile to an ESXi host or cluster:
Step 1. From the host profiles main view, select the host profile to be applied to
the host or cluster.
Step 2. Click Attach/Detach Hosts and Clusters, select the host or cluster
from the expanded list, and click Attach.
Step 3. Optionally, click Attach All to attach all listed hosts and clusters to the profile.
Step 4. Optionally, enable Skip Host Customization; if you do, you do not need
to customize hosts during this process.
Step 6. Click Next.
Step 7. Optionally, update or change the user input parameters for the host pro-
files policies by customizing the host.
Step 8. Click Finish to finish attaching the host or cluster to the profile.
Step 5. In the Edit Host Profile page, expand each category to view or edit a spe-
cific policy or setting.
Step 6. Select All to view all host profile configurations or select Favorites to
view only those configurations.
Step 7. Optionally, in the search field, filter the configuration names and values
you want to view. For example, enter SNMP, and all configurations that
relate to SNMP are displayed.
Step 8. Optionally, customize the hosts. Make any changes to the available con-
figuration values for this profile and click Save.
After configuring the host profile, you can use it to apply the permissions to new or
existing ESXi hosts.
324 VCP-DCV for vSphere 8.x Cert Guide
VMware Tools
Ideally, you should install VMware Tools in all your virtual machines. When deploy-
ing a new vSphere environment, you should install VMware Tools in any virtual
machines deployed as part of the virtual infrastructure and management. For exam-
ple, if you use virtual machines to run Active Directory domain controllers, DNS
servers, or DHCP servers, consider installing VMware Tools.
VMware Tools is a suite of utilities that you install in the operating system of
a virtual machine. VMware Tools enhances the performance and management of
the virtual machine. You can use the following procedure to install VMware Tools in
a virtual machine using the VMware Host Client:
Step 1. Click Virtual Machines in the VMware Host Client inventory.
Step 2. Select a powered-on virtual machine from the list. (The virtual machine
must be powered on to install VMware Tools.)
Step 3. Open a console to the virtual machine and log in with administrator or
root privileges.
Step 4. Click Actions, select Guest OS from the drop-down menu, and select
Install VMware Tools.
Step 5. Use the guest OS to complete the installation.
This procedure is useful for installing VMware Tools in a DNS, Active Directory
domain controller, database server, or other virtual machine that you may deploy
prior to deploying vCenter Server.
Policy and then select whether the service should start and stop manually, automati-
cally with the host, or automatically with the firewall port.
To configure authentication, certificates, user roles, Lockdown Mode, acceptance
level, and roles, choose Security and Users. From there, to create a user, select
Users > Add Users. To configure Lockdown Mode, select Lockdown Mode and then
select Edit Settings or Add User Exception. To manage roles, choose Roles and then
click Add Role or select a specific role and click Edit Role.
You need to issue boot options at the time of boot, either by defining the kernel
options in the ESXi boot.cfg file or by manually entering the boot options after
pressing Shift+O in the ESXi boot loader. Table 8-11 lists the kernel options.
326 VCP-DCV for vSphere 8.x Cert Guide
NOTE The following kernel boot options have been deprecated and are no longer
supported in ESXi 7.0 and later:
■ --no-auto-partition
■ autoPartitionCreateUSBCoreDumpPartition
■ autoPartitionDiskDumpPartitionSize
Chapter 8: vSphere Installation 327
Review Questions
1. You are using the GUI installer for vCenter Server 8.0. Which of the follow-
ing statements is true?
a. In the first stage, you choose the deployment type. In the second stage,
you navigate through the installation wizard.
b. In the first stage, you provide the appliance settings. In the second stage,
you navigate through the installation wizard.
c. In the first stage, you choose the deployment type. In the second stage,
you deploy the OVA.
d. In the first stage, you provide the appliance settings. In the second stage,
you configure SSO.
2. You are adding an Active Directory over LDAP identity source. Which setting
must you provide?
a. UPN
b. SPN
c. Use machine account
d. Base DN for users
3. You are implementing a new vSphere environment and want to install services
for updating the ESXi hosts. What should you do?
a. Deploy a VMware Update Manager appliance.
b. Deploy a vSphere Lifecycle Manager appliance.
c. Deploy vCenter Server with Update Manager embedded.
d. Nothing; the software service is included in vCenter Server.
4. You are implementing Auto Deploy and want to control its behavior with
rules. Which of the following is not a means by which a rule can identify target
hosts?
a. MAC address
b. Model
c. Serial number
d. BIOS UUID
Chapter 8: vSphere Installation 329
5. You are using host profiles to deploy a standard configuration to ESXi hosts.
Which of the following provides the proper order of operation?
a. Click Attach Host Profile, click Pre-check Remediation, click Remediate.
b. Click Attach Host Profile, click Remediate, click Pre-check Remediation,
click Finish.
c. Click Pre-check Remediation, click Remediation, click Remediate.
d. Click Pre-check Remediation, click Remediate, click Attach Host Profile,
click Finish.
This chapter covers the following topics:
Table 9-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
vSphere Standard Switches (vSS) 1, 2
vSphere Distributed Switches (vDS) 3, 4
VMkernel Networking 5
Configuring and Managing Networking Features 6–8
Managing Host Networking with vDS 9, 10
2. You are assigning a VLAN ID to a standard port group. What is the acceptable
range?
a. 1–4094
b. 0–4095
c. 0–4094
d. 1–1095
3. You are modifying an existing vDS. Which of the following options is not
available on the General settings page?
a. Name
b. Number of Uplinks
c. Network I/O Control
d. VLAN ID
4. You are modifying an existing vDS. Which of the following options is not
available on the Advanced settings page?
a. Traffic Filtering and Marking
b. MTU
c. Multicast Filtering Mode
d. Discovery Protocol
5. You are adding a VMkernel adapter to a vDS. Which one of the following is
not an available setting?
a. SR-IOV
b. MTU
c. TCP/IP Stack
d. Available Services
6. You enabled NIOC for a distributed switch, and you want to change shares
for the system traffic. Which of the following is not an available system traffic
type?
a. Fault Tolerance
b. vSAN
c. vSphere HA Heartbeat
d. NFS
Chapter 9: Configuring and Managing Virtual Networks 333
7. You are configuring port mirroring for a distributed switch. Which of the fol-
lowing is not an available session type?
a. Distributed port monitoring
b. Port group
c. Remote mirroring destination
d. Encapsulated remote mirroring (L3) source
8. You want to implement LAGs to support your vSphere 8.0 networking. Which
of the following steps should you take to prepare?
a. Ensure that all the NICs in a LAG are configured with the same speed
and duplexing.
b. Ensure that the number of ports in a single port channel is equivalent to
the number of participating ESXi hosts.
c. Ensure that the number of ports in a single port channel on the switch is
equivalent to or greater than the number of participating NICs from a
specific ESXi host.
d. Ensure that the number of participating NICs on each host is greater
than the number of ports in the port channel.
9. You want to enable vDS health checks in your vSphere 8.0 environment.
Which of the following is a valid choice for a health check service that you can
enable or disable in the vSphere Client?
a. MTU and Failover
b. VLAN and MTU
c. VLAN and Teaming
d. MTU and Teaming
10. You are configuring rules to mark network packets. Which of the following is
not a valid option for qualifying packets?
a. Destination IP address
b. Source IP address
c. Source and destination MAC addresses
d. VM guest OS type
334 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
■ If you created a new standard switch with a VMkernel adapter, use the
Port Properties page to configure the adapter:
a. Provide a network label that indicates its purpose, such as vMotion
or NFS.
b. Optionally, set a VLAN ID.
c. Select IPv4, IPv6, or IPv4 and IPv6.
d. Set MTU to a custom size for the VMkernel adapter or choose to
get the MTU from a switch.
Chapter 9: Configuring and Managing Virtual Networks 335
NOTE If you create a standard switch without physical network adapters, all traffic
on that switch is confined to that switch. You can create a standard switch without
physical network adapters if you want a group of virtual machines to be able to com-
municate with each other but with nothing else.
You can make vSS configuration settings, including settings that control switch-wide
defaults for ports. Such settings can be overridden by port group settings. To modify
the settings of a vSS, select the host in the vSphere Client inventory pane and click
Edit. You can then adjust the following settings:
■ Number of vSS ports: The number of ports on a standard switch is dynami-
cally scaled up and down. You cannot explicitly set the number of ports in a
vSS. A vSS can expand up to the maximum number of ports supported on the
host, which is based on the maximum number of virtual machines the host can
handle.
■ Maximum transmission unit (MTU): You can enable jumbo frames on a vSS
by increasing the MTU setting from the standard 1500 bytes. You can set the
MTU between 1280 bytes and 9000 bytes.
■ Physical network adapter: Virtual machines connected to a vSS can only
reach the physical networks through uplink physical network adapters. If you
can connect two or more adapters to a vSS, they are transparently teamed.
336 VCP-DCV for vSphere 8.x Cert Guide
To change or add physical adapters that are assigned to a vSS, you can use the fol-
lowing procedure:
Step 1. In the vSphere Client, select the ESXi host in the inventory pane and
navigate to Configure > Networking > Virtual Switches.
Step 2. Navigate to the appropriate standard switch and select Manage Physical
Adapters.
Step 3. In the Manage Physical Adapters window, click the Add Adapter (green
plus sign) button.
Step 4. In the Add Physical Adapters to Switch window, select one or more adapt-
ers to assign to the vSS and click OK.
Step 5. In the Manage Physical Adapters window, use the up and down buttons to
set each assigned vSS adapter to Active, Standby, or Unused. Click OK.
To view the MAC address and other characteristics of a host’s physical NICs, you
can select the host and navigate to Configure > Networking > Physical Adapters.
To change the speed and duplexing of an adapter, select the adapter, click Edit, and
make the change.
When configuring networks for the virtual machines in your vSphere environment,
consider whether you want to migrate the virtual machines among a set of hosts. If
you do, be sure that the hosts are in the same broadcast domain (that is, the same
Layer 2 subnet). ESXi does not support migration of virtual machines between
hosts in different broadcast domains as a virtual machine may lose access to required
resources in the destination network. Even if your network provides high availability
or includes intelligent switches that can resolve the virtual machine’s needs across
different networks, you may experience significant lag times as the Address Resolu-
tion Protocol (ARP) table updates.
■ If you are creating a new standard switch, you can assign physical net-
work adapters to the standard switch or you can choose to create the
standard switch with no assigned physical network adapters:
a. Click Add Adapters.
b. Select an adapter from the Network Adapters list.
c. Use the Failover Order Group drop-down menu to assign the
adapter to Active Adapters, Standby Adapters, or Unused Adapt-
ers and click OK.
d. Use the up and down arrows in the Assigned Adapters list to change
the position of the adapter, if needed.
e. Click Next.
Step 4. On the Connection Settings page, set a network label for the port group
and, optionally, set a VLAN ID. Click Next.
Step 5. On the Ready to Complete page, click Finish.
On a standard switch port group, the VLAN ID reflects the VLAN tagging mode in
the port group, as shown in Table 9-2.
You can edit an existing standard switch port group by using the following
procedure:
Step 1. In the vSphere Client, select a host in the inventory pane and navigate to
Configure > Networking > Virtual Switches.
Step 2. Select the appropriate standard switch and navigate to the switch’s topol-
ogy diagram.
Step 3. In the topology diagram, click on the name of the port group and click
the Edit Settings icon.
Step 4. On the Properties page, optionally change the port group’s network label
and VLAN ID.
338 VCP-DCV for vSphere 8.x Cert Guide
Step 5. On the Security page, optionally override the switch settings concerning
MAC address impersonation and using promiscuous mode.
Step 6. On the Traffic Shaping page, optionally override the switch settings for
throttling network traffic based on average and peak bandwidth.
Step 7. On the Teaming and Failover page, optionally override the teaming and
failover settings inherited from the standard switch. Optionally configure
traffic distribution across the physical adapters and the failover order.
Step 8. Click OK.
To remove a port group from a standard switch, navigate to the switch’s topology,
select the port group, and click the Remove Selected Port Group icon.
In step 4, if you are deploying vDS 8.0 or higher, you can set Network Offloads
Compatibility to Pensando or NVIDIA BlueField. With this setting, the network and
security functions will be offloaded to the DPU device. DPU is a smart network card
(SmartNIC) that has compute capability embedded in it. You can offload the network-
ing functionality from the ESXi host to DPU for better performance. You can config-
ure network offloads compatibility during the creation of the distributed switch, but
you cannot modify the setting that associates hosts to the distributed switch.
If you plan on using NSX-T, set the vDS version to 7.0.0 or later and use
NSX-T 3.0 or later.
Upgrading a vDS
You can upgrade a vDS from Version 6.x to a later version, but you cannot revert
a vDS to an earlier version. As a rollback plan, you should export the distributed
switch configuration prior to upgrading. In the export wizard, choose the option to
include the distributed port groups. If an issue emerges, you can re-create the vDS
by importing the switch configuration file and choosing the Preserve Original Dis-
tributed Switch and Port Group Identifiers option.
It is possible to both export and import vDS configurations:
■ Exporting a vDS configuration: To export a vDS configuration, select it in
the inventory pane, select Settings > Export Configuration, and use the wizard.
In the wizard, select whether you want to include the configuration of the dis-
tributed port groups in the export. Optionally, you can provide a description
for the export. The file is saved to your local system.
■ Importing a vDS configuration: To import a vDS configuration, right-click
a data center in the inventory pane, select Distributed Switch > Import Dis-
tributed Switch, and use the wizard. In the wizard, to assign the keys from the
configuration file to the switch and its port groups, select the Preserve Origi-
nal Distributed Switch and Port Group Identifiers checkbox.
340 VCP-DCV for vSphere 8.x Cert Guide
Upgrading a distributed switch causes the hosts and virtual machines attached to the
switch to experience brief downtime. VMware recommends performing the upgrade
during a maintenance window and changing the DRS mode to manual (and ignor-
ing DRS recommendations) during the upgrade.
You can use the following procedure to upgrade a vDS:
Step 1. In the vSphere Client, navigate to Networking, right-click the distrib-
uted switch in the inventory pane, and select Upgrade > Upgrade Dis-
tributed Switch.
Step 2. Select the vSphere Distributed Switch version (8.0.0, 7.0.3, 7.0.2, 7.0.0,
6.6.0, or 6.5.0) that you want to upgrade the switch to and click Next.
Step 3. Complete the wizard and click Finish.
NOTE If some ESXi hosts are incompatible with the selected target version, you
should upgrade (or remove) the incompatible hosts or select another distributed
switch version.
Step 3. Provide the collector IP address and collector port of the NetFlow
collector.
Step 4. Set an observation domain ID that identifies information related to the
switch.
Step 5. Optionally, set the switch IP address and provide an IP address if you
want to see the information from the distributed switch in the NetFlow
collector under a single network device (IP address) instead of under a
separate device for each host.
Step 6. Optionally, set the Active Flow Export Timeout and Idle Flow Export
Timeout options to time values, in seconds, to wait before sending infor-
mation after the flow is initiated.
Step 7. Optionally, to change the portion of data that the switch collects, config-
ure the sampling rate.
Step 8. Optionally, to collect data on network activity between virtual machines
on the same host, enable Process Internal Flows Only.
Step 9. Click OK.
Step 3. On the Configure Settings page, optionally change any of the following
properties:
■ Port Binding: Choose Static or Ephemeral.
■ Port Allocation: Choose Elastic or Fixed.
■ Number of Ports: Increase or decrease the value from the default
(which is 8).
■ Network Resource Pool: Select an available pool.
■ VLAN: Set VLAN Type to None, VLAN, VLAN Trunking, or
Private VLAN and provide the corresponding settings.
■ Advanced: Select the Customize Default Policy Configuration
checkbox.
Click Next.
Step 4. If you selected the Customize Default Policy Configuration checkbox
in step 4, you can use the following pages to customize policies:
■ On the Security page, provide your choices for accepting or rejecting
Promiscuous Mode, MAC Address Changes, and Forged Transmits and
click Next.
■ On the Traffic Shaping page, enable ingress traffic shaping or egress
traffic shaping, or both. If you enable traffic shaping, you can set the
average bandwidth, peak bandwidth, and burst size. Click Next.
■ On the Teaming and Failover page, optionally set the Load Balancing,
Network Failure Detection, Notify Switches, Failback, and Failover
Order options. Click Next.
Step 5. On the Monitoring page, enable or disable NetFlow and click Next.
Step 6. On the Miscellaneous Settings page, click Next.
Step 7. On the Ready to Complete page, review the settings and click Finish.
VMkernel Networking
This section describes the procedures for configuring VMkernel networking.
choose whether to add the adapter to a new standard switch or to an existing stan-
dard switch.
To add a VMkernel adapter to a distributed port group, you can use the following
procedure:
Step 1. In the vSphere Client, right-click a distributed port group in the inven-
tory pane and select Add VMkernel Adapters.
Step 2. On the Select Hosts page, click Attached Hosts (green plus sign), select
the appropriate hosts, and click Next.
Step 3. Configure the VMkernel adapter IP, MTU, Stack and Available Services
settings, as previously described.
Step 4. Complete the wizard and click Finish.
To view information about the VMkernel adapters in a host, select the host in the
inventory pane and select Configure > Networking > VMkernel Adapters. To view
details, select a specific adapter and examine the All, Properties, IP Settings, and
Policies tabs. To modify a VMkernel adapter, select the adapter and click Edit.
Step 8. On the Advanced page, edit the maximum number of connections and the
congestion control algorithm.
Step 9. Click OK.
To create a custom TCP/IP stack, you can use the following command in the ESXi
shell:
esxcli network ip netstack add -N="stack_name"
After creating a custom stack, you can use the previously described procedure
to configure the stack. When creating a VMkernel virtual network adapter, you
can select any existing custom stack or predefined stack (default, vMotion, or
provisioning).
To configure resource allocation for system traffic, you can use the following
procedure:
Step 1. In the vSphere Client, select the distributed switch in the inventory pane.
Step 2. On the Configure tab, expand Resource Allocation.
Step 3. Click System Traffic.
Step 4. Select the appropriate traffic type and click Edit.
Step 5. Set the desired values for Shares, Reservation, and Limit.
Step 6. In the Reservation text box, enter a value for the minimum bandwidth
that must be available for the traffic type.
Step 7. In the Limit text box, set the maximum bandwidth that system traffic of
the selected type can use.
Step 8. Click OK to apply the allocation settings.
NOTE The maximum quota that you can assign to the pool is equal to the aggre-
gated reservation for virtual machine system traffic minus the quotas of the other
network resource pools.
346 VCP-DCV for vSphere 8.x Cert Guide
After creating a network resource pool, you can assign a distributed port group to
the resource pool by using the following procedure:
Step 1. In the vSphere Client, right-click a distributed port group in the inven-
tory pane and select Edit Settings.
Step 2. In the settings, click General.
Step 3. In the Network Resource Pool drop-down menu, select the network
resource pool and click OK.
Finally, you can set the network shares, reservation, and limit settings for individual
virtual machines that are connected to the distributed port group in a network
resource pool by using the following procedure:
Step 1. In the vSphere Client, select a virtual machine in the inventory pane and
navigate to Actions > Edit Settings.
Step 2. Expand the Network Adapter section of the VM network adapter.
Step 3. Either add and configure a new network adapter or select an existing net-
work adapter.
Step 4. Configure the network adapter’s Shares, Reservation, and Limit settings.
Step 5. Click OK.
After creating the PVLANs, you can use them when assigning the VLAN network
policies for distributed port groups and distributed ports, just as you do with stan-
dard VLANs.
Chapter 9: Configuring and Managing Virtual Networks 347
Now you are ready to use the following procedure to configure a virtual machine for
DirectPath access to the passthrough NIC:
Step 1. In the vSphere Client, locate the virtual machine in the inventory pane.
Step 2. Power off the virtual machine.
Step 3. Select Actions > Edit Settings.
Step 4. Select the Virtual Hardware tab.
Step 5. Select Memory and set Limit to Unlimited.
Step 6. Click Add New Device and select Other Devices > PCI Device.
Step 7. From the New PCI Device drop-down menu, select the appropriate
passthrough device and click OK.
Step 8. Power on the virtual machine.
Step 5. In the Number of Virtual Functions text box, type the number of virtual
functions that you want to configure for the adapter.
Step 6. Click OK.
Step 7. Restart the host.
You can use the following vCLI command to examine a host’s virtual functions:
esxcli network sriovnic
You can use the following procedure to implement SR-IOV for a virtual machine:
Step 1. In the vSphere Client, select the virtual machine in the inventory pane.
Step 2. Power off the virtual machine.
Step 3. Select Actions > Edit Settings.
Step 4. Select the Virtual Hardware tab.
Step 5. From the Add New Device drop-down menu, select Network Adapter.
Step 6. Expand the New Network section and connect the virtual machine to a
port group. (The virtual NIC does not use this port group for data traf-
fic. The port group is used to identify the networking properties, such as
VLAN tagging, to apply on the data traffic.)
Step 7. Select Adapter Type > SR-IOV Passthrough.
Step 8. From the Physical Function drop-down menu, select the physical NIC.
Step 9. To allow changes in the MTU of packets from the guest operating sys-
tem, use the Guest OS MTU Change drop-down menu.
Step 10. Expand the Memory section, select Reserve All Guest Memory (All
Locked), and click OK.
Step 11. Power on the virtual machine.
Chapter 9: Configuring and Managing Virtual Networks 349
The host selects a free virtual function from the physical adapter and maps it to
the SR-IOV passthrough adapter. The host validates all properties of the virtual
machine adapter and the underlying virtual function against the settings of the port
group to which the virtual machine belongs.
NOTE The step to reserve all the guest memory is required to allow the I/O mem-
ory management unit (IOMMU) and the passthrough device to access the memory
using direct memory access (DMA).
Optionally, you can use the virtual switch, port group, or port to set the MTU size,
security policy for VF traffic, and VLAN tagging mode.
You can enable SR-IOV with host profiles. In a host profile, expand General System
Settings > Kernel Module. Select the appropriate physical function driver and pro-
vide the number of virtual functions that you want to provide for each physical func-
tion. The details depend on your hardware.
Before creating the LAG on a vDS in vSphere 8.0, you should address the following
requirements:
■ An LACP port channel must be available on a physical switch and configured
to support the host, including the appropriate number of ports, speed, duplex-
ing, and hashing (load balancing) algorithm.
■ The vDS must be Version 6.5 or later.
■ Enhanced LACP must be supported on the distributed switch, so use the
vSphere Client to select the vDS in the inventory pane, navigate to Sum-
mary > Features, and verify that Link Aggregation Control Protocol is set to
Enhanced Support.
Enhanced LACP for vDS supports the following load-balancing modes (hashing
algorithms):
■ Destination IP address
■ Destination IP address and TCP/UDP port
■ Destination IP address and VLAN
■ Destination IP address, TCP/UDP port, and VLAN
■ Destination MAC address
■ Destination TCP/UDP port
■ Source IP address
■ Source IP address and TCP/UDP port
■ Source IP address and VLAN
■ Source IP address, TCP/UDP port, and VLAN
■ Source MAC address
■ Source TCP/UDP port
■ Source and destination IP address
■ Source and destination IP address and TCP/UDP port
■ Source and destination IP address and VLAN
■ Source and destination IP address, TCP/UDP port, and VLAN
■ Source and destination MAC address
352 VCP-DCV for vSphere 8.x Cert Guide
To change the LACP feature state from Basic Support to Enhanced Support, you
can use the following procedure:
Step 1. In the vSphere Client, select the vDS in the inventory pane and navigate
to Summary > Features.
Step 2. Verify that Link Aggregation Control Protocol is set to Basic Support.
Step 3. Select Actions > Upgrade.
Step 4. Select Enhance LACP Support.
Step 5. Navigate through the wizard to verify the port group accessibility and
LACP configuration prerequisites.
Step 6. If the prerequisite verifications passed, complete the wizard and click
Finish.
Step 4. If you want to override the VLAN and NetFlow policies for each indi-
vidual uplink port, set the VLAN and NetFlow policies for the LAG.
Step 5. Click OK.
The LAG is now available for use. It appears as unused in the teaming and failover
settings of the distributed port groups. To use the LAG as the uplink for a distrib-
uted port group, you can use the following procedure:
Step 1. In the vSphere Client, select the distributed switch in the inventory pane.
Step 2. Use the following steps to set the LAG as Standby for the appropriate
distributed port groups:
a. Select Actions > Distributed Port Group > Manage Distributed
Port Groups.
b. Select Teaming and Failover and click Next.
c. Select the port groups where you want to use the LAG.
d. In Failover Order, select the LAG and use the arrow keys to move it to
the Standby Uplinks list.
e. Complete the wizard and click Finish.
Step 3. Use the following steps to assign the host’s physical NICs to the LAG:
a. Select Actions > Add and Manage Hosts > Manage Host
Networking.
b. Select the host and click Next.
c. On the Select Network Adapter Tasks page, select Manage Physical
Adapters and click Next.
d. On the Manage Physical Adapters page, select a NIC and click Assign
an Uplink.
e. Select a LAG port and click OK.
f. Repeat steps d and e for each NIC you want to include in the LAG.
g. Complete the wizard and click Finish.
Step 4. Use the following steps to activate the LAG for the appropriate distrib-
uted port groups:
a. Select Actions > Distributed Port Group > Manage Distributed
Port Groups.
b. Select Teaming and Failover and click Next.
c. Select the port groups where you previously set the LAG for standby.
354 VCP-DCV for vSphere 8.x Cert Guide
d. In Failover Order, select the LAG and use the arrow keys to move it to
the Active Uplinks list.
e. Move each standalone uplink to the Unused list.
f. Complete the wizard and click Finish.
You can use the Add and Manage Hosts wizard to add multiple hosts at a time. To do
so, follow these steps:
Step 1. In the vSphere Client, select the distributed switch in the inventory pane
and navigate to Actions > Add and Manage Hosts.
Step 2. On the Select Task page, select Add Hosts and click Next.
Step 3. On the Select Hosts page, click New Hosts.
Step 4. Select the appropriate hosts in your data center, click OK, and then click
Next.
Step 5. On the next page, select the tasks for configuring network adapters to the
distributed switch and click Next.
Step 6. On the Manage Physical Network Adapters page, do the following:
a. From the On Other Switches/Unclaimed list, select an unclaimed
physical NIC or select a NIC to migrate from another virtual switch.
b. Click Assign Uplink.
c. Select an uplink and click OK.
NOTE In the vSphere inventory, the hosts that you add must reside in the same data
center as the vDS.
NOTE If you migrate or create VMkernel adapters for iSCSI, verify that the team-
ing and failover policy of the target distributed port group meets the requirements for
iSCSI:
■ Verify that only one uplink is active, the standby list is empty, and the rest of the
uplinks are unused.
■ Verify that only one physical NIC per host is assigned to the active uplink.
To migrate a set of virtual machines from one network (distributed port group or
standard port group) to another, you can use the following procedure:
Step 1. In the vSphere Client, select the network in the inventory pane and navi-
gate to Actions > Migrate VMs to Another Network.
Step 2. In the wizard, select Destination Network, click OK, and click Next.
Step 3. On the next page, select the virtual machines that you want to migrate
and click Next.
Step 4. On the Ready to Complete page, click Finish.
358 VCP-DCV for vSphere 8.x Cert Guide
To configure a traffic filtering and marking policy for a vDS, for example, you can
use the following procedure:
Step 1. In the vSphere Client, select a distributed port group or uplink port
group in the inventory pane and navigate to Configure > Settings >
Traffic Filtering and Marking.
Step 2. Click Enable and Reorder.
Step 3. Click Enable All Traffic Rules.
Step 4. Click OK.
Step 5. To create a rule to mark traffic, use the following steps:
a. Click Add.
b. Select Action > Tag and configure the tag either for CoS or DSCP.
c. Set the traffic direction and specify the traffic qualifiers (system, MAC,
or IP).
d. Optionally, click the Enable Qualifier checkbox and provide informa-
tion for qualifying the packets to mark. You can use the following tabs
to qualify data:
■ IP: Identify packets by source and destination addresses and ports.
■ MAC: Identify packets by source and destination addresses and by
VLAN.
■ System Traffic: Identity data by system traffic type (such as man-
agement or vMotion).
e. Click OK.
Step 6. To create a rule to filter traffic, repeat step 5 but configure the action to
either allow traffic to pass or to block the traffic.
Chapter 9: Configuring and Managing Virtual Networks 361
Review Questions
1. You want to use VLAN guest tagging with your vSphere Standard Switch.
What setting should you make on the standard port group?
a. Set VLAN ID to 0.
b. Set VLAN ID to 4095.
c. Set VLAN Type to Trunking.
d. Set VLAN Type to Guest Tagging.
2. You are preparing to upgrade a vDS to Version 8.0.0. What step should you
take prior to upgrading?
a. Copy the vDS.
b. Back up vCenter Server.
c. Export the vDS configuration, including the distributed port group
configuration.
d. Export the vDS configuration, excluding the distributed port group
configuration.
3. You enabled NIOC, reserved virtual machine system traffic, and created a
network resource pool. Which of the following steps do you need to take to
allow a virtual machine to use the network resource pool?
a. Edit the virtual machine and set the network resources allocation policy.
b. Add the virtual machine to the resource pool.
c. Assign the network resource pool to the distributed port group where
the virtual machines are connected.
d. In the inventory pane, drag and drop the virtual machine onto the
network resource pool.
4. You are creating a VMkernel virtual adapter for vMotion traffic. Which of the
following is not a valid option?
a. In a standard switch, assign the adapter to the vMotion stack.
b. In a distributed switch, assign the adapter to the vMotion stack.
c. In a standard switch, assign the adapter to the default stack.
d. In a distributed switch, assign the adapter to the provisioning stack.
Chapter 9: Configuring and Managing Virtual Networks 363
Table 10-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
Creating and Configuring a vSphere Cluster 1
Creating and Configuring a vSphere DRS Cluster 2, 3
Creating and Configuring a vSphere HA Cluster 4, 5
Monitoring and Managing vSphere Resources 6–8
Events, Alarms, and Automated Actions 9
Logging in vSphere 10
1. In a cluster that you initially created using Quickstart and for which you
chose the option Configure Network Settings Later, you now want to add
a host. Which of the following is a true statement?
a. You cannot use Quickstart to add more hosts to the cluster.
b. You can use Quickstart to add hosts to the cluster and configure the
host networking.
c. You can use Quickstart to add hosts to the cluster but must manually
configure the host networking.
d. You can edit the cluster and change the Configure Networking
Settings Later option.
366 VCP-DCV for vSphere 8.x Cert Guide
2. You are creating a resource pool in a DRS cluster. Which of the following
statements are true? (Choose three.)
a. When you create a child resource pool, the system applies admission
control.
b. If you choose Scale Descendant’s Shares, child pools use scalable shares.
c. The default CPU reservation is 0.
d. The default memory limit is 0.
e. The default reservation type is Fixed (Non-Expandable).
5. You are configuring a vSphere HA cluster and want to configure proactive HA.
Which of the following is not a requirement?
a. Host.Config.Quarantine and Host.Config.Maintenance privileges
b. A vendor-supplied vSphere Client plug-in
c. A VMware-supplied plug-in
d. vSphere DRS
Chapter 10: Managing and Monitoring Clusters and Resources 367
7. You are configuring virtual disks for the virtual machines in your vSphere
environment. Which provisioning type is the best choice when you care more
about optimizing the space usage than about performance or availability risk?
a. Thin
b. Thick eager zeroed
c. Thick lazy zeroed
d. Sparse
10. You are examining vSphere logs. Which of the following logs contains data
about the agent that manages and configures the ESXi host?
a. /var/log/vmkernel.log
b. /var/log/vpxa.log
c. /var/log/hostd.log
d. /var/log/vmksummary.log
368 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
Creating a Cluster
To create a vSphere cluster that you plan to configure using Quickstart, you should
ensure that the hosts have the same ESXi version and patch level. If you are adding
hosts to the vCenter Server inventory, you need the credentials for the root user
account for the hosts. You must have the Host.Inventory.Create Cluster privilege.
To create a cluster that you manage with a single image, verify that you have a sup-
ported ESXi 7.0 or later image available in the vSphere Lifecycle Manager depot.
You can use the following procedure to create the cluster:
Step 1. In the vSphere Client, right-click a data center in the inventory pane and
select New Cluster.
Step 2. Enter a name for the cluster.
Step 3. Optionally, for each of the following services, slide the switch to the right
to enable the service:
■ vSphere DRS
■ vSphere HA
■ vSAN
If you enable DRS, you can optionally change its automation setting.
(The default is Fully Automated using Threshold Level 3.)
Step 4. Optionally, to create a cluster that you manage with a single image, select
Manage All Hosts in the Cluster with a Single Image and then do the
following:
■ Select an ESXi version (image) from the drop-down menu.
■ Optionally, select options from the Vendor Addon and Vendor Addon
Version drop-down menus.
Step 5. Click OK.
Chapter 10: Managing and Monitoring Clusters and Resources 369
To configure cluster settings and host networking in a cluster, you can use the fol-
lowing procedure:
Step 1. In the vSphere Client, select a cluster in the inventory pane and navigate
to Configure > Configuration > Quickstart.
Step 2. Optionally, if you want to configure the cluster manually, click Skip
Quickstart, which is irreversible. Otherwise, continue with the following
steps to use Quickstart to configure the cluster.
Step 3. Click Configure Cluster > Configure.
370 VCP-DCV for vSphere 8.x Cert Guide
Step 4. On the Distributed Switches page, you can either select the irreversible
option Configure Networking Settings Later or use the following
steps to configure the cluster networking:
a. Specify the number of distributed switches to create (up to three).
b. Enter a unique name for each distributed switch. Alternatively, click
Use Existing and select an existing compatible distributed switch and
distributed port group.
c. To set up the vMotion network, select a distributed switch and assign a
new port group to it.
d. In the Physical Adapters section, for each physical network adapter,
assign a distributed switch name from the drop-down menu. Ensure
that each new distributed switch is assigned to at least one physical
adapter. For any existing distributed switch, to avoid an error, select
the physical adapter that is currently mapped to the switch.
e. Click Next.
f. If you enabled the vSphere DRS feature during cluster creation, in the
vMotion Traffic page that appears, provide the VLAN ID, protocol
type, and IP configuration.
Step 5. Click Next.
Step 6. In the Advanced Options page, configure the following options:
a. If you enabled vSphere HA during cluster creation, use the options in
the High Availability section to enable or disable host failure monitor-
ing, virtual machine monitoring, and admission control. For admission
control, you can specify the number of hosts for failover capacity.
b. If you enabled vSphere DRS during cluster creation, use the options in
the Distributed Resource Scheduler section to set the automation level
and migration threshold.
c. In the Host Options section, set the Lockdown Mode and enter an
NTP server address.
d. Optionally, in the Enhanced vMotion Capability section, use the
options to enable EVC and select a mode.
Step 7. Click Next.
Step 8. On the Ready to Complete page that appears, review the settings and
click Finish.
You can extend a cluster by adding more hosts. If you initially selected the Skip
Quickstart option, then you should add hosts manually. If you previously used
Chapter 10: Managing and Monitoring Clusters and Resources 371
Quickstart but selected Configure Networking Settings Later, you can add hosts
by using Quickstart but must manually configure the host networking. To extend a
cluster, you can use the following procedure:
Step 1. In the vSphere Client, right-click a configured cluster in the inventory
pane and select Add Hosts.
Step 2. In the wizard, select hosts from the vCenter Server inventory and add
new hosts (by providing names and credentials) to include in the cluster.
Step 3. On the Ready to Complete page, click Finish.
Step 4. On the Configure Hosts card of the Extend Cluster Guide page that
appears, select Configure. If you previously used Quickstart to con-
figure the host networking, the vMotion Traffic page appears. Provide
the VLAN ID, protocol type, and IP configuration. A pop-up window
appears, informing you that the configuration for the hosts that exist in
the cluster is applied to the newly added hosts.
Step 5. Click Continue.
After successful validation, the Configure button in the Configure Hosts card
becomes inactive, and the Re-validate button is available.
If you enable DRS, the default Automation Level setting is Fully Automated, and
the default Threshold setting is 3. If you enable HA, the default values are Host
Monitoring and Admission Control Are Enabled and VM Monitoring Is Disabled.
You can override the default values later in the workflow.
If you select an image for managing all the hosts in the cluster, you can later edit the
image specification on the Updates tab. If you do not choose an image to manage
hosts, you must manage the cluster by using baselines and baseline groups. You can
switch from using baselines to using images later.
Starting with vSphere 7.0, you can use vSphere Lifecycle Manager to upgrade and
update the hosts in a cluster. A vSphere Lifecycle Manager image is a combination
of vSphere software, driver software, and firmware for specific host hardware. You
can assign an image to a cluster used to control the software set to be installed on
the hosts, including the ESXi version, additional VMware-provided software, and
vendor software, such as firmware and drivers.
The image that you define during cluster creation is not immediately applied to
the hosts. If you do not set up an image for a cluster, the cluster uses baselines and
baseline groups. For more information about using images and baselines to manage
hosts in clusters, see the Managing Host and Cluster Lifecycle documentation.
372 VCP-DCV for vSphere 8.x Cert Guide
EVC Mode
As previously described, you can configure EVC by using Quickstart > Configure
Cluster. You can also configure EVC directly in the cluster settings. You can set
VMware EVC to Disable EVC, Enable EVC for AMD Hosts, or Enable EVC for
Intel Hosts.
If you choose Enable EVC for AMD Hosts, you can set the mode to one of the
options listed in Table 4-3 in Chapter 4, “Clusters and High Availability.”
If you choose Enable EVC for Intel Hosts, you can set the mode to one of the
options listed in Table 4-2 in Chapter 4.
To view the EVC modes for all of a cluster’s virtual machines in the vSphere Client,
you can select a cluster, navigate to its VMs tab, and select Show/Hide Columns >
EVC Mode.
Step 6. Optionally, set CPU and Memory Limit to a numeric value (the default is
Unlimited) and a unit of measure (MB, GB, MHz, or GHz).
Step 7. Optionally, deselect the CPU and Memory Expandable checkboxes
(which are selected by default).
Step 8. Click OK.
NOTE When you create a child resource pool, the vSphere Client prompts you for
resource pool attribute information. The system uses admission control to ensure that
you do not allocate resources that are not available. If you choose Scale Descendant’s
Shares, each descendant pool will also use scalable shares. You cannot change this
behavior for each child pool.
You can use the following procedure to create a VM–VM affinity or anti-affinity rule:
Step 1. Browse to the cluster in the vSphere Client.
Step 2. Navigate to Configure > VM/Host Rules and click Add.
Step 3. In the Create VM/Host Rule dialog box, type a name for the rule.
Step 4. From the Type drop-down menu, select either Keep Virtual Machines
Together (affinity) or Separate Virtual Machines (anti-affinity).
374 VCP-DCV for vSphere 8.x Cert Guide
Configuring VMCP
To configure Virtual Machine Component Protection (VMCP) in a vSphere HA
cluster, you can use the following procedure:
Step 1. In the vSphere Client, select the cluster in the inventory pane and navi-
gate to Configure > vSphere Availability > Edit.
Step 2. Select Failures and Responses > Datastore with PDL and choose one
of the following:
■ Issue Events
■ Power Off and Restart VMs
Step 3. Select Failures and Responses > Datastore with APD and choose one
of the following:
■ Issue Events
■ Power Off and Restart VMs–Conservative Restart Policy
■ Power Off and Restart VMs–Aggressive Restart Policy
376 VCP-DCV for vSphere 8.x Cert Guide
Configuring Proactive HA
To get started with implementing Proactive HA, you need to install a supported
vendor-supplied vSphere Client plug-in and register the proactive HA provider.
When you turn on proactive HA in a cluster, you can select from the list of provid-
ers for installed plug-ins that are monitoring every host in the cluster. You can use
the following procedure to configure proactive HA in a cluster:
Step 1. Ensure that the following prerequisites are met:
■ vSphere HA and DRS are enabled.
■ To allow remediation actions, ensure that you have the Host.Config.
Quarantine and Host.Config.Maintenance privileges.
Step 2. In the vSphere Client, select the cluster in the inventory pane and navi-
gate to Configure > vSphere Availability > Edit.
Step 3. Select Turn on Proactive HA.
Step 4. Click Proactive HA Failures and Responses.
Step 5. Set Automation Level to Manual or Automated.
Step 6. Set Remediation to one of the following:
■ Quarantine Mode for All Failures
■ Quarantine Mode for Moderate and Maintenance Mode for
Severe Failure (Mixed)
■ Maintenance Mode for All Failures
Chapter 10: Managing and Monitoring Clusters and Resources 377
To turn on FT for a virtual machine, you can use the following procedure:
Step 1. In the vSphere Client, right-click the virtual machine in the inventory
pane and select Fault Tolerance > Turn On Fault Tolerance.
Step 2. Click Yes.
Step 3. Select a datastore on which to place the secondary VM configuration files
and click Next.
Step 4. Select a host on which to place the secondary VM and click Next.
Step 5. Review your selections and then click Finish.
Metrics
Performance metrics are organized into logical groups based on the object or object
device, as shown in Table 10-3.
Disk metrics include I/O performance, such as latency and read/write speeds, and
utilization metrics for storage as a finite resource.
The value obtained for memory utilization is one of the following:
■ For virtual machines, memory refers to the guest physical memory, which is the
virtual memory the hypervisor presents to the guest as physical memory.
■ For hosts, memory refers to the machine memory, which is the physical mem-
ory in the host system.
Chapter 10: Managing and Monitoring Clusters and Resources 379
Overview and advanced performance charts are available for data center, cluster,
host, resource pool, vApp, and virtual machine objects. Overview performance charts
are also available for datastores and datastore clusters. Performance charts are not
available for network objects. Charts are organized into views, which you can use to
see related data together on one screen. You can specify the time range or data col-
lection interval. Advanced charts contain more information than overview charts.
You can print, configure, and export advanced charts (in PNG, JPEG, or CSV
formats).
Table 10-5 lists the available performance chart views by object type.
NOTE When Storage I/O Control is disabled, the values for the Storage I/O
Normalized Latency metrics are zeros.
You can use the following procedure to access an advanced performance chart:
Step 1. In the vSphere Client, select an appropriate object in the inventory pane
and navigate to Monitor > Performance.
Step 2. Click Advanced.
Step 3. Optionally, select an appropriate view from View drop-down list.
Step 4. Optionally, click the Popup Chart icon to open the chart in a separate
window.
Step 5. Click Chart Options.
Step 6. Under Chart Metrics, select an appropriate metric group.
Step 7. Select a time span. If you choose Custom Interval, then select one of the
following:
■ Last: Specify the number of hours, days, weeks, or months.
■ From: Specify beginning and ending times.
Step 8. Under Target Objects, select the appropriate inventory objects.
(Optionally, use the All or None buttons.)
Step 9. Select an appropriate chart type.
Step 10. Under Counters, select the data counters to display in the chart.
(Optionally, use the All or None buttons.)
Step 11. Optionally, click Save Options As and save your settings as a custom chart.
NOTE Pop-up charts are useful for maximizing the available real estate for a chart
and for comparing two separate charts side by side.
NOTE For the stacked graph type, you can use only one measurement unit. In addi-
tion, per-virtual-machine stacked graphs are available only for hosts. You can click on
a counter’s description name to display details, such as whether the selected metric
can be stacked for each virtual machine.
After you create a custom chart, the chart is added to the View drop-down list. You
can then use the chart in the same manner as you would any prebuilt view.
You can use the following procedure to delete a custom chart:
Step 1. In the vSphere Client, select an appropriate object in the inventory pane
and navigate to Monitor > Performance.
Chapter 10: Managing and Monitoring Clusters and Resources 383
You can use the following procedure to save data from an advanced performance
chart to a file either in a graphic format or in a comma-separated values (CSV)
format:
Step 1. In the vSphere Client, select an object in the inventory pane and navigate
to Monitor > Performance.
Step 2. Click Advanced.
Step 3. Optionally, select a view or change chart options until you are satisfied
with the chart.
Step 4. Click the Export icon.
Step 5. Select one of the following options:
■ To PNG: Exports a bitmap image to PNG format.
■ To JPEG: Exports a bitmap image to JPEG format.
■ To CSV: Exports text data to CSV format.
■ To SVG: Exports a vector image to SVG format.
Step 6. Provide a filename and location.
Step 7. Click Save.
The Summary tab shows the vSphere DRS score, the number of DRS recommenda-
tions, and the number of DRS faults, as shown in Figure 10-3.
If DRS is in manual mode, you can click on the number of DRS recommendations
on the Summary tab, which is a link that takes you to the DRS Recommendations
page. On the DRS Recommendations page, you can view the current
recommendations, select those that you want to apply, and click the Apply
Recommendations button. Each recommendation includes a description, such
as which virtual machine to migrate to which host, and a reason, such as balance
average memory loads.
Optionally, you can click the Run DRS Now button to make DRS perform its analy-
sis and potentially generate new recommendations.
breakdown of guest memory, including the Active Guest Memory, Swapped, Com-
pressed, and Ballooned metrics.
You can use overview and advanced performance charts with resource pools. When
you see undesired behavior, you can edit the settings for an existing resource pool to
change the pool’s CPU and memory shares, reservations, and limits. For example,
consider a scenario where you configure two resource pools in a cluster with 100
GHz CPU capacity. In a pool with 40 virtual machines, you set CPU Shares to
High. In another pool, which has 8 virtual machines, you set CPU Shares to Nor-
mal. You see in the performance charts that the virtual machines in the pool with
the 40 virtual machines have greater CPU Ready values than the virtual machines in
the other pool. You realize that although you used higher CPU shares for the first
pool, the virtual machines are experiencing more CPU contention than are virtual
machines in the second pool. To correct this, you could take one of the following
actions:
■ Increase the CPU shares on the first pool by using a custom value.
■ Change the CPU shares on the second pool to Low.
■ Set an appropriate CPU reservation on the first pool.
■ Set an appropriate CPU limit on the second pool.
■ Change the configuration to use scalable shares.
NOTE You can also set alarms to trigger when the host health status changes.
NOTE If you have access to Skyline Advisor, you can log in to Cloud Services at
https://skyline.vmware.com/advisor by using your My VMware account and use the
dashboard to view findings and recommendations discovered by Skyline.
The relative priority represented by each share changes whenever additional sib-
ling virtual machines are powered on or powered off. Likewise, each share’s relative
priority changes whenever the shares on siblings are increased or decreased. This
affects all virtual machines in the same resource pool.
For example, consider the following scenario:
■ All virtual machines have the same number of vCPUs.
■ Two virtual machines are run in a resource pool with CPU Limit set to 8 GHz.
■ The virtual machines are CPU bound (that is, they are demanding more CPU
resources than they are receiving).
■ The virtual machines’ CPU shares are set to Normal.
■ You should expect each virtual machine’s performance chart to show CPU
Utilization as 4 GHz.
■ When you power on a third CPU-bound sibling virtual machine with CPU
Shares value set to High, you should expect to see that the new virtual machine
uses 4 GHz and the first two machines drop to 2 GHz each.
To understand the impact of shares, consider another scenario, where a set of sibling
virtual machines are frequently CPU bound and are using all the resources in their
parent resource pool. During these periods of CPU contention in the resource pool,
you see significantly high CPU Ready Time values on each of the virtual machines.
You are only concerned about improving the performance of one specific virtual
machine, so you increase its CPU Shares value. The CPU’s Ready Time setting
for that machine should decrease during periods of CPU contention, and the CPU
Ready Time settings of its siblings should rise.
To guarantee that a specific amount of resources are always available to a running
virtual machine, even when the physical server is heavily loaded, you can set its CPU
or memory reservation. The vCenter Server or ESXi host allows you to power on a
virtual machine only if there are enough unreserved resources to satisfy the virtual
machine’s reservation. Likewise, your attempts to increase the reservation on a
running virtual machine (or a resource pool) succeed only if there are enough
unreserved resources to satisfy the request. In the previous scenario, if you want to
ensure that a virtual machine always has access to at least 1 GHz, regardless of the
number or resource settings of siblings, you should set its CPU reservation to 1 GHz.
NOTE The default CPU and memory reservation for a virtual machine is zero,
meaning that its guest OS is not guaranteed any specific amount of either resource.
Instead, with default settings, shares would be applied during periods of compute
resource contention.
394 VCP-DCV for vSphere 8.x Cert Guide
You can set limits for CPU, memory, and storage I/O for a virtual machine to estab-
lish an upper bound (maximum) amount of resources that can be allocated to the
virtual machine. The host never allocates more than the limit, even when there are
unused resources on the system. By default, the limits are set to Unlimited, which
means the virtual machine’s configured memory becomes its effective limit. Using
limits has both benefits and drawbacks:
■ Benefits: If you are concerned that the performance of a virtual machine may
deteriorate as you add virtual machines to the cluster, you could set limits on
the virtual machine to simulate having fewer available resources and measure
its performance.
■ Drawbacks: You might be wasting idle resources because the system prevents
virtual machines from exceeding the limits that you set, even when the system
is underutilized and idle resources are available.
NOTE If you want to reduce the risk that a virtual machine may consume excessive
resources and impact the performance of other virtual machines, you can consider
setting low shares on the virtual machine. Low shares decrease the virtual machine’s
access to the resource during periods of resource contention but also do not prevent
the virtual machine from using idle resources.
Admission Control
When you power on a virtual machine, the system checks the amount of available
unreserved CPU and memory resources. The system determines whether it can
guarantee the reservation for the virtual machine. This process is called admission
control. If enough unreserved CPU and memory are available (or if there is no res-
ervation), the virtual machine is powered on. Otherwise, an “Insufficient Resources”
warning appears.
NOTE Each virtual machine, including VMs with no user-specified memory reser-
vation, may have some reservation for its memory overhead. The memory overhead
reservation is considered by admission control.
Latency Sensitivity
If you have a latency-sensitive application, such as voice over IP (VoIP) or a media
player application, you can edit the virtual machine’s settings and set VM Options >
Advanced > Latency Sensitivity to High. With this setting, you should ensure that
all the virtual machine’s configured CPU and memory are reserved. With this set-
ting, the system effectively gives exclusive physical CPU access to each virtual CPU.
If the virtual machine is in a DRS cluster, DRS automatically creates a VM–host soft
affinity rule.
396 VCP-DCV for vSphere 8.x Cert Guide
ESXTOP
ESXTOP is a utility that provides a detailed real-time look at resource usage from
the ESXi shell. You can run ESXTOP in Interactive, Batch, or Replay Mode. You
must have root user privileges. RESXTOP is a similar tool that can be installed and
run from a Linux server and connected to ESXi hosts.
Chapter 10: Managing and Monitoring Clusters and Resources 397
By default, when you issue the command esxtop, the utility opens in Interactive
Mode to show the CPU panel, where statistics for each virtual machine and other
groups are displayed in separate rows. To see just virtual machine statistics, you can
press Shift+V. Each column provides CPU statistics, such as %USED, %WAIT,
%RDY, %CSTP, and %SWPWT. To see statistics for the multiple worlds
(processes) that comprise a virtual machine, you can press the E key and enter the
virtual machine’s ID. Figure 10-4 shows an example of an ESXTOP CPU panel,
displaying virtual machine statistics with one virtual machine (GID 33791)
expanded.
You can change the view from the CPU panel to other panels by using keystrokes.
For example, you can press the M key for the memory panel, the V key for the vir-
tual machine storage panel, or the N key for the network panel. Table 10-9 describes
some of the important statistics available for each panel.
NOTE The Network panel contains a row for each NIC in a virtual machine rather
than a row for each virtual machine. The E and Shift+V keystrokes are not applicable
to the Network panel.
You can use the -b argument to run ESXTOP in Batch Mode, where you can col-
lect statistics in a CSV file. You can later manipulate this file with other tools, such
as Microsoft Perfmon or Excel. For example, you can use the following command to
collect statistics in a file named mydata.csv:
esxtop -b > mydata.csv
You can use ESXTOP in Replay Mode, where it uses pre-collected data rather than
real-time data. To collect the data, you should run vm-support in Snapshot Mode,
specifying the data collection interval and duration (in seconds), as shown in the fol-
lowing example:
vm-support -S -d 3600 -I 5
After collecting the data, you must unpack and decompress the resulting tar file.
Then you can run ESXTOP in Replay Mode, providing the path to the data file, as
shown here:
esxtop -R vm-support_dir_path
VIMTOP
VIMTOP is a tool you can run in vCenter Server Appliance to see resource usage
for the services that are running. It is like ESXTOP but displays services, such as
vCenter Server, Certificate Manager, vPostgres, and ESXi Agent Manager, rather
than virtual machines and ESXi worlds (processes). You can use VIMTOP to iden-
tify which service is using the most compute, disk, or network resources whenever
vCenter Server is running poorly.
Events
Events are simply recorded incidents, such as user actions or system actions, involving
a host or any object managed by vCenter Server. The following are a few examples:
■ A license key expires.
■ A virtual machine is migrated.
■ A virtual machine is powered on.
■ A host connection is lost.
Event data includes details such as who generated the event, when it occurred, and
what type of event it was. Table 10-10 describes the types of events.
Messages that are longer than 1024 characters are split into multiple syslog
messages.
As an alternative to streaming events, you can forward events. When you forward
events, the events are sent to a remote server rather than recorded.
You can use the following procedure to forward vCenter Server logs to a remote
syslog server:
Step 1. Log on to VAMI as root.
Step 2. Select Syslog.
Step 3. In the Forwarding Configuration section, click Configure.
Step 4. In the Create Forwarding Configuration pane, enter the server address
of the destination host. The maximum number of supported destination
hosts is three.
Step 5. Select a protocol (TLS, TCP, RELP, or UDP) to use.
Step 6. Provide a port number.
Step 7. Optionally, add more destination servers.
Step 8. Click Save.
Step 9. Optionally, click Send Test Message.
402 VCP-DCV for vSphere 8.x Cert Guide
You can configure events to be written to the vCenter Server streaming facility.
Event streaming is disabled by default. You can use the following procedure to
stream events to a remote syslog server:
Step 1. In the vSphere Client, select the vCenter Server in the inventory pane
and navigate to Configure > Settings > Advanced Settings.
Step 2. Click Edit.
Step 3. Enable the vpxd.event.syslog option.
Alarms
An alarm is a notification that is activated in response to an event, a set of condi-
tions, or the state of an inventory object. Table 10-11 describes the elements that are
used in an alarm definition.
vSphere 8.0 provides many preconfigured alarms for hosts, virtual machines,
datastores, licenses, host flash capacity, vSAN, Fault Tolerance, host system, VASA
providers, storage policies compliance, vSphere HA, Storage DRS, virtual switches,
datastore clusters, and more. These alarms are triggered by specific events or con-
ditions. They are intended to alert you when something is becoming unhealthy or
unavailable or when the workload or performance of something is abnormal. You
can use the vSphere Client to edit, disable, enable, and delete alarms.
You can create custom alarms. For example, you might want to monitor the memory
usage of all virtual machines in a specific vSphere cluster. In the vSphere Client, you can
select the cluster in the inventory, create an alarm for the cluster, set the alarm’s Targets
value to virtual machine, and configure rules with triggers based on memory usage.
NOTE You can enable, disable, and modify alarms only from the object at which the
alarm is defined. For example, if you define a virtual machine memory alarm on a
cluster, you cannot change the alarm at the individual virtual machine level.
Chapter 10: Managing and Monitoring Clusters and Resources 403
You can acknowledge an alarm to let other users know that you are taking ownership
of the issue and to prevent the alarm from sending more email messages. The alarm,
however, is still visible in the system.
NOTE After you acknowledge an alarm in the vSphere Client, its alarm actions are
discontinued. Alarms are not cleared or reset when acknowledged.
To clear an alarm (that is, reset its state to normal), you need the Alarm.Set Alarm
Status privilege. You can select a triggered alarm and choose Reset to Green.
Step 8. Specify alarm reset rules by enabling the Reset the Alarm to Green
option and providing details, such as arguments, operators, and actions.
Step 9. Click Next.
Step 10. Click Enable This Alarm.
To edit an alarm, select an inventory object, navigate to Configure > Alarm Defini-
tions, select the alarm, and choose Edit. Apply steps 3 through 10 from the preced-
ing procedure.
Alarm Actions
Alarm actions are operations that are automatically triggered by alarms. Table 10-12
provides details on available alarm actions.
■ Something is not performing well (such as excessive CPU ready time, memory
swapping, disk latency, or packets dropped).
■ Health is poor (such as vSAN health, key management server health, or vCen-
ter HA cluster health).
Logging in vSphere
It is important that you understand logging in vSphere components and related
products and that you be prepared to implement logging.
ESXi Logs
Table 10-13 provides details on most of the ESXi log files, including the location
and purpose of each of them. You should become familiar with each of them and
learn which logs are useful for various troubleshooting scenarios. For example, when
troubleshooting virtual machine issues, the only directly useful logs are vmkernel,
vmkwarning, hostd, and the specific virtual machine’s log files. When troubleshoot-
ing issues related to the connection between an ESXi host and the vCenter Server,
the vpxa log is most useful.
You can use the ESXi host client to examine the logs on a specific ESXi host by nav-
igating to Monitor > Logs and selecting a specific log file. You can scroll through the
log and search for specific text. You can select a log, click Actions, and choose Open
in New Window or Generate a Support Bundle.
Likewise, you can use the ESXi Direct Console User Interface (DCUI) to view
system logs. In the DCUI, after you click View System Logs and select the log you
want, you can use the Enter key (or Spacebar) to scroll through the log messages
and press the forward slash (/) key to begin a search.
If you have the Global.Diagnostics privilege, you can also use the vSphere Client to
export a host’s system logs by following these steps:
Step 1. In the vSphere Client, right-click an ESXi host in the inventory pane.
Step 2. Click Export System Logs.
Step 3. Select the appropriate objects.
Step 4. Optionally, click Gather Performance Data.
Step 5. Optionally, provide a password for encrypted coredumps.
Step 6. Click Export Logs.
Step 7. Monitor the status of the Downloading Log Bundles task in the Recent
Tasks pane.
Chapter 10: Managing and Monitoring Clusters and Resources 407
When you finish this process, the file is located in the default location. On a Win-
dows desktop, the location is the Downloads folder, and the filename begins with
VMware-vCenter-support.
NOTE In step 3, you can select or deselect entire categories, such as System, Virtual
Machines, and Storage. You can also select or deselect specific objects within each cat-
egory, such as logs and coredumps.
You can collect ESXi log files by using the /usr/bin/vm-support command, which
generates a file named using the following format:
esx-date-unique-xnumber.tgz
Log Levels
The default log level setting is Info; this is where errors, warnings, and informa-
tional level are logged. You can change the log level to lower levels, such as Verbose,
which is useful for troubleshooting and debugging but is not recommended for nor-
mal use in production environments. You can use the vSphere Client to change the
logging level by selecting the vCenter Server, selecting Configure > Settings >
General > Edit, and setting the logging settings to the appropriate levels, as
described in Table 10-14.
Although setting the logging level to Verbose or Trivia may be beneficial for
troubleshooting, doing so for long durations may cause noticeable vCenter Server
performance degradation. VMware recommends that you use these levels in rare
cases, such as while actively troubleshooting, and that you reset the logging level
immediately afterward. Changes to the logging level are saved in the vCenter Server
configuration file /etc/vmware-vpx/vpxd.cfg. You can make additional changes to
logging behavior by editing the advanced settings of a vCenter Server. For example,
you can use the vSphere Client to edit the following settings, which impact log size,
retention, rotation, and compression:
■ config.log.level
■ config.log.maxFileNum
Chapter 10: Managing and Monitoring Clusters and Resources 409
■ config.log.maxFileSize
■ config.log.compressOnRoll
NOTE By default, vCenter Server vpxd log files are rolled up and compressed
into .gz files. You can turn off compression for vpxd log files by adding the log.
compressOnRoll key with the value false to the vCenter Server advanced settings.
You can control how log files are maintained for virtual machines. A new log file is
created each time you power on or resume a virtual machine or whenever the file
size exceeds the vmx.log.rotateSize value, unless the value is 0 (default). VMware
recommends saving 10 log files, each one limited to no less than 2 MB. If you need
logs for a longer time span, you can set vmx.log.keepOld to 20.
You can use the following procedure to change the number of log files for a single
virtual machine:
Step 1. In the vSphere Client, right-click a host or a virtual machine in the inven-
tory pane and click Edit Settings.
Step 2. Select VM Options > Advanced.
Step 3. Click Edit Configuration.
Step 4. Add or edit the vmx.log.keepOld parameter, set to the appropriate
number.
Step 5. Click OK.
NOTE To set the vmx.log.keepOld value for all virtual machines on a specific host,
edit the /etc/vmware/config file and add or edit a line like the following:
vmx.log.keepOld = "10"
You can modify the /etc/vmware/logfilters file on a host to change its logging behav-
ior. In this file, you can add entries specifying the following options:
■ Add numLogs to specify the maximum number of log entries before the
specified log messages are filtered and ignored. Use 0 to filter and ignore all
the specified log messages.
■ Add Ident to specify one or more system components to apply the filter.
■ Add logRegexp to specify a case-sensitive phrase to filter the log messages by
their content.
■ Add the following line to the /etc/vmsyslog.conf file: enable_logfilters = true.
■ Run the command esxcli system syslog reload.
Chapter 10: Managing and Monitoring Clusters and Resources 411
Review Questions
1. You are creating a resource pool in a vSphere DRS cluster. Which of the
following is a default setting?
a. Memory Limit is disabled.
b. CPU Shares is 0.
c. Memory Reservation is 0.
d. CPU Reservation is normal.
2. You want to configure predictive DRS in your vSphere cluster. Which of the
following is a requirement?
a. Set DRS to Fully Automated.
b. In the cluster, set Provide Data to vSphere Predictive DRS to True.
c. In Aria Operations, set Provide Data to vSphere Predictive DRS to True.
d. In Aria Automation, set Provide Data to vSphere Predictive DRS to
True.
4. You want to use a command-line tool that shows real-time CPU statistics for
the services running in the vCenter Server. Which should you choose?
a. VIMTOP
b. ESXTOP
c. Performance charts
d. vCenter Server Management Interface
5. You are examining vSphere logs. Which of the following logs is in the same
folder as the virtual machine configuration file?
a. vpxa.log
b. vmksummary.log
c. auth.log
d. vmware.log
This chapter covers the following topics:
Managing Storage
Table 11-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
Configuring and Managing vSAN 1, 2
Managing Datastores 3, 4
Storage DRS and SIOC 5, 6
iSCSI, iSER, NVMe, and PMem 7, 8
Multipathing, Storage Policies, and vVols 9, 10
3. You want to increase the size of a VMFS 6 datastore. Which of the following
statements is true?
a. The only means to increase the size of a datastore is to add an extent.
b. If Expandable = NO, you cannot add an extent to the datastore.
c. If the datastore is 100% full, you cannot increase its capacity.
d. If Expandable = YES, you can increase the datastore size using available
space on the storage device that is backing the datastore.
4. You are configuring NFS datastores for your vSphere 8.0 environment. Which
of the following statements is true?
a. You can use multiple IP addresses with any NFS datastore.
b. You can use multiple IP addresses with NFS Version 4.1 but not with
NFS Version 3.
c. You can use multiple IP addresses with NFS Version 3 but not with NFS
Version 4.1.
d. You cannot use multiple IP addresses with any version of NFS.
7. You need to configure an ESXi 8.0 host to access shared NVMe devices using
RDMA over Converged Ethernet (RoCE) Version 2. Which steps should you
take? (Choose three.)
a. Configure a VMkernel network adapter.
b. Add a software adapter to the host’s network adapters.
c. Navigate to Storage Adapters > RDMA Adapters and verify the
VMkernel adapter bindings.
d. Navigate to Networking > RDMA Adapters and verify the VMkernel
adapter bindings.
e. Add a software adapter to the host’s storage adapters.
9. You want to set the path selection policy for a storage device managed by
NMP such that it uses a preferred path. Which of the following policies should
you choose?
a. FIXED
b. LB_RR
c. VMW_PSP_FIXED
d. VMW_PSP_RR
10. You are preparing to configure vVols in a vSphere 8.0 environment. Which
of the following components should you configure in the storage system?
(Choose two.)
a. Protocol endpoints
b. Storage containers
c. LUNs
d. Virtual volumes
418 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
It is important to ensure that you meet all the vSAN hardware, cluster, software, and
network requirements described in Chapter 2, “Storage Infrastructure.”
Chapter 11: Managing Storage 419
Step 10. Follow the wizard to complete the configuration of the cluster, based on
the fault tolerance mode:
■ For a two-host vSAN cluster: Choose a witness host for the cluster
and claim disks for the witness host.
■ For a stretched cluster: Define fault domains for the cluster, choose a
witness host, and claim disks for the witness host.
■ If you selected fault domains: Define the fault domains for the
cluster.
Step 11. On the Ready to Complete page, click Finish.
Licensing vSAN
You need a vSAN license to use vSAN beyond the evaluation period. The license
capacity is based on the total number of CPUs in the hosts participating in the
422 VCP-DCV for vSphere 8.x Cert Guide
cluster. The vSAN license is recalculated whenever ESXi hosts are added to or
removed from the vSAN cluster. Some advanced features, such as all-flash configu-
ration and stretched clusters, require special licenses.
The Global.Licenses privilege is required on the vCenter Server. You can use the
following procedure to assign a vSAN license to a cluster:
Step 1. In the vSphere Client, select the vSAN cluster in the inventory pane.
Step 2. On the Configure tab, right-click the vSAN cluster and choose Assign
License.
Step 3. Select an existing license and click OK.
Before you enable vSAN on an existing vSphere HA cluster, you must first disable
vSphere HA. After vSAN is enabled, you can re-enable vSphere HA.
Table 11-2 describes the vSphere HA networking differences between clusters
where vSAN is enabled and is not enabled.
Chapter 11: Managing Storage 423
When configuring the vSphere HA admission control policy, you must account
for a vSAN rule set’s Primary Level of Failures to Tolerate setting. This setting
must not be lower than the capacity reserved by the vSphere HA admission control
setting. If vSphere HA reserves less capacity, failover activity might be unpredictable.
For example, for an eight-host cluster, if you set the vSphere HA admission control
to more than 25% of the cluster resources, then you should not set the vSAN rule’s
Primary Level of Failures to Tolerate setting higher than two hosts.
Disabling vSAN
You can use the following procedure to disable vSAN for a host cluster, which causes
all virtual machines located on the vSAN datastore to become inaccessible:
Step 1. In the vSphere Client, select the cluster in the inventory pane.
Step 2. Verify that the host in the cluster is in Maintenance Mode.
Step 3. Select Configure > vSAN > Services.
Step 4. Click Turn Off vSAN.
Step 5. In the dialog box that appears, confirm your selection.
424 VCP-DCV for vSphere 8.x Cert Guide
NOTE If you intend to use virtual machines while vSAN is disabled, you should first
migrate the virtual machines to another datastore.
NOTE If you have a vSphere with Tanzu environment, you must follow the specified
order when shutting down or starting up the components.
This process deploys a one-host vSAN cluster. After the deployment, you can use the
vSphere Client to configure the vSAN cluster and add additional nodes to the cluster.
You can also use the following procedure to move multiple existing ESXi hosts into
a vSAN cluster by using host profiles:
Step 1. In the vSphere Client, navigate to Host Profiles.
Step 2. Click the Extract Profile from a Host icon.
Step 3. Select a host in the vSAN cluster that you want to use as the reference
host and click Next.
Step 4. Provide a name for the new profile and click Next.
Step 5. On the next wizard page, click Finish.
Step 6. In the Host Profiles list, select the new host profile and attach multiple
hosts to the profile.
Step 7. Click the Attach/Detach Hosts and Clusters to a Host Profile icon.
Step 8. Detach the reference vSAN host from the host profile.
Step 9. In the Host Profiles list, select the new host profile and click the Check
Host Profile Compliance icon.
Step 10. Select Monitor > Compliance.
Step 11. Right-click the host and select All vCenter Actions > Host Profiles >
Remediate.
Step 12. When prompted, provide appropriate input parameters for each host and
click Next.
Step 13. Review the remediation tasks and click Finish.
The hosts and their resources are now part of the vSAN cluster.
You can use the following procedure to add hosts to a vSAN cluster by using
Quickstart:
Step 1. Verify that no network configuration that was previously performed
through the Quickstart workflow has been modified from outside the
Quickstart workflow.
Step 2. In the vSphere Client, select the vSAN cluster in the inventory and click
Configure > Configuration > Quickstart.
Step 3. Click Add Hosts > Launch.
Step 4. Use the wizard to provide information for new hosts or to select existing
hosts from the inventory.
Step 5. Complete the wizard and click Finish on the last page.
426 VCP-DCV for vSphere 8.x Cert Guide
NOTE When adding a host to a vSAN cluster by using Quickstart, the vCenter
Server must not be running on the host.
Prior to placing a vSAN cluster member host in Maintenance Mode, you must do
the following:
■ If using Full Data Migration Mode, ensure that the cluster has enough hosts
and available capacity to meet the requirements of the Primary Level of
Failures to Tolerate policy.
■ Verify that remaining hosts have enough flash capacity to meet any flash read
cache reservations. To analyze this, you can run the following VMware Ruby
vSphere Console (RVC) command:
vsan.whatif_host_failures
■ Verify that the remaining hosts have devices with sufficient capacity to handle
stripe width policy requirements, if selected.
■ Make sure that you have enough free capacity on the remaining hosts to han-
dle the data that must be migrated from the host entering Maintenance Mode.
You can use the Confirm Maintenance Mode dialog box to determine how much
data will be moved, the number of objects that will become noncompliant or inac-
cessible, and whether sufficient capacity is available to perform the operation. You
can use the Data Migration Pre-check button to determine the impact of data
migration options when placing a host into Maintenance Mode or removing it from
the cluster.
To place a vSAN cluster member host in Maintenance Mode, you can use the
following procedure:
Step 1. In the vSphere Client, select the cluster in the inventory pane.
Step 2. Optionally, use the following steps to run Data Migration Pre-check:
a. Click Data Migration Pre-check.
b. Select a host and a data migration option and click Pre-check.
c. View the test results and decide whether to proceed.
Step 3. Right-click the host and select Maintenance Mode > Enter Mainte-
nance Mode.
Step 4. Select one of the following data evacuation modes:
■ Ensure Accessibility: If hosts are powered off or removed from a
vSAN cluster, vSAN makes sure the virtual machines on the ESXi
host that is removed can still run those virtual machines. This moves
some of the virtual machine data off the vSAN cluster, but replica data
remains. If you have a three-host cluster, this is the only evacuation
mode available.
428 VCP-DCV for vSphere 8.x Cert Guide
■ Full Data Migration: As its name implies, this mode moves all the
VM data to other ESXi hosts in the cluster. This option makes sense
if you are removing the host from the cluster permanently. If a virtual
machine has data on the host and that data is not migrated off, the host
cannot enter this mode.
■ No Data Migration: If this option is selected, vSAN does not move
any data from this ESXi host.
Click OK.
You can use the vSphere Client to add hosts to an existing fault domain by selecting
Configure > vSAN > Fault Domains and dragging the host to the appropriate fault
domain. Likewise, you can drag a host out of a fault domain to remove the host from
the fault domain and create a single-host fault domain.
You can use the following procedure to leverage Quickstart to create a stretched
cluster across two sites:
Step 1. Ensure that the following prerequisites are met:
■ You have a minimum of three hosts (preferred site, secondary site,
witness).
■ ESXi 6.0 Update 2 or later is used on each host.
■ The hosts in the cluster do not have any existing vSAN or networking
configuration.
Step 2. Click Configure > Configuration > Quickstart.
Step 3. Click Cluster Configuration > Edit.
Step 4. In the wizard, provide a cluster name, enable vSAN, and optionally enable
other features, such as DRS or vSphere HA. Optionally, enable vSAN
ESA.
Step 5. Click Finish.
Step 6. Click Add Hosts > Add.
Step 7. In the wizard, provide information for new hosts or select existing hosts
from the inventory. Click Finish.
Step 8. Click Cluster Configuration > Configure.
Step 9. In the wizard, configure the following:
■ Configure settings for distributed switch port groups, physical adapt-
ers, and the IP configuration associated with vMotion and storage.
■ Set vSAN Deployment Type to Stretched Cluster.
■ On the Claim Disks page, select disks on each host to be used by vSAN.
For vSAN ESA, optionally select I Want vSAN to Manage the Disks.
■ On the Create Fault Domains page, define fault domains for the hosts
in the preferred site and the secondary site.
■ On the Select Witness Host page, select a host to use as a witness host.
This host cannot be part of the cluster and can have only one VMker-
nel adapter configured for vSAN data traffic.
■ On the Claim Disks for Witness Host page, select disks on the witness
host for cache and capacity.
■ On the Ready to Complete page, verify the cluster settings and click
Finish.
430 VCP-DCV for vSphere 8.x Cert Guide
When creating a vSAN stretched cluster, DRS must be enabled on the cluster.
There are also several DRS requirements for stretched vSAN clusters:
■ Two host groups must be created: one for the preferred site and another for
the secondary site.
■ Two VM groups must be created: one for the preferred site VMs and one for
the VMs on the secondary site.
■ Two VM–host affinity rules must be created for the VMs on the preferred site
and VMs on the secondary site.
■ VM–host affinity rules must be used to define the initial placement of virtual
machines on ESXi hosts in the cluster.
In addition to the DRS requirements, there are also HA requirements for stretched
vSAN clusters:
■ HA must be enabled.
■ HA rules should allow the VM–host affinity rules in the event of a failover.
■ HA datastore heartbeats should be disabled.
You can use the following procedure to claim storage devices for a vSAN cluster:
Step 1. In the vSphere Client, select the cluster in the inventory pane and navi-
gate to Configure > vSAN > Disk Management > Claim Unused
Disks.
Step 2. Select a flash device to be used for the cache and click Claim for the
cache tier.
Step 3. Select one or more devices (HDD for hybrid or Flash for all-flash) to be
used as capacity and click Claim for the capacity tier.
Step 4. Click Create or OK.
You can use a similar process to claim disks to be used for vSAN ESA storage pools,
but you do not need to specify whether a disk is used for capacity or cache.
For vSAN OSA, to verify that the proper role (cache or capacity) has been assigned
to each device in an all-flash disk group, examine the Disk Role column at the bot-
tom of the Disk Management page. If the vSAN cluster is set to claim disks in
manual mode, you can use the following procedure to add additional local devices to
an existing disk group:
Step 1. In the vSphere cluster, select the vSAN cluster in the inventory pane and
navigate to Configure > vSAN > Disk Management.
Step 2. Select the disk group and click Add Disks.
Step 3. Select the device and click Add.
The additional devices must be the same type (flash or HDD) as existing devices in
the disk group.
NOTE If you add a used device that contains residual data or partition informa-
tion, you must first clean the device. For example, you can run the RVC command
host_wipe_vsan_disks.
432 VCP-DCV for vSphere 8.x Cert Guide
You can use the following procedure to remove specific devices from a disk group or
remove an entire disk group:
Step 1. In the vSphere cluster, select the vSAN cluster in the inventory pane.
Step 2. Click Configure > vSAN > Disk Management.
Step 3. To remove a disk group, select the disk group, click Remove, and select a
data evacuation mode.
Step 4. To remove a device, select the disk group, select the device, click Remove,
and select a data evacuation mode.
Step 5. Click Yes or Remove.
NOTE You should typically remove specific devices from a disk group or remove an
entire disk group only when you are upgrading a device, replacing a failed device, or
removing a cache device. Deleting a disk group permanently deletes the data stored
on the devices. Removing one flash cache device or all capacity devices from a disk
group removes the entire disk group.
If ESXi does not automatically identify your devices as being flash devices, you can
use the following procedure to manually mark them as local flash devices. For exam-
ple, flash devices that are enabled for RAID 0 Mode rather than Passthrough Mode
may not be recognized as flash. Marking these devices as local flash makes them
available for use as vSAN cache devices. Before starting the following procedure,
you should verify that the device is local and not in use:
Step 1. In the vSphere cluster, select the vSAN cluster in the inventory pane and
navigate to Configure > vSAN > Disk Management.
Step 2. Select a host to view the list of available devices.
Step 3. In the Show drop-down menu, select Not in Use.
Step 4. Select one or more devices from the list and click Mark as Flash Disk.
Step 5. Click Yes.
Likewise, you can use this procedure in other scenarios where you want to change
how a device is identified. In step 4, you can choose Mark as HDD Disk, Mark as
Local Disk, or Mark as Remote.
Chapter 11: Managing Storage 433
For vSAN OSA, deduplication and compression are enabled as a cluster-wide setting
but are applied per disk group. When deduplication and compression are enabled,
vSAN OSA performs a rolling reformat of every disk group on every host. Depend-
ing on the data stored on the vSAN datastore, this process might take a long time.
Do not perform such operations frequently. If you plan to disable deduplication and
compression, you must first verify that enough physical capacity is available to place
your data. After enabling deduplication and compression in vSAN OSA, you should
consider the following:
■ For efficiency, consider adding a disk group to cluster capacity instead of
incrementally adding disks to an existing disk group.
■ When you add a disk group manually, add all the capacity disks at the same
time.
■ You cannot remove a single disk from a disk group. You must remove the
entire disk group in order to make modifications.
■ A single disk failure causes an entire disk group to fail.
To enable deduplication and compression for an existing vSAN OSA cluster, should
verify that the cluster is all-flash. Then, you can edit the vSAN cluster as previously
described and select either Deduplication and Compression or Compression Only.
You can optionally select Allow Reduced Redundancy.
When you enable deduplication and compression, vSAN updates the on-disk format
of each disk group of the cluster by evacuating data from the disk group, removing
the disk group, and re-creating it with a new format. This operation does not require
virtual machine migration or DRS. If you choose the Allow Reduced Redundancy
option, the virtual machines may continue to keep running even if the cluster does
not have enough resources for the disk group to be fully evacuated. In this case, your
virtual machines might be at risk of experiencing data loss during the operation.
434 VCP-DCV for vSphere 8.x Cert Guide
NOTE Compression is enabled by default in vSAN ESA, but you can create and
leverage a storage policy to change this behavior. Such a change would apply to just
new writes. Old blocks are left uncompressed even after compression is turned on for
an object and vice versa.
■ In a stretched vSAN cluster, the witness host only stores metadata and does
not participate in data-at-rest encryption.
■ You should establish a policy regarding the data-at-rest encryption of
coredumps because they contain sensitive information such as keys for hosts.
In the policy, consider the following:
■ You can use a password when you collect a vm-support bundle.
■ The password re-encrypts coredumps that use internal keys based on the
password.
■ You can later use the password to decrypt the coredumps in the bundle.
■ You are responsible for keeping track of the password. It is not saved
anywhere in vSphere.
To use data-at-rest encryption in a vSAN datastore, you must either provide a native
key provider or provide a standard key provider and establish trust. You can use the
following procedure to add a standard key provider to vCenter Server:
Step 1. Ensure that the user has the Cryptographer.ManageKeyServers privilege.
Step 2. In the vSphere Client, select the vCenter Server in the inventory pane
and navigate to Configure > Key Providers.
Step 3. Click Add Standard Key Provider and specify the following KMS
information in the wizard:
■ For a KMS cluster, select Create New Cluster.
■ Specify the cluster name, alias, and address (FQDN or IP address).
■ Specify the port, proxy, and proxy port.
Step 4. Click Add.
You can use the following procedure to establish a trusted connection for a standard
key provider:
Step 1. In the vSphere Client, select the vCenter Server in the inventory pane
and navigate to Configure > Key Management Servers.
Step 2. Select the KMS instance and click Establish Trust with KMS.
436 VCP-DCV for vSphere 8.x Cert Guide
Step 3. Select one of the following options, as appropriate for the selected KMS
instance:
■ Root CA Certificate
■ Certificate
■ New Certificate Signing Request
■ Upload Certificate and Private Key
When multiple KMS clusters are used, you can use the following procedure to
identify a default KMS cluster:
Step 1. In the vSphere Client, select the vCenter Server in the inventory pane
and navigate to Configure > Key Management Servers.
Step 2. Select the KMS cluster and click Set KMS Cluster as Default.
Step 3. Click Yes.
Step 4. Verify that the word default appears next to the cluster name.
You can make vCenter Server trust the KMS by using the following procedure:
Step 1. In the vSphere Client, select the vCenter Server in the inventory pane
and navigate to Configure > Key Management Servers.
Step 2. Select the KMS instance and do one of the following:
■ Select All Actions > Refresh KMS Certificate > Trust.
■ Select All Actions > Upload KMS Certificate > Upload File.
In vSphere 7.0 Update 2 and later, you can use the built-in vSphere Native
Key Provider to enable vSAN data-at-rest encryption. To configure a vSphere
Native Key Provider using the vSphere Client, select the vCenter Server, select
Configure > Security > Key Providers, select Add Native Key Provider, provide
a name, and complete the wizard. You should configure the vCenter Server
file-based backup and restore and store the backups securely as they contain the key
derivation key.
If you want to enable encryption on a vSAN cluster, you need the following
privileges:
■ Host.Inventory.EditCluster
■ Cryptographer.ManageEncryptionPolicy
■ Cryptographer.ManageKMS
■ Cryptographer.ManageKeys
Chapter 11: Managing Storage 437
You can use the following procedure to enable encryption on a vSAN cluster:
Step 1. In the vSphere Client, select the cluster in the inventory pane and navi-
gate to vSAN > Services.
Step 2. Click the Edit button.
Step 3. In the vSAN Services dialog, enable Encryption and select a KMS cluster.
Step 4. Optionally, select the Erase Disks Before Use checkbox, based on the
following:
■ If this is a new cluster with no virtual machines, you can deselect the
checkbox.
■ If it is an existing cluster with unwanted data, select the checkbox,
which increases the processing time for each disk.
Step 5. Click Apply.
To generate new encryption keys, you can use the following procedure:
Step 1. Log on to the vSphere Client as a user with Host.Inventory.EditCluster
and Cryptographer.ManageKeys privileges.
Step 2. In the vSphere Client, select the cluster in the inventory pane and navi-
gate to Configure > vSAN > Services.
Step 3. Click Generate New Encryption Keys.
Step 4. To generate a new Key Encryption Key (KEK), click Apply. Each host’s
Key Encryption Key (DEK) is re-encrypted with the new KEK.
Step 5. Optionally, select Also Re-encrypt All Data on the Storage Using
New Keys.
Step 6. Optionally, select the Allow Reduced Redundancy checkbox, although
note that doing so might put your data at risk during the disk reformat-
ting operation.
If a host member of a vSAN cluster that uses encryption has an error, the resulting
coredump is encrypted. Coredumps that are included in the vm-support package are
also encrypted.
vSAN datastore to meet the requirements defined in the storage policy. Storage pro-
viders provide information about the physical storage to vSAN to assist with place-
ment and monitoring.
Click Next.
Step 6. On the Storage Compatibility page, review the list of compatible
datastores and click Next.
Step 7. On the Review and Finish page, review all the settings and click Finish.
NOTE In releases prior to vSAN 7.0 Update 3, when a host enters Maintenance
Mode, its FSVM is deleted after the Protocol Stack container moves to another VM.
When the host exits Maintenance Mode, a new VM is provisioned.
Chapter 11: Managing Storage 441
Managing Datastores
This section provides information on managing datastores in a vSphere 8.0
environment.
To create a VMFS 6 datastore on a SCSI device, you can use the following
procedure:
Step 1. In the vSphere Client, right-click a host in the inventory pane and select
Storage > New Datastore.
Step 2. For datastore type, select VMFS and click Next.
Step 3. Provide a name for the datastore, select an available SCSI device, and
click Next.
Step 4. Select VMFS 6 and click Next.
Step 5. Keep the default Partition Configuration setting Use All Available Par-
titions. Alternatively, set the datastore size, block size, space reclamation
granularity, and space reclamation priority.
Step 6. Click Next.
Step 7. On the Ready to Complete page, click Finish.
442 VCP-DCV for vSphere 8.x Cert Guide
You can increase the size of a VMFS datastore by adding an extent or by expanding
the datastore within its own extent. A VMFS datastore can span multiple devices.
Adding an extent to a VMFS datastore means adding a storage device (LUN) to
the datastore. A spanned VMFS datastore can use any extent at any time. It is not
required to fill up a specific extent before using the next one.
A datastore is expandable when the backing storage device has free space immedi-
ately after the datastore extent. You can use the following procedure to increase the
size of a datastore:
Step 1. In the vSphere Client, right-click the datastore in the inventory pane and
select Increase Datastore Capacity.
Step 2. Select a device from the list of storage devices, based on the following.
■ To expand the datastore, select a storage device whose Expandable
column contains YES.
■ To add an extent to the datastore, select a storage device whose
Expandable column contains NO.
Step 3. Review the available configurations in the partition layout.
Step 4. In the menu, select one of the following available configuration options,
depending on your previous selections:
■ Use Free Space to Expand the Datastore: Select this option to
expand the existing datastore and disk partition to use the adjacent disk
space.
■ Use Free Space: Select this option to deploy an extent in the
remaining free space.
■ Use All Available Partitions: Select this option to reformat a disk and
deploy an extent using the entire disk. (This option is available only for
non-blank disks.)
Step 5. Set the capacity. (The minimum extent size is 1.3 GB.) Click Next.
Step 6. Click Finish.
NOTE If a shared datastore becomes 100% full and has powered-on virtual
machines, you can increase the datastore capacity—but only from the host where the
powered-on virtual machines are registered.
copy device contain a VMFS datastore with identical signatures (UUID). When
ESXi detects a VMFS datastore copy, it allows you to mount it with the original
UUID or mount it with a new UUID. The process of changing the UUID is called
resignaturing.
To allow a host to use the original datastore and the copy, you can choose to resig-
nature the copy. If the host will only access the copy, you could choose to mount the
copy without resignaturing.
Consider the following points related to resignaturing:
■ When resignaturing a datastore, ESXi assigns a new UUID to the copy,
mounts the copy as a datastore that is distinct from the original, and updates
all corresponding UUID references in the virtual machine configuration files.
■ Datastore resignaturing is irreversible.
■ After resignaturing, the storage device is no longer treated as a replica.
■ A spanned datastore can be resignatured only if all its extents are online.
■ The resignaturing process is fault tolerant, so if the process is interrupted, you
can resume it later.
■ You can mount the new VMFS datastore without risk of its UUID conflicting
with UUIDs of any other datastore from the hierarchy of device snapshots.
To mount a VMFS datastore copy on an ESXi host, you can use the following
procedure:
Step 1. In the vSphere Client, select the host in the inventory page and navigate
to Configure > Storage Adapters.
Step 2. Rescan storage.
Step 3. Unmount the original VMFS datastore, which has the same UUID as the
VMFS copy.
Step 4. Right-click the host and select Storage > New Datastore.
Step 5. Select VMFS as the datastore type.
Step 6. Enter the datastore name and placement (if necessary).
Step 7. In the list of storage devices, select the device that contains the VMFS copy.
Step 8. Choose to mount the datastore and select one of the following options:
a. Mount Options > Assign a New Signature
b. Mount Options > Keep Existing Signature
Beginning with vSphere 7.0, you can use clustered virtual machine disks (VMDKs)
on a VMFS 6 datastore to support Windows Server Failover Clustering (WSFC).
When creating the VMFS 6 datastore, you can use the vSphere Client to choose a
device whose Clustered VMDK Support attribute is set to Yes. To enable support
for clustered VMDKs, you should therefore set Clustered VMDK Support to Yes.
Ensure that the datastore is being used only by ESXi 7.0 or later hosts that are man-
aged by the same vCenter Server 7.0 or later. After the datastore is created, select it
in the vSphere Client and set Datastore Capabilities > Clustered VMDK to Enable.
After enabling this setting, you can place the clustered virtual disks on the datastore.
To disable the setting, you need to first power off the virtual machines that have
clustered virtual disks.
Table 11-3 provides details on other administrative operations that you can perform
on VMFS datastores.
In the vSphere Client, you can use the datastore file browser to examine and man-
age the datastore contents. To get started, right-click the datastore in the inventory
pane and select Browse Files. In the datastore file browser, you can select any of the
options listed in Table 11-4.
When you use the vSphere Client to perform VMFS datastore operations, vCenter
Server uses default storage protection filters. The filters help you avoid data corrup-
tion by displaying only the storage devices that are suitable for an operation. In the
rare scenario in which you want to turn off the storage filters, you can do so using
the following procedure:
Step 1. In the vSphere Client, select the vCenter Server instance in the inventory
pane and navigate to Configure > Settings > Advanced Settings > Edit
Settings.
Step 2. Specify one of the filter names described in Table 11-5 and set its value to
False.
446 VCP-DCV for vSphere 8.x Cert Guide
NOTE You should consult the VMware support team prior to changing device filters.
You can use the following procedure to manage paths for the storage devices used by
RDMs:
Step 1. In the vSphere Client, right-click the virtual machine in the inventory
pane and select Edit Settings.
Step 2. Select Virtual Hardware > Hard Disk.
Step 3. Click the device ID that appears next to Physical LUN to open the Edit
Multipathing Policies dialog box.
Step 4. Use the Edit Multipathing Policies dialog box to enable or disable paths,
set multipathing policy, and specify the preferred path.
If the guest OS in your virtual machine is known to have issues using the SCSI
INQUIRY data cached by ESXi, you can either modify the virtual machine or the
host to ignore the cached data. To modify the virtual machine, you can edit its VMX
file and add the following parameter, where scsiX:Y represents the SCSI device:
scsiX:Y.ignoreDeviceInquiryCache = "true"
To modify the host, you can use the following command, where deviceID is the
device ID of the SCSI device:
esxcli storage core device inquirycache set --device
deviceID --ignore true
■ NFS datastores must have folders with identical names mounted on all ESXi
hosts, or functions such as vMotion may not work.
■ If an NFS device does not support internationalization, you should use ASCII
characters only.
How you configure an NFS storage device for use with VMware varies by vendor, so
you should always refer to the vendor documentation for specifics.
The following is the procedure to configure an NFS server (but refer to vendor
documentation for specifics on how to carry out this procedure):
Step 1. Use the VMware Hardware Compatibility List to ensure that the NFS
server is compatible. Pay attention to the ESXi version, the NFS server
version, and the server firmware version.
Step 2. Configure the NFS volume and export it (by adding it to /etc/exports),
using the following details:
■ NFS Version 3 or Version NFS 4.1 (only one protocol per share)
■ NFS over TCP
Step 3. For NFS Version 3 or non-Kerberos NFS Version 4.1, ensure that each
host has root access to the volume. The typical method for this is to use
the no_root_squash option.
Step 4. If you are using Kerberos, ensure that the NFS exports provide full
access to the Kerberos user. In addition, if you are going to use Kerberos
with NFS Version 4.1, you need to enable either AES256-CTS-HMAC-
SHA1-96 or AES128-CTS-HMAC-SHA1-96 on the NFS storage device.
To prepare an ESXi host to use NFS, you must configure a VMkernel virtual
adapter to carry NFS storage traffic. If you are using Kerberos and NFS Version 4.1,
you should take the following additional steps:
Step 1. Ensure that the DNS settings on the ESXi hosts are pointing to the DNS
server that is used for DNS records for Kerberos Key Distribution Cen-
ter (KDC). This will most likely be the Active Directory server if that is
being used for name resolution.
Step 2. Configure NTP because Kerberos is sensitive to time drift.
Step 3. Configure Active Directory for Kerberos.
To create (mount) an NFS datastore in vSphere, you need the IP address or DNS
name of the NFS server as well as the path to the share (folder name). When using
Kerberos, you need to configure the ESXi hosts for Kerberos authentication prior
to creating the NFS datastore.
Chapter 11: Managing Storage 449
NOTE Multiple IP addresses or DNS names can be used with NFS Version 4.1
multipathing.
To rename or unmount an NFS datastore, you can use the same procedure as
described for VMFS datastores in Table 11-3. To remove an NFS datastore from the
vSphere inventory, you should unmount it from every host.
You can use similar steps to set the SDRS Automation Mode to No Automation
(Manual) or Fully Automated. You can set Space Utilization I/O (SDRS Thresholds)
Latency. You can select or deselect Enable I/O Metric for SDRS Recommendations.
You can also configure the advanced options, which are Space Utilization Differ-
ence, I/O Load Balancing Invocation Interval, and I/O Imbalance Threshold.
You can add datastores to a datastore cluster by using drag and drop in the vSphere
Client. Each datastore can only be attached to hosts with ESXi 5.0 or later. The
datastores must not be associated with multiple data centers.
If you want to perform a maintenance activity on an SDRS cluster member
datastore or its underlying storage devices, you can place it in Maintenance Mode.
(Standalone datastores can be placed in Maintenance Mode.) SDRS has recom-
mendations for migrating the impacted virtual machine files, including virtual disk
files. You can let SDRS automatically apply the recommendations, or you can manu-
ally make recommendations. To place a datastore in Maintenance Mode using the
vSphere Client, right-click the datastore in the inventory pane, select Enter SDRS
Maintenance Mode, and optionally apply any recommendations.
The Faults tab displays a list of the disks that cannot be migrated and the reasons.
If SDRS affinity or anti-affinity rules prevent a datastore from entering Mainte-
nance Mode, you can select an option to ignore the rules. To do so, edit the settings
of the datastore cluster by selecting SDRS Automation > Advanced Options and set-
ting IgnoreAffinityRulesForMaintenance to 1.
When reviewing each SDRS recommendation on the Storage SDRS tab in the
vSphere Client, you can examine the information described in Table 11-6 and use it
when deciding which recommendations to apply.
Chapter 11: Managing Storage 451
You can use the following procedure to override the SDRS datastore cluster auto-
mation level per virtual machine:
Step 1. In the vSphere Client, right-click a datastore cluster in the inventory pane
and select Edit Settings.
Step 2. Select Virtual Machine Settings.
Step 3. Select one of the following automation levels:
■ Default (Manual)
■ Fully Automated
■ Disabled
Step 4. Optionally select or deselect the Keep VMDKs Together option.
Step 5. Click OK.
You can use the following procedure to create an inter-VM anti-affinity rule (that is, a
rule specifying that two or more virtual machines are placed on separate datastores):
Step 1. In the vSphere Client, right-click a datastore cluster in the inventory pane
and select Edit Settings.
Step 2. Select Rules > Add.
Step 3. Provide a name and set Type to VM Anti-affinity.
Step 4. Click Add.
Step 5. Click Select Virtual Machine.
452 VCP-DCV for vSphere 8.x Cert Guide
To create an intra-VM anti-affinity rule (that is, a rule which says that virtual disks
for a specific virtual machine are placed on separate datastores), you use a simi-
lar procedure but set Type to VMDK-Affinity and select the appropriate virtual
machine and virtual disks.
In addition to share values, which are similar to shares defined for CPU and
memory, storage I/O limits can be defined on individual virtual machines to limit
the number of I/O operations per second (IOPS). By default, just as with CPU and
memory resources, there are no limits set for virtual machines. In a virtual machine
with more than one virtual disk, limits must be set on all of the virtual disks for that
VM. If you do not set a limit on all the virtual disks, the limit won’t be enforced. To
view the shares and limits assigned to virtual machines, you can use the vSphere Cli-
ent. To select a datastore, select the Virtual Machines tab and examine the associated
virtual machines. The details for each virtual machine include its respective shares,
the IOPS limit, and the percentage of shares for that datastore.
Step 3. From the Shares drop-down menu, select High, Normal, Low, or
Custom to define the share value.
Step 4. Set the Limit–IOPS drop-down to Low (500), Normal (1000), High
(2000), or Custom (and enter a custom value for the IOPS limit).
Step 5. Click OK to save your changes.
SIOC Threshold
The default threshold for SIOC to begin prioritizing I/O based on shares is 30 ms
and typically does not need to be modified. However, you can modify this threshold
if you need to. Be aware that SIOC will not function properly unless all the
datastores that share drive spindles have the same threshold defined. If you set the
value too low, shares will enforce priority of resources sooner but could decrease
aggregated throughput, and if you set it too high, the result might be higher aggre-
gated throughput but less prioritization of disk I/O.
The following procedure allows you to modify the threshold:
Step 1. In the vSphere Client Storage Inventory view, select a datastore and select
the Configuration tab.
Step 2. Select Properties and under Storage I/O Control, select Enabled if it is
not already selected.
Step 3. Click Advanced to modify the threshold for contention; this value must
be between 5 ms and 100 ms.
Step 4. Click OK and then click Close.
454 VCP-DCV for vSphere 8.x Cert Guide
Managing iSCSI
To utilize iSCSI storage, you must configure an iSCSI adapter on your ESXi host.
You can choose from the following list of adapters.
■ Independent hardware iSCSI adapter: This is a third-party adapter that
offloads the iSCSI and network processing and management from your host. It
does not require a VMkernel virtual adapter (that is, VMkernel port).
■ Software iSCSI adapter: This adapter uses standard NICs to connect a host
to a remote iSCSI target on the IP network. It requires a VMkernel virtual
adapter.
■ Dependent hardware iSCSI adapter: This third-party adapter depends on
VMware networking and iSCSI configuration and management interfaces. It
requires a VMkernel virtual adapter.
■ VMware iSER adapter: This adapter uses an RDMA-capable network
adapter to connect a host to a remote iSCSI target. It requires a VMkernel
virtual adapter.
Each adapter type involves a unique set of requirements and configuration steps.
The high-level steps for configuring iSER with ESXi are as follows:
Step 1. Install and view an RDMA-capable network adapter.
Step 2. Enable the VMware iSER adapter.
Step 3. Modify the general properties for iSER adapters.
Chapter 11: Managing Storage 455
To enable the VMware iSER adapter, you can use the esxcli rdma iser add
command. The adapter then appears on the host’s Storage Adapter page in the
vSphere Client, in the category VMware iSCSI over RDMA (iSER).
To configure the iSER port binding, create a VMkernel virtual adapter, connect it
to a virtual switch to which the appropriate RDMA-enabled physical adapter is
connected as an uplink, and use the Network Port Binding tab of the iSER storage
adapter to bind the virtual adapter to the physical adapter. iSER does not support
NIC teaming. You should configure the port binding to use only one RDMA-
enabled physical adapter and one VMkernel adapter per virtual switch.
This section provides details on configuring and managing Non-Volatile Memory
Express (NVMe) and PMem devices.
Table 11-7 SCSI over Fabrics and NVMe over Fabrics Comparison
Shared Storage SCSI over Fabrics NVMe over Fabrics
Capability
RDM Supported Not supported
Coredump Supported Not supported
SCSI-2 reservations Supported Not supported
Clustered VMDK Supported Not supported
Shared VMDK with Supported Supported in vSphere 7.0 Update 1
multi-writer flag and later
vVols Supported Supported in vSphere 8.0 and later
Hardware acceleration Supported Not supported
with VAAI plug-ins
Default MPP NMP HPP (NVMe-oF targets cannot be
claimed by NMP.)
Limits LUNs=1024, paths=4096 Namespaces=32, paths=128 (maximum
4 paths per namespace in a host)
To use FC-NVMe, you must add an appropriate supported adapter and use the fol-
lowing procedure to add the controller to the host:
Step 1. In the vSphere Client, select the host in the inventory pane and navigate
to Configure > Storage > Storage Adapters.
Step 2. Click Controllers > Add Controller.
Step 3. Select one of the following options:
a. Automatically Discover Controllers: Click Discover Controllers
and select a controller.
b. Enter Controller Details Manually: Provide the subsystem NQN,
the worldwide node name, and the worldwide port name. Optionally,
provide an admin queue size and keepalive timeout.
Chapter 11: Managing Storage 457
Configuring HPP
As described in Chapter 2, High-Performance Plug-in (HPP) is the default plug-
in that claims NVMe-oF targets. NVMe over PCIe targets default to the VMware
458 VCP-DCV for vSphere 8.x Cert Guide
Native Multipathing Plug-in (NMP). You can use the esxcli storage core claimrule
add command to change the claiming plug-in in your environment. For example, to
set a local device to be claimed by HPP, use the --pci-vendor-id parameter and set
the --plugin parameter to HPP. To change the claim rule based on an NVMe
controller model, use the --nvme-controller-model parameter.
To assign a specific HPP Path Selection Scheme (PSS) to a specific device, you
can use the esxcli storage hpp device set command with the -pss parameter to
specify the scheme and the --device parameter to specify the device. The available
HPP PSS options are explained in Table 2-6 in Chapter 2. To create a claim rule
that assigns the HPP PSS by vendor and model, you can use esxcli storage core
claimrule add with the -V (vendor), -M (model), -P (plug-in), and --config-string
parameters. In the value for --config-string, specify the PSS name and other set-
tings, such as “pss=LB-Latency,latency-eval-time=40000”.
After using these commands, you should reboot the hosts to apply the changes.
Managing PMem
PMem devices are non-volatile dual in-line memory modules (NVDIMMs) on the
ESXi host that reside in normal memory slots. They are non-volatile and combine
the performance of volatile memory with the persistence of storage. PMem devices
are supported on ESXi 6.7 and later.
ESXi hosts detect local PMem devices and expose the devices as host-local PMem
datastores to virtual machines. Virtual machines can directly access and utilize them
as either memory (virtual NVDIMM) or storage (PMem hard disks). An ESXi
host can have only one PMem datastore, but it can be made up of multiple PMem
modules.
To view information about the PMem modules, interleave sets, and namespaces, you
can follow this procedure:
Step 1. In the vSphere Host Client, select Storage from the inventory pane.
Step 2. Click on the Persistent Memory tab.
Step 3. Click Modules to see the NVDIMMs that contribute to the PMem
datastore.
Step 4. Click Namespaces to see namespace information.
Step 5. Click Interleave Sets to see how the modules are grouped into interleave
sets.
To delete namespaces that were created by an operating system that was previously
installed on the host machine, you can navigate to Namespaces, select the
namespace, and click Delete. This frees up the PMem space, but you must reboot
the host to access it.
Managing Multipathing
As explained in Chapter 2, ESXi uses the Pluggable Storage Architecture (PSA),
which allows plug-ins to claim storage devices. The plug-ins include the Native
Multipathing Plug-in (NMP), the High-Performance Plug-in (HPP), and third-
party multipathing modules (MPPs).
You can use the following command to list all devices controlled by the NMP mod-
ule. For each device, you will find details, such as assigned storage array type (SATP)
and the path selection policy (PSP):
esxcli storage nmp device list
To see details for a specific device, you can provide the --device option with the
previous command. For example, if you have a device that is identified by mpx.
vmbha0:C0:T0:L0, you can use the following command to retrieve details for just
that device:
esxcli storage nmp device list --device=mpx.vmbha0:C0:T0:L0
Table 11-8 provides information on some other esxcli commands that you can use
with NMP.
NOTE In many cases, the storage system provides ESXi with the storage device
names and identifiers, which are unique and based on storage standards. Each iden-
tifier uses the format naa.xxx, eui.xxx, or t10.xxx. Otherwise, the host generates an
identifier in the form mpx.path, where path is the first path to the device, such as mpx.
vmhba1:C0:T1:L3.
Table 11-9 provides information on some esxcli commands that you can use
with HPP.
the path uses storage adapter vmhba1, channel 0, target 1, and LUN 3. To view the
storage paths for a specific device, you can use the following procedure:
Step 1. In the vSphere Client, select a host in the inventory pane and navigate to
Configure > Storage > Storage Devices.
Step 2. Select the storage device.
Step 3. Click the Properties tab and review the details. For NMP devices, the
details include the assigned SATP and PSP.
Step 4. Click Paths and review the available paths to the device. The status for
each path can be Active (I/O), Standby, Disabled, or Dead. For devices
using the Fixed path policy, an asterisk (*) represents the preferred path.
To disable a path to a storage device, you can follow this procedure, select a path,
and choose Disable.
In the vSphere Client, you can select a VMFS datastore and navigate to
Configure > Connectivity and Multipathing to review information on the paths
to the storage devices backing the datastore.
To change the PSP that is assigned to a storage device, you can navigate to the
device’s properties page (see the previous set of steps) and click Edit Multipathing.
On the multipathing page, you can choose a policy, such as VMW_PSP_FIXED,
VMW_PSP_RR, or VMW_PSP_MRU, as described in Table 2-11 in Chapter 2.
■ You need to follow appropriate setup guidelines for the type of storage you use
(Fibre Channel, FCoE, iSCSI, or NFS). If necessary, you should install and
configure storage adapters on your ESXi hosts.
■ You need to use NTP to ensure time synchronization among the storage sys-
tem components and vSphere.
Step 3. Navigate to Storage > Protocol Endpoints to examine and manage the
protocol endpoints. Optionally, you can take the following steps:
a. Use the Properties tab to modify the multipathing policy.
b. Use the Paths tab to change the path selection policy, disable paths,
and enable paths.
468 VCP-DCV for vSphere 8.x Cert Guide
Review Questions
1. You are implementing encryption for a vSAN cluster in vSphere 8.0. Which of
the following options is a requirement?
a. Deploy KMIP 1.0.
b. Deploy the KMS as a virtual machine in the vSAN datastore.
c. Ensure that the KMS is in the vSphere compatibility matrices.
d. Ensure that the witness host participates in encryption.
2. You want to save space in your vSAN OSA cluster by removing redundant data
blocks. Which of the following steps should you take?
a. Configure deduplication in a storage policy.
b. Enable Deduplication only.
c. Enable Deduplication and Compression.
d. Enable Allow Reduced Redundancy.
3. In your vSphere 8.0 environment, you are using the datastore file browser to
perform administrative tasks. Which of the following are valid options in the
datastore file browser? (Choose three.)
a. Upload files
b. Download
c. Mount
d. Inflate
e. Convert
4. For your vSphere 8.0 environment, you are comparing NVMe-oF with SCSI
over Fibre Channel. Which of the following statements is true?
a. Virtual volumes are supported with NVMe-oF in vSphere 7.0.
b. SCSI-2 reservations are supported with NVMe-oF.
c. RDMs are supported with NVMe-oF.
d. HPP is supported with NVMe-oF.
5. You are using the vSphere Client to manage the storage providers. Which one
of the following is not an option?
a. Replace
b. Synchronize Storage Providers
c. Rescan
d. Refresh Certificate
This chapter covers the following topics:
Table 12-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundations Topics Section Questions Covered in This Section
Configuring and Managing Authentication and 1, 2
Authorization
Configuring and Managing vSphere Certificates 3, 4
General ESXi Security Recommendations 5, 6
Configuring and Managing ESXi Security 7, 8
Additional Security Management 9, 10
1. You are responsible for multiple vSphere environments. What must you
do to enable the use of Enhanced Linked Mode in vSphere 8.0?
a. Associate two vCenter Servers with the same external PSC.
b. Map the external PSC of one vCenter Server to the embedded PSC
of another vCenter Server.
c. Configure vCenter Server HA.
d. Connect two vCenter Servers to the same SSO domain.
472 VCP-DCV for vSphere 8.x Cert Guide
4. You are responsible for performing certificate management for your ESXi
hosts. Which of the following privileges do you need?
a. Certificates.Manage Certificates
b. Host.Manage Certificates
c. Manage.Certificates
d. Certificates.Manage.Host
5. You are enabling direct ESXi access using local accounts. To change the pass-
word requirements, such as minimum length, which of the following steps
should you take?
a. Select Single Sign On > Configuration.
b. Configure Lockdown Mode.
c. Use the Set-PasswordControl cmdlet.
d. Configure Security.PasswordQualityControl.
6. You want to enable passthrough for a network device on your ESXi host. You
see that an orange icon is associated with a device. Which of the following
actions should you take?
a. Reboot the host.
b. Ignore the icon, select the device, and click OK.
c. Navigate to Configure > Services and restart a specific service.
d. Give up. The device is not compatible with passthrough.
Chapter 12: Managing vSphere Security 473
7. You want to configure your ESXi host’s acceptance level such that you cannot
install VIBs signed at or below the PartnerSupported level but you can install
VIBs signed at higher levels. Which option should you choose?
a. VMwareCertified
b. VMwareAccepted
c. PartnerSupported
d. CommunitySupported
8. You want to enable UEFI Secure Boot. To determine whether your ESXi host
supports Secure Boot, which of the following steps should you take?
a. Use the command /usr/lib/vmware/secureboot/bin/secureBoot.py -c.
b. Check for compliance by using a host profile.
c. Check for compliance by using Lifecycle Manager.
d. Use the Security Profile section in the vSphere Client.
9. You need to use encryption in your vSphere environment. Which of the fol-
lowing should you use to configure a trust relationship between a KMS and
vCenter?
a. In the vCenter Server Appliance Management Interface (VAMI), choose
Configuration > Security > Key Providers.
b. In the vSphere Client, select the vCenter Server and choose
Configuration > Security > Key Providers.
c. In the vCenter Server Appliance Management Interface (VAMI),
choose Configuration > Encryption.
d. In the vSphere Client, select the vCenter Server and choose
Configuration > Encryption.
10. You want to configure vSphere Trust Authority. Which of the following is a
necessary step?
a. Create the trusted key provider on the trusted cluster.
b. Import the trusted key provider to the trusted authority cluster.
c. Configure the trusted key provider for the trusted hosts on the trusted
cluster.
d. Configure the trusted key provider for the hosts on the trusted authority
cluster.
474 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
Managing SSO
As explained in previous chapters, you can use the built-in identity provider vCenter
SSO and external identity providers for vSphere authentication. SSO includes the
Security Token Service (STS), an administration server, the vCenter Lookup Ser-
vice, and the VMware Directory Service (vmdir). The VMware Directory Service is
also used for certificate management.
Chapter 8, “vSphere Installation,” discusses the following procedures:
■ Adding and editing identity sources
■ Adding the vCenter Appliance to an Active Directory domain
■ Configuring SSO password, lockout, and token policies
This section describes the procedures for enabling Windows session authentication
(SSPI) and managing STS. This section also describes how to implement and use
Enhanced Linked Mode.
NOTE The lockout policy applies only to user accounts and not to system accounts
such as administrator@vsphere.local.
NOTE The certificate is not external facing, and it is valid for 10 years. You should
replace this certificate only if required by your company’s security policy.
NOTE Enhanced Linked Mode requires the vCenter Server Standard licensing level.
NOTE After creating a user or group, you cannot change its name.
When using the procedure in Chapter 8 to add members to a group in the SSO
domain, you can add users from identity sources.
In some cases, you might want to manage multiple independent vSphere environ-
ments that have similar but separate SSO domains and users. In such scenarios, you
can export SSO users by using this procedure:
Step 1. Log on to the vSphere Web Client.
Step 2. Select Home > Administration.
Chapter 12: Managing vSphere Security 477
You can use a similar procedure to export SSO groups except that in step 4 you
choose the Groups tab instead of the Users tab.
After you create custom roles, you can use those roles when assigning permissions in
the same manner as you use the vCenter Server system roles and sample roles.
To clone a sample role or custom role in the vSphere Client, navigate to Adminis-
tration > Roles and select the role, click the Clone Role Action icon, and provide a
name for the new role. To edit a sample role or custom role in the vSphere Client,
navigate to Administration > Roles and select the role, click the Edit Role Action
icon, and modify the set of privileges in the role.
Permissions
To set a permission using the vSphere Client, you can use the following steps:
Step 1. Select the object in the inventory.
Step 2. Click the Permissions tab.
Step 3. Click the Add Permission icon.
Step 4. Select a user or group from the User drop-down menu.
Step 5. Select a role from the Role drop-down menu.
Step 6. Optionally, select Propagate to Children.
Step 7. Click OK.
478 VCP-DCV for vSphere 8.x Cert Guide
By assigning a different role to a group of users on different objects, you control the
tasks that those users can perform in your vSphere environment. For example, to
allow a group to configure memory for the host, select that host and add a permis-
sion that grants a role to that group that includes the Host.Configuration.Memory
Configuration privilege.
Global Permissions
In some cases, you might assign a global permission and choose not to propagate to
child objects. This may be useful for providing a global functionality, such as creat-
ing roles. To assign a global permission, you should use the vSphere Client with
a user account that has the Permissions.Modify privilege on the root object of all
inventory hierarchies. Select Administration > Global Permissions and use the Add
Permission icon (plus sign). Then use the dialog that appears to select the desired
user group (or user) and role.
NOTE Be careful when applying global permission. Decide whether you genu-
inely want a permission to apply to all solutions and to all objects in all inventory
hierarchies.
Editing Permissions
To modify an existing permission, you can edit the permission and change role
assignment. You cannot change the object, user, or user group in the permission,
but you can change the role and the Propagate to Children setting. If this is not
adequate, you need to remove the permission and create a new permission with the
correct settings. You must do this work as a user with sufficient privileges to change
permissions on the associated object.
The biggest challenge in editing permissions may be locating the permission in
order to modify it. If you know the object on which a permission was created, you
can select the object in the vSphere Client inventory, select Configure > Permis-
sions, right-click the permission, and choose Change Role. Then you select the
appropriate role and click OK.
If you do not already know which permission to modify or on which object the
permission is assigned, you may need to investigate. Begin by selecting an object in
Chapter 12: Managing vSphere Security 479
the inventory on which you know the applied user permissions are incorrect. Select
Manage > Permissions to discover all the permissions that apply to the object. Use
the Defined In column to identify where each applied permission is defined. Some
of the permissions may be assigned directly on the object, and some may be assigned
to ancestor objects. Determine which permissions are related to the issue and where
they are assigned.
For each certificate management task, you should use the administrator account in
the SSO domain (which is vsphere.local by default).
If you replace an existing certificate, you can remove the old root certificate (as long
as you are sure it is no longer in use).
By default, vCenter Server monitors all certificates in VECS and raises an alarm for
any certificate that will expire in 30 days or less. You can change the 30-day thresh-
old by modifying vCenter Server’s advanced setting vpxd.cert.threshold.
Alternatively, you can use the vSphere Certificate Manager utility from the vCen-
ter Server shell to generate the CSR, by using the command /usr/lib/vmware-
vmca/bin/certificate-manager, selecting option 1, and providing the certificate
information.
Chapter 12: Managing vSphere Security 481
After your CA processes the CSR, you can use the following procedure to add the
custom certificates:
Step 1. In the vSphere Client, navigate to Home > Administration > Certifi-
cates > Certificate Management.
Step 2. If the system prompts you to do so, enter the credentials for your vCenter
Server.
Step 3. In the Machine SSL Certificate section, for the certificate you want to
replace, click Actions > Import and Replace Certificate.
Step 4. Select the Replace with External CA Certificate (requires private
key) option and click Next.
Step 5. Upload the certificates and click Replace.
Step 6. Wait for the vCenter Server services to restart.
NOTE Thumbprint Mode was used in vSphere 5.5 and should not be used in later
versions unless it is necessary because some services may not work. Also, in Thumb-
print Mode, vCenter Server checks only the certificate format and not its validity.
Even expired certificates are accepted.
To perform certificate management for ESXi, you must have the Certificates.Man-
age Certificates privilege.
482 VCP-DCV for vSphere 8.x Cert Guide
For example, if you want to use custom certificates instead of using VMCA to provi-
sion ESXi hosts, you need to edit the vCenter Server vpxd.certmgmt.mode advanced
option. In the vSphere client, you can use this procedure to change the certificate
mode:
Step 1. Select the vCenter Server and click Configure.
Step 2. Click Advanced Settings and then click Edit.
Step 3. In the Filter box, enter certmgmt to display only certificate management
keys.
Step 4. Change the value of vpxd.certmgmt.mode to custom and click OK.
Step 5. Restart the vCenter Server service.
Certificate Expiration
For ESXi 6.0 and later, you can use the vSphere Client to view information, includ-
ing expiration, for all certificates that are signed by VMCA or a third-party CA. In
the vSphere Client, select the host and navigate to Configure > System > Certificate.
Here you can examine the Issuer, Subject, Valid From, Valid To, and Status fields.
The value of the Status field may be Good, Expiring, Expiring Shortly, Expiration
Imminent, or Expired.
A yellow alarm is raised if a certificate’s status is Expiring Shortly (that is, if it expires
in less than eight months). A red alarm is raised if the certificate’s status is Expiration
Imminent (that is, if it expires in less than two months).
By default, each time a host reconnects to vCenter Server, it renews any host
certificates whose status is Expired, Expiring Immediately, or Expiring. If a
certificate is already expired, you must disconnect the host and reconnect it. To
renew or refresh the certificates, you can use the following procedure:
Step 1. In the vSphere Client, select the host in the navigation pane.
Step 2. Navigate to Configure > System > Certificate.
Step 3. Click one of the following options:
■ Renew: Retrieves a fresh signed certificate for the host from VMCA.
■ Refresh CA Certificates: Pushes all certificates in the VECS
TRUSTED_ROOTS store to the host.
Step 4. Click Yes.
■ Use the DCUI only for troubleshooting. Likewise, use root access to the ESXi
shell only for troubleshooting.
■ When upgrading ESXi components, use only VMware sources. Although a
host runs several third-party packages, VMware supports upgrades to those
packages only from VMware sources. Check third-party vendor sites and the
VMware knowledge base for security alerts.
■ You should follow the VMware security advisories at http://www.vmware.com/
security/.
■ Configure ESXi hosts with host profiles, scripts, or some other automation.
Hardening Guidelines
In the U.S. Department of Defense (DoD), Security Technical Implementation
Guides (STIGs) provide technical, standards-based hardening guidance. Officially
published STIGs are mandatory in the DoD and fill a crucial role in systems accred-
itation as part of the Risk Management Framework (RMF). VMware has worked
with the Defense Information Systems Agency (DISA) to publish many STIGs
over the years and will continue to do so. The official reference for DISA STIGs is
https://public.cyber.mil/stigs/. The content that VMware has submitted to DISA is
available in the VMware vSphere 8 STIG Readiness Guide at https://via.vmw.com/
stig, which includes STIGs for the vCenter Server appliance, VAMI, and Lookup
Service, among many others.
DISA uses the following category codes:
■ CAT I: The exploitation of the vulnerability will directly and immediately
result in loss of confidentiality, availability, or integrity.
■ CAT II: The exploitation of the vulnerability has a potential to result in loss of
confidentiality, availability, or integrity.
■ CAT III: The existence of the vulnerability degrades measures to protect
against loss of confidentiality, availability, or integrity.
STIGs are used as the baseline for hardening DoD environments. The vSphere 8
Security Configuration & Hardening Guide (SCG) is the baseline for hardening
other vSphere environments. In addition to providing guidance for system design
and hardware configuration, the SCG provides guidance on security controls.
In the VMware vSphere Security Baseline version 801-20230613-01 (at https://via.
vmw.com/scg), you will find 126 security control items. For example, an item named
esxi-8.account-password-policies explains that you can change the settings on the
ESXi CIM service from its default “Start and stop with host” to “Start and stop
Chapter 12: Managing vSphere Security 485
To ensure that an ESXi host is properly configured according to your standards, you
can ensure that it complies with its attached host profile. You can use the results to
identify noncompliant settings on the host and remediate with the host profiles set-
tings. You can use these steps to check compliance:
Step 1. Navigate to the Host Profiles main view.
Step 2. Right-click a host profile.
Step 3. Click Check Host Profile Compliance.
The compliance status for each ESXi host is Compliant, Unknown, or Noncompli-
ant. Noncompliant status indicates a specific inconsistency between the profile and
the host, which you should remediate. Unknown status indicates that the compliance
of the host is not known because it could not be verified. A common root cause is
that the host is disconnected. You should resolve the issue and recheck compliance.
486 VCP-DCV for vSphere 8.x Cert Guide
NOTE Starting with vSphere 7.0, the vSphere CLI package is end of life. Its capa-
bilities are supported with more API-centric tools such as ESXCLI and Perl SDK.
From the ESXi shell, you can use the ESXCLI command set to configure the host
and to perform administrative tasks. ESXCLI provides a collection of namespaces
that allows an administrator to quickly discover the precise command necessary for
a specific task. For example, all the commands to configure networking exist in the
esxcli network namespace, and all the commands to configure storage exist in the
esxcli storage namespace. Each namespace is further divided into child namespaces
that comprise various functions performed under the parent namespace. For exam-
ple, the esxcli storage parent namespace contains a core namespace that deals with
storage adapters and devices and an nmp namespace that deals with path selection
and storage array types. Therefore, a typical ESXCLI command is composed of
multiple namespaces, and each additional namespace is used to narrow the scope of
the command, ending with the actual operation to be performed.
To identify the proper ESXCLI command to perform a specific task, you can begin
by entering esxcli at the command prompt in the ESXi shell. Because it is not a
command by itself, just the entry point to the namespace hierarchy, the results
will show the first level of the namespace hierarchy. The first level of available
namespaces includes device, esxcli, fcoe, graphics, hardware, iscsi, network,
nvme, rdma, sched, software, storage, system, vm, and vsan. You can use the brief
description of each namespace shown in the results to identify which namespace is
most likely to serve your need. You can press the up-arrow key on the keyboard to
retrieve the last entered namespace and add the name for the next namespace. You
can continue reviewing namespaces until you discover the command you need.
For example, if you are seeking a command to list all standard virtual switches,
you can enter esxcli network to learn that it contains several namespaces, includ-
ing one named vswitch. You can then enter esxcli network vswitch and learn that
its namespaces are standard and dvs. Going further, you can learn that the esxcli
network vswitch standard namespace contains list. You can conclude that the com-
mand you need is esxcli network vswitch standard list. Table 12-2 lists a few other
examples of ESXCLI commands.
Chapter 12: Managing vSphere Security 487
Likewise, you can use PowerCLI to manage and configure a vSphere environment.
When connecting to a vCenter Server environment, the functionality scope of
PowerCLI is similar to the functionality scope of using the vSphere Client with the
vCenter Server. Table 12-3 describes a few popular PowerCLI commands.
If you want to develop code using other tools, you may want to get familiar with
vSphere REST APIs. To do so, you can browse to the FQDN of your vCenter
Server and select Browse vSphere REST APIs. In vCenter Server 8.0, this link takes
you to the API Explorer section of the Developer Center in the vSphere Client.
Here you can learn how to make GET and POST calls to query and modify the
state and configuration of your ESXi hosts and other vSphere objects.
accounts, you must comply with or modify the predefined requirements. ESXi uses
the Linux PAM module pam_passwdqc for password management and control. You
can change the required length, change character class requirement, and allow pass-
phrases by using the Security.PasswordQualityControl advanced option.
NOTE The default requirements for ESXi passwords can change from one release
to the next. You can check and change the default password restrictions by using the
Security.PasswordQualityControl advanced option.
One step in hardening an ESXi host is to harden the password required to use its
predefined local administrator account, which is called root. By default, the ESXi
host enforces passwords for its local user accounts, which may be used to access the
host via the DCUI, the ESXi shell, SSH, or the vSphere Client. Starting with ESXi
6.0, the default password policy must contain characters from at least three character
classes (of the four character classes, which are lowercase letters, uppercase letters,
numbers, and special characters) and must be at least seven characters long.
An uppercase character that begins a password and a number that ends a password
do not count toward the number of character classes used. A password cannot con-
tain a dictionary word or part of a dictionary word. For example, xQaT3!A is an
acceptable password because it contains four character classes and seven characters.
However, Xqate!3 is not an acceptable password because it contains only two char-
acter classes; the leading X and ending 3 do not count toward the number of used
character classes. You can modify the ESXi password requirements by using the
ESXi host Security.PasswordQualityControl advanced option. You can set Security.
PasswordQualityControl to configure the ESXi host to accept passphrases, which
it does not accept by default. The key to changing the password and passphrase
requirements is understanding the syntax and functionality of the Security.Pass-
wordQualityControl parameter, which has the following default value:
retry=3 min=disabled,disabled,disabled,7,7
The first part of the value used for this parameter identifies the number of retries
allowed for the user following a failed logon attempt. In the default value, retry=3
indicates that three additional attempts are permitted following a failed logon. The
remainder of the value can be abstracted as follows:
min=N0,N1,N2,N3,N4
■ N1: This is the minimum number of accepted characters for passwords that
contain characters from only two classes; it can be disabled to disallow pass-
words that contain characters from only two classes.
■ N2: This is the minimum number of accepted characters for passphrases, and
it can be disabled to disallow passphrases. In addition, to require a passphrase,
you can append passphrase=N to the end of the value, where N specifies the
minimum number of words, separated by spaces, in the passphrase.
■ N3: This is the minimum number of accepted characters for passwords that
contain characters from only three classes; it can be disabled to disallow pass-
words that contain characters from only three classes.
■ N4: This is the minimum number of accepted characters for passwords that
contain characters from all four classes.
exception users list who have administrator privileges can use these services. For all
other users, ESXi shell or SSH access is disabled. Starting with vSphere 6.0, ESXi or
SSH sessions for users who do not have administrator privileges are closed.
If the ESXi shell is enabled, you can still log in to it locally, even if the host is run-
ning in Lockdown Mode. To enable local ESXi shell access, enable the ESXi shell
service. To enable remote ESXi shell access, enable the SSH service.
NOTE The root user and users with the administrator role can access the ESXi shell.
Users who are in the Active Directory group ESX Admins are automatically assigned
the administrator role. By default, only the root user can run system commands (such
as vmware -v) by using the ESXi shell.
You can use the following procedure to enable the ESXi shell:
Step 1. In the vSphere Client, select the host in the navigation pane.
Step 2. Navigate to Configure > Services.
Step 3. Select ESXi Shell and click Start.
Step 4. Optionally, click Edit Startup Policy and then select one of the following
options:
■ Start and Stop Manually
■ Start and Stop with Host
■ Start and Stop with Port Usage
Step 5. Click OK.
You can use a similar procedure to control local and remote access to the ESXi shell
by configuring the startup policy for DCUI and SSH services.
In vSphere 8, timeout values are set by default for the ESXi shell and SSH. You
can modify the Availability Timeout setting based on your needs. The Availability
Timeout setting specifies the amount of time that can elapse before a user must log
in after the ESXi shell is enabled. After the timeout period, the service is disabled,
and users are not allowed to log in. In the vSphere Client, you can select the vCen-
ter Server, navigate to Configure > Settings, go to the Timeout Settings, and set the
Availability Timeout setting. Alternatively, you can modify the UserVars.ESXiShell-
TimeOut advanced system setting.
Similarly, you can set a timeout for idle ESXi shell sessions. The Idle Timeout set-
ting specifies the amount of time that can elapse before a user is logged out of an
idle interactive session. In the vSphere Client, you can select the vCenter Server,
navigate to Configure > Settings, go to the Timeout Settings, and set the Idle
Chapter 12: Managing vSphere Security 491
To enable passthrough for a network device on a host, you can use the following
procedure:
Step 1. In the vSphere Client, select the host in the navigation pane.
Step 2. Navigate to Configure > Hardware > PCI Devices and click Edit.
Step 3. Select a device with a green icon and click OK.
NOTE An orange icon indicates that the status of the device has changed, and you
must reboot the host before you can use the device.
To enable the MOB by using the vSphere Client, you can use the following
procedure:
Step 1. In the vSphere Client, select the host in the inventory.
Step 2. In the right pane, click the Configuration tab.
Step 3. Select System > Advanced Settings and click Edit.
Step 4. Select Config.HostAgent.plugins.solo.enableMob and set its value to
true.
You can use the API SDK of your choice to call AcquireCimServicesTicket to return
a ticket that you can use to authenticate the user with vCenter Server using CIM-
XML port 5989 or WS-Man port 433 APIs.
When specifying particular IP addresses in the firewall settings, you can use the for-
mats shown in the following examples:
■ 192.168.10.0/24
■ 192.168.11.2, 2001::1/64
■ fd3e:29a6:0a79:e462::/64
Chapter 12: Managing vSphere Security 495
The NFS Client firewall rule set behaves differently than other rule sets. ESXi con-
figures NFS Client settings when you mount or unmount an NFS datastore. When
you mount an NFS Version 3 datastore, the following events occur:
■ If the nfsClient rule set is disabled, ESXi enables the rule set, sets allowedAll
to FALSE, and adds the NFS server IP address to the list of allowed IP
addresses.
■ If the nfsClient rule set is enabled, ESXi adds the NFS server IP address to
the list of allowed IP addresses but does not change the state of the rule set or
allowedAll.
■ When you mount an NFS Version 4.1 datastore, ESXi enables the nfs41client
rule set and sets allowedAll to TRUE.
When you remove or unmount an NFS Version 3 datastore from a host, ESXi
removes the IP address from the list of allowed IP addresses. When you remove
or unmount the last NFS Version 3 datastore, ESXi stops the nfsClient rule set.
Unmounting an NFS Version 4.1 datastore does not impact the firewall.
The ESXi software firewall is enabled by default. It should never be disabled while
running production virtual machines. In rare cases, such as temporarily during trou-
bleshooting, you can disable the ESXi firewall by using the esxcli network firewall
set --enabled false command.
In some circumstances, you might want to configure and enable these services. A
good example of an optional service that you might decide to configure and enable
in most environments is NTP because solid time synchronization is vital for many
services. As another example, you might want to temporarily enable SSH while
496 VCP-DCV for vSphere 8.x Cert Guide
troubleshooting. To enable, disable, and configure services, you can use the follow-
ing procedure:
Step 1. In the vSphere Client, select the host in the navigation pane and navigate
to Configure > Services.
Step 2. Select a service that you want to modify and click Start, Stop, or Restart
to immediately change the state of the service.
Step 3. To change the behavior permanently, click Edit Startup Policy and then
choose one of the following options:
■ Start and Stop with Port Usage
■ Start and Stop with Host
■ Start and Stop Manually
Step 4. Click OK.
By default, the root account is included in DCUI.Access. You could consider remov-
ing the root account from DCUI.Access and replacing it with another account for
better auditability.
Chapter 12: Managing vSphere Security 497
Table 12-4 provides details on the behavior of an ESXi host in Lockdown Mode.
VIB you want to add to the host. For example, if the host acceptance level is
VMwareAccepted, you cannot install VIBs at the PartnerSupported level. You
should use extreme caution when allowing community-supported VIBs. The follow-
ing list provides details on defined VIB acceptance levels:
■ VMwareCertified: These VIBs go through thorough testing equivalent to
VMware in-house quality assurance testing for the same technology. Only I/O
Vendor Partner (IOVP) program drivers are published at this level. VMware
takes support calls for VIBs with this acceptance level.
■ VMwareAccepted: These VIBs go through testing that is run by a partner
and verified by VMware. CIM providers and PSA plug-ins are among the VIBs
published at this level. VMware directs support calls for VIBs with this accep-
tance level to the partner’s support organization.
■ PartnerSupported: These VIBs are published by a partner that VMware
trusts. The partner performs all testing, but VMware does not verify it.
VMware directs support calls for VIBs with this acceptance level to the part-
ner’s support organization.
■ CommunitySupported: These VIBs have not gone through any VMware-
approved testing program and are not supported by VMware Technical Sup-
port or by a VMware partner.
To change the host acceptance level, you can use the following command:
esxcli --server=<server_name> software acceptance set
In vSphere 6.0 and later, you can use ESXCLI to manage local user accounts and to
configure permissions on local accounts and on Active Directory accounts. You can
connect directly to an ESXi host by using the vSphere Host Client and navigate to
Manage > Security & Users > Users to create, edit, and remove local user accounts.
Chapter 12: Managing vSphere Security 499
The following user accounts exist on an ESXi host that is not added to a vCenter
System:
■ root: A user account that is created and assigned the administrator role by
default on each ESXi host.
■ vpxuser: A local ESXi user account that is created, managed, and used for
management activities by vCenter Server.
■ dcui: A user account that acts as an agent for the DCUI and cannot be modi-
fied or used by interactive users.
NOTE You can remove the access privileges for the root user. But you should first
create another user account at the root level and assign it the administrator role.
Much as with vCenter Server, each ESXi host uses role-based permissions for users
who log on directly to the ESXi host rather than accessing the host through vCenter
Server. ESXi allows the creation of custom roles, but these roles are applied only
when a user directly logs on to the host, such as when the user uses the vSphere
Host Client to connect to the host directly. In most cases, managing roles and
permissions at the host level should be avoided or minimized. To create, edit, and
remove roles, you can connect directly to an ESXi host by using the vSphere Host
Client and navigate to Manage > Security & Users > Roles.
Step 5. In the vSphere Client, select the ESXi host in the inventory pane and
navigate to Configure > Authentication Services.
Step 6. Click Join Domain.
Step 7. In the dialog box, specify the domain and user credentials. Optionally,
specify a proxy server.
Step 8. Enter a domain, either in the form name.tld or in the form name.tld/
container/path, where name.tld is the domain name, and /container/path is
an optional path to an organization unit where the host computer object
should be created. For example, you can use domain.com/ou01/ou02
to add the host to an organization unit named ou02 that resides in an
organization unit named ou01 in a domain named domain.com.
Step 9. Click OK.
Now you can add a host to an Active Directory domain by using the procedure out-
lined in the section “Using Active Directory to Manage ESXi Users,” but when you
do so, you select the Using Proxy Server option in step 8.
Chapter 12: Managing vSphere Security 501
NOTE You cannot use Secure Boot on ESXi servers that were upgraded by using
ESXCLI commands because the upgrade does not update the bootloader.
You can use the following command to run the Secure Boot validation script on an
upgraded ESXi host to determine if it supports Secure Boot:
/usr/lib/vmware/secureboot/bin/secureBoot.py -c
The output is either “Secure boot can be enabled” or “Secure boot CANNOT be
enabled.”
502 VCP-DCV for vSphere 8.x Cert Guide
To resolve issues with Secure Boot, you can follow these steps:
Step 1. Reboot the host with Secure Boot disabled.
Step 2. Run the Secure Boot verification script.
Step 3. Examine the information in the /var/log/esxupdate.log file.
To use TPM 2.0 chips, you should ensure that your vSphere environment meets
these requirements:
■ vCenter Server 6.7 or later
■ ESXi 6.7 or later host with TPM 2.0 chip installed and enabled in UEFI
■ UEFI Secure Boot enabled
In addition, you should ensure that the TPM chip is configured in the ESXi host’s
BIOS to use the SHA-256 hashing algorithm and the TIS/FIFO (first-in, first-out)
interface and not CRB (Command Response Buffer).
During the boot of an ESXi host with an installed TPM 2.0 chip, vCenter Server
monitors the host’s attestation status. The vSphere Client displays the hardware
trust status in the vCenter Server’s Monitor tab under Security with the following
alarms:
■ Green: Normal status, indicating full trust
■ Red: Attestation failed
Chapter 12: Managing vSphere Security 503
If the “Host secure boot was disabled” message appears in the vSphere Client, you
must re-enable Secure Boot to resolve the problem. If the “No cached identity key
loading from DB” message appears, you must disconnect and reconnect the host.
For details see Chapter 10, “Managing and Monitoring Clusters and Resources.”
With vTA, you can run workloads in a secure environment where you detect tam-
pering, disallow unauthorized changes, prevent malware, and verify the hardware
and software stacks.
When you configure vTA, you enable the Attestation service and the Key Provider
service on the ESXi host in the Trust Authority cluster. The Attestation service
attests to the state of the trusted ESXi hosts, using a TPM 2.0 chip as the basis for
software measurement and reporting. The Attestation service verifies that the soft-
ware measurement signature can be attributed to a previously configured trusted
Chapter 12: Managing vSphere Security 505
TPM endorsement key (EK). The Key Provider service removes the need for the
vCenter Server and the ESXi hosts to require direct key server credentials. The
Key Provider service acts as a gatekeeper for the key servers, releasing keys only to
trusted ESXi hosts.
A trusted ESXi host must contain a TPM chip. A TPM chip is manufactured with
an EK, which is a public/private key pair that is built into the hardware. You can
configure the Attestation service to trust all CA certificates where the manufacturer
signed the TPM chip (the EK public key) or to trust the host’s TOM CA certificate
and EK public key.
NOTE If you want to trust individual ESXi hosts, the TPM chip must include an EK
certificate. Some TPM chips do not.
You can use VMware PowerCLI to configure and manage vSphere Trust Authority.
Alternatively, you can use vSphere APIs or the vSphere Client for at least some of
the activities. To configure vTA, you can perform the following high-level tasks:
Step 1. On a Windows system with access to the vTA environment, install Pow-
erCLI 12.0.0 and Microsoft .NET Framework 4.8 or greater and create a
local folder.
Step 2. Add your user account to the TrustedAdmins groups on the vCenter
Server managing the Trust Authority cluster and on the vCenter Server of
the trusted cluster.
Step 3. Enable Trust Authority State.
Step 4. Collect information about the trusted hosts in the trusted cluster (using
Export-Tpm2CACertificate).
Step 5. Import the trusted host data to the Trust Authority cluster
(New-TrustAuthorityPrincipal).
Step 6. Create the trusted key provider on the Trust Authority cluster (using
New-TrustAuthorityKeyProvider).
Step 7. Export the Trust Authority cluster information from the Trust Authority
cluster (using Export-TrustAuthorityServicesInfo).
Step 8. Import the Trust Authority cluster data to the trusted cluster (using
Import-TrustAuthorityServicesInfo).
Step 9. Configure the trusted key provider for the trusted hosts on the trusted
cluster (using Register-KeyProvider and Set-KeyProvider).
506 VCP-DCV for vSphere 8.x Cert Guide
After configuring vTA, you can perform management operations, including those
summarized in Table 12-5.
Most of the vTA configuration and state information is stored on the ESXi hosts in
the ConfigStore database. Backups of vCenter Server do not include vTA configura-
tion. You can leverage the files that you exported during the configuration of vTA
vSphere as your backup. If you need to restore vTA, use the exported files to recon-
figure vTA.
TLS 1.2
By default, during fresh installation, upgrade, or migration, vSphere 8 enables TLS
1.2 and disables TLS 1.0 and TLS 1.1. Although the TLS Configurator utility can
be used on ESXi 7.x environments to activate older TLS versions, ESXi 8.0 and
later do not support TLS 1.0 and 1.1. Running the TLS Configurator utility on
ESXi 8.0 and later silently fails, with no error reported. To use the TLS Configura-
tor utility, you can open an SSH session to the vCenter Server and use a command
to run the utility. For example, to deactivate TLS 1.0 and TLS 1.1 and activate only
TLS 1.2 in an applicable environment, you can use the following commands:
cd /usr/lib/vmware-TlsReconfigurator/VcTlsReconfigurator./
reconfigureVc update -p TLSv1.2
Chapter 12: Managing vSphere Security 507
FIPS
Federal Information Processing Standards (FIPS) are publicly announced U.S.
standards that establish requirements for ensuring computer security and
interoperability. FIPS 140-2 is a U.S. and Canadian government standard
that specifies security requirements for cryptographic modules. vSphere uses
FIPS-validated cryptographic modules to match those specified by the FIPS 140-2
standard. The goal of vSphere FIPS support is to ease the compliance and security
activities in various regulated environments.
In vSphere 7.0 Update 2 and later, you can use the following steps to enable
FIPS-validated cryptography on the vCenter Server Appliance, which is deactivated
by default:
Step 1. In the vSphere Client, navigate to Menu > Developer Center > API
Explorer.
Step 2. In the Select API drop-down menu, select appliance.
Step 3. Scroll through the categories and expand system/security/global_fips.
Step 4. Expand GET and click Try It Out > Expand.
Step 5. Go to the Response area and view the current setting.
Step 6. Expand PUT and enter the following into the request body.
{
"enabled":true
}
When enabling FIPS, it is important to consider that vCenter Server supports only
cryptographic modules for federated authentication, which means RSA SecureID
and some CACs do not function. In addition, non-VMware vSphere Client plug-ins
may not work with FIPS, and certificates with key sizes larger than 3072 bits have
not been tested.
Windows Server 2016 or later). To enable vSGX, configure the following hardware
settings:
■ Go to Security Devices > SGX and select the Enable checkbox.
■ Go to VM Options > Boot Options and set Firmware to EFI.
■ Set the Enter Enclave Page Cache (EPC) size and select Flexible Launch
Control (FLC) mode.
To enable vSGX, the virtual machine must be powered off. You can enable vSGX as
you provision a new virtual machine. To remove vSGX from a virtual machine, go to
Security Devices > SGX and uncheck the Enable checkbox.
To encrypt an existing virtual machine, you can use the following procedure:
Step 1. Establish a trusted connection with the KMS and select a default KMS.
Step 2. Create an encryption storage policy or plan to use the bundled sample,
VM Encryption Policy.
Step 3. Ensure that you have the Cryptographic Operations.Encrypt New
privilege.
Step 4. If the host encryption mode is not enabled, ensure that you have the
Cryptographic Operations.Register Host privilege.
Step 5. Ensure the virtual machine is powered off.
Step 6. In the vSphere Client, right-click the virtual machine and select VM
Policies > Edit VM Storage Policies.
Step 7. Select the storage policy (from step 2).
Step 8. Optionally, select Configure per Disk and set encryption as needed for
each virtual disk.
Step 9. Click OK.
510 VCP-DCV for vSphere 8.x Cert Guide
Review Questions
1. You want to add a global permission. Which of the following privileges do you
need?
a. Permissions.Modify Permission privilege on the vCenter root object
b. Permissions.Modify Permission privilege on the global root object
c. Permissions.Add Permission privilege on the vCenter root object
d. Permissions.Add Permission privilege on the global root object
2. A yellow alarm is raised due to a host’s certificate expiration date. Which of the
following is a true statement concerning the state of the certificate?
a. The certificate is expired.
b. The certificate will expire in less than two months.
c. The certificate will expire in more than two months and less than six
months.
d. The certificate will expire in more than two months and less than eight
months.
4. You configured an ESXi host with a TPM 2.0 chip and enabled UEFI Secure
Boot. During the boot, you get the message “No cached identity key, loading
from DB.” What should you do?
a. Reinstall ESXi.
b. Reboot ESXi.
c. Re-enable Secure Boot.
d. Disconnect the host from the vCenter Server and reconnect.
512 VCP-DCV for vSphere 8.x Cert Guide
5. You want to have a backup in case you ever need to restore vSphere Trusted
Authority. What should you do?
a. Keep a copy of the files that you exported while configuring vTA.
b. In the vSphere Client, choose Backup vTA Configuration.
c. Clone the vCenter Server.
d. Use the vCenter Server File Backup feature.
This page intentionally left blank
This chapter covers the following topics:
Table 13-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
vCenter Server Backup 1, 2
Upgrading to vSphere 8.0 3, 4
Using vSphere Lifecycle Manager 5–7
Managing ESXi Hosts 8
Monitoring and Managing vCenter Server 9, 10
2. You want to restore your vCenter Server. Which of the following options are
valid? (Choose three.)
a. SCP
b. FTP
c. TFTP
d. HTTPS
e. SMB
3. You want to upgrade a vSphere 7.x environment to vSphere 8.0. Which of the
following is the appropriate order?
a. Virtual machines, ESXi hosts, vCenter Server
b. ESXi hosts, vCenter Server, virtual machines
c. vCenter Server, ESXi hosts, virtual machine hardware, VMware Tools
d. vCenter Server, ESXi hosts, VMware Tools, virtual machine hardware
5. You are preparing to use Lifecyle Manager. Which of the following is the
smallest installable component (metadata and binary payload) for ESXi?
a. An update
b. An upgrade
c. A patch
d. A VIB
6. You want to enable Quick Boot for all the hosts in your vSphere cluster. In the
vSphere Client, where should you go to enable it?
a. Menu > Lifecycle Manager
b. Menu > Host and Clusters > DRS Cluster Settings
c. Menu > Host and Clusters > HA Cluster Settings
d. Menu > Host and Clusters > ESXi Host Settings
Chapter 13: Managing vSphere and vCenter Server 517
7. You want to use Lifecycle Manager to update ESXi firmware. Which of the
following is a requirement?
a. Firmware baselines
b. VMware-provided add-on
c. Vendor-provided plug-in
d. Vendor-provided baselines
8. You want to manage the services running in an ESXi host. Which of the fol-
lowing actions is not available using the vSphere Host Client?
a. Starting a service
b. Stopping a service
c. Removing a service
d. Changing a service’s policy
9. You are examining the health state in the vCenter Server Appliance Manage-
ment Interface (VAMI). What color indicates an alert, where one or more
components may be degraded?
a. Red
b. Orange
c. Yellow
d. Gray
10. You are repointing a vCenter Server to an existing domain. Which of the fol-
lowing is not a valid resolution setting involving conflicts among the settings
between the old and new domains?
a. Delete
b. Copy
c. Skip
d. Merge
518 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
If you have prepared a supported target server, you can use the following procedure
to schedule a file-based backup of the vCenter Server:
Step 1. Log on to the VAMI (https://vCenterFQDN:5480) as root.
Step 2. Click Backup > Configure.
Step 3. Enter the backup location details:
■ Backup Location: Provide the protocol, port, server address, and
folder.
■ Backup Server Credentials: Provide the username and password with
write privileges.
Step 4. Configure the schedule and time.
Step 5. Optionally, provide an encryption password.
Step 6. Provide a number of backups to retain or select Retain All Backups.
Step 7. Optionally, select Stats, Events, and Tasks to back up historical data.
Step 8. Click Create.
520 VCP-DCV for vSphere 8.x Cert Guide
You can manually back up a vCenter Server in the VAMI by selecting Backup >
Backup Now.
To restore a vCenter Server, launch the vCenter Server installer (described in
Chapter 8, “vSphere Installation”) on your desktop (Windows, Linux, or Mac) and
use the following procedure:
Step 1. On the Home page, click Restore.
Step 2. On the next page, click Next.
Step 3. Accept the license agreement and click Next.
Step 4. Provide the backup location and credentials for the backup file to be
restored. For the backup location, specify the protocol, which can be
FTP, FTPS, HTTP, HTTPS, SFTP, NFS, or SMB, and the FQDN or IP
address of the backup server. For example, to restore from an FTP server
with IP address 192.168.100.101, you can specify ftp://192.168.100.101.
Step 5. Click Next to connect to the backup server and then use the wizard to
select the folder that contains the backup metadata. Click Select.
Step 6. Review the backup information and click Next.
Step 7. Continue using the wizard to provide connection details (FQDN, creden-
tials, and certificate information) for the ESXi host or vCenter Server to
which the appliance will be restored.
Step 8. When prompted in the wizard, provide a name and a root password for
the vCenter Server Appliance.
Step 9. Select a deployment size (from Tiny to X-Large).
Step 10. Select the storage size (from Default to X-Large).
Step 11. Select a datastore and provide virtual disk and network settings for the
appliance.
Step 12. On the Ready to Complete Stage 1 page, click Finish.
Step 13. When the OVA deployment finishes, click Continue to proceed to
Stage 2.
Chapter 13: Managing vSphere and vCenter Server 521
Step 14. Continue navigating the wizard, and when it prompts you for Single
Sign-On credentials, provide the credentials and click Validate and
Recover.
Step 15. On the Ready to Complete page, review the details, click Finish, and
click OK.
NOTE If a restore fails, power off and delete the partially restored VM. Then try to
restore the VM again.
NOTE You must power off the active, passive, and witness nodes in a vCenter
Server HA cluster prior to restoring. You must reconstruct the cluster after a restore
operation completes successfully.
If you prefer to use an image-based backup, you can leverage the vSphere API. For
image-based backups, you should consider the following:
■ You must ensure that the vCenter Server uses a fully qualified domain name
(FQDN) with correct DNS resolution or configure its host name to be an IP
address.
■ If DHCP is used, you must configure the restored vCenter Server’s IP address
back to the original value.
■ Ensure that all vSphere component clocks are synchronized.
■ The set of restored configurations for image-based restoration is identical to
the set for file-based restoration.
■ The impact on the state of vSphere components of an image-based restoration
is nearly identical to the impact of a file-based restoration.
The Velero Plugin for vSphere can be used to back up and restore vSphere with
Tanzu workloads. It does not back up the Supervisor state. To install and configure
the plug-in, you can take the following steps.
Step 1. Create an S3-compatible object store.
Step 2. Install and configure the Data Manager.
Step 3. Install the Velero vSphere Operator Services on the Supervisor cluster.
Step 4. Use the vSphere Client to enable the Velero vSphere Operator cluster
service and create a namespace for the Velero instance.
Step 5. Provide the proper permissions to the namespace.
Step 6. Create a config map to specify that the plug-in will be installed on the
supervisor cluster.
Step 7. Use the Velero vSphere Operator CLI to run the velero-vsphere
command.
Chapter 13: Managing vSphere and vCenter Server 523
To back up a stateless vSphere pod, you can use the following command, where
mybackup is the name you assign to the backup and mynamespace is the name of
namespace you want to back up.
velero backup create mybackup -include-namespaces mynamespace
To restore a vSphere pod from a backup, you can use the following command, where
mybackup is the name of the backup from which you want to restore:
velero restore create --from-backup mybackup
2. ESXi hosts
NOTE For vCenter Server 6.0 and earlier, you should upgrade to vSphere 6.7 and
then upgrade to vSphere 8.0. For vSphere 6.5, you can first upgrade to 6.7 or 7.x and
then upgrade to 8.0.
You should back up vCenter Server prior to upgrading it. For details, see the section
“vCenter Server Backup,” earlier in this chapter.
To upgrade your environment to use vCenter Server 8.0, you need to either upgrade
an existing vCenter Server Appliance or migrate from an existing Windows-based
vCenter Server. When you upgrade or migrate a vCenter Server that uses an exter-
nal Platform Services Controller (PSC), you converge the PSC into a vCenter
Server Appliance.
Prior to upgrading to vCenter Server 8.0, you should consider its compatibility with
other vSphere components, as summarized in Table 13-3.
524 VCP-DCV for vSphere 8.x Cert Guide
the target vCenter Server Appliance. At a minimum, you must transfer configuration
data. You can choose whether you want to transfer historical data and performance
metrics data. Specifically, you can choose one of the following options:
■ Configuration data: Transferring just configuration data minimizes downtime
during the upgrade.
■ Configuration and historical data: You can choose to transfer historical data
(usage statistics, tasks, and events) during an upgrade (impacting the down-
time) or in the background following the upgrade.
■ Configuration, historical, and performance data: You can transfer the
configuration data during the upgrade and transfer the remaining data in the
background following the upgrade.
NOTE The option to transfer data in the background following an upgrade is appli-
cable only in scenarios where the source vCenter Server uses an external database.
You can monitor the background data transfer by using the VAMI. You can pause
and cancel the data transfer.
■ Ensure that network connectivity exists between the vCenter Server or ESXi
that hosts the source vCenter Server Appliance and the new vCenter Server
Appliance.
■ If you plan to set the system name to a FQDN, ensure that forward and
reverse DNS records are created.
Upgrading a vCenter Server Appliance is a two-stage process: (1) Deploy the OVA
and (2) transfer the data and configure the vCenter Server Appliance. For a vCenter
Server with an external PSC, you can use the following procedure for Stage 1:
Step 1. Launch the vCenter Server (GUI) installer and select Upgrade.
Step 2. Review the upgrade process on the first wizard page and click Next.
Step 3. Accept the license agreement and click Next.
Step 4. Provide the following information for the source vCenter Server:
■ Provide the address, HTTPS port, SSO credentials, and root password
for the source vCenter Server.
■ Provide the address, HTTPS port, and credentials for a user with
administrative privileges for the ESXi host (or vCenter Server) that is
hosting the source vCenter Server.
Click Connect.
Step 5. Follow the wizard prompts to accept the certificate and accept the plan to
converge the source vCenter Server and external PSC into a single vCen-
ter Server Appliance.
Step 6. Follow the wizard prompts to provide the following information for the
target environment that will host the new vCenter Server Appliance:
■ If you are connecting to a vCenter Server, provide the address,
HTTPS port, SSO credentials, and root password for the vCenter
Server. Select a data center and an ESXi host (or cluster).
■ If you are connecting to an ESXi host, provide the address, HTTPS
port, and credentials for a user with administrative privileges for the
ESXi host.
Step 7. Follow the wizard to configure the new vCenter Server Appliance with
the following information:
■ Virtual machine name
■ Root user password
Chapter 13: Managing vSphere and vCenter Server 527
NOTE The identical Stage 1 procedure can be used when upgrading a vCenter
Server Appliance with an embedded PSC, except the wizard does not prompt you to
accept the plan to converge an external PSC.
For a vCenter Server with an external PSC, you can use the following procedure for
Stage 2:
Step 1. Review the Stage 2 details and click Next.
Step 2. Wait for the pre-upgrade check to finish and respond to any of the fol-
lowing messages:
■ Errors: Read each message, click Logs to obtain a support bundle, and
troubleshoot. You cannot proceed with the upgrade until errors are
corrected.
■ Warnings: Read each message and click Close.
Step 3. Specify the replication technology by choosing one of the following
options:
■ This Is the First vCenter Server in the Topology That I Want to
Converge
■ This Is a Subsequent vCenter Server (and also provide the IP
address and HTTPS port of the partner vCenter Server)
Step 4. On the Select Upgrade Data page, choose the type of data transfer, as
described in the section “vCenter Server Data Transfer,” earlier in this
chapter.
Step 5. Complete the wizard and wait for the transfer and setup operations to
complete.
Step 6. Decommission the source external PSC.
528 VCP-DCV for vSphere 8.x Cert Guide
When you migrate vCenter Server for Windows to vCenter Server Appliance, the
installer performs an environment precheck that includes the following items:
■ Sufficient storage space in the source server
■ Validity and compatibility of SSL certificates and system names
■ Network connectivity, ports, and DNS resolution
■ Database connectivity
■ Proper credentials and privileges for the Single Sign-On and Windows
administrator accounts
■ NTP server validation
The following limitations apply when you migrate vCenter Server for Windows to
vCenter Server Appliance 8.0:
■ Local Windows OS users and groups are not migrated to the guest OS
(Photon OS) of the new appliance. You should remove any vCenter Server
permissions to local Windows users prior to the migration.
■ At the end of the migration, the source vCenter Server is turned off, and any
solutions that are not migrated become unavailable. You should leave the
source vCenter Server powered off to avoid network ID conflicts with the
target vCenter Server Appliance.
Chapter 13: Managing vSphere and vCenter Server 529
NOTE If the Windows-based vCenter Server uses an external Update Manager, run
the Migration Assistant on the Update Manager machine before running it on the
vCenter Server.
You can use the following steps to create an interoperability report on the compat-
ibility of your environment’s VMware products against a target version of vCenter
Server:
Step 1. In the vSphere Client, select a vCenter Server in the inventory pane and
navigate to Updates > Update > Target Version.
Step 2. Select a target vCenter Server version (major upgrade or minor update)
and click OK.
Step 3. Click Product Interoperability.
Step 4. Review the Product Interoperability report, which should contain all the
available products in your environment.
Step 5. If a VMware product in your environment is not automatically listed or is
undetected, you can use the following steps to manually add the product
and regenerate the Product Interoperability report:
a. For each missing product, click Modify Product List and select the
VMware product and version.
b. Click Done.
c. Regenerate the Product Interoperability report and review the
product list.
Step 6. Click Export to save the report as a comma-separated values (CSV) file.
After you address issues identified in the report, you can use the VAMI to perform
administrative tasks to apply patches and updates.
532 VCP-DCV for vSphere 8.x Cert Guide
Starting with vSphere 7.0, you can use vLCM images to perform the following tasks
on a set of hosts at the cluster level:
■ Install a desired ESXi version on each host
■ Install and update third-party software on each ESXi host
■ Update the firmware of each ESXi host
■ Update and upgrade each ESXi host in a cluster
■ Check the hardware compatibility of each host against hardware compatibility
lists, such as the VMware Compatibility Guide and the vSAN Hardware Compat-
ibility List
NOTE The ability for vLCM to manage clusters leveraging baselines and baseline
groups has been deprecated. It is still supported in vSphere 8.0, but the support will
be dropped in a future vSphere release. In vSphere 8.0, leveraging images is preferred
over leveraging baselines.
You can start using vLCM images as you create a cluster. Otherwise, you can switch
from using baselines to images later. After switching a cluster to use images, you
cannot revert the cluster back to using baselines. However, you can move the hosts
to another cluster that uses baselines. If you set up an image for a cluster and reme-
diate all the hosts in the cluster, then all standalone VIB and non-integrated agents
are deleted from the hosts.
vLCM has several components, including a service named vSphere Lifecycle
Manager that runs in vCenter Server and uses the embedded vCenter Server Post-
greSQL database. It communicates with agents running in each ESXi host.
vSphere Lifecycle Manager uses a desired-state model based on images that repre-
sent both the target software and target configuration of the host. To use images,
all hosts must be ESXi 7.0 or later, they must be stateful, and they must be from the
same hardware vendor.
NOTE Starting with vCenter Server 7.0 Update 1, ESXi 7.0 Update 1, and NSX-T
3.1.0, a vCLM-enabled cluster can manage installation of ESXi and NSX-T VIBs.
Starting with vSphere 7.0 Update 1, you can leverage vLCM to upgrade a Supervisor
cluster to the latest version of vSphere with Tanzu and upgrade the ESXi version of
the hosts in the Supervisor cluster.
534 VCP-DCV for vSphere 8.x Cert Guide
You can leverage vLCM for VMware Tools and virtual machine hardware upgrade
operations on virtual machines running on ESXi 6.7, ESXi 7.0, and ESXi 8.0 hosts.
To get started using vLCM, in the vSphere Client, you can navigate to Menu >
Lifecycle Manager (which is called the Lifecycle Manager home view) and select
a vCenter Server. Here you can configure vLCM by using the Settings tab. Table
13-4 describes the available settings for vLCM remediation.
When working with images, the following settings are applicable: Quick Boot, VM
Power State, VM Migration, Maintenance Mode Failures, HA Admission Control,
and DPM.
NOTE Starting with vSphere 7.0 Update 2, a new option called Suspend-to-Memory
(STM) is available for vLCM clusters that use images, and it is dependent on Quick
Boot.
When working with baselines, the following settings are applicable: Quick Boot,
VM Power State, VM Migration, Maintenance Mode Failures, PXE Booted Hosts,
and Removable Media Devices.
You can perform the following tasks from the Lifecyle Manager home view:
■ Browse the vSphere Lifecycle Manager depot.
■ Trigger the synchronization of updates with the configured online depots.
Chapter 13: Managing vSphere and vCenter Server 535
In vSphere with Tanzu with vSphere networking, you can use vLCM for a cluster
with a single image. To get started, you can use the vSphere Client to select the clus-
ter and enable it for Workload Management. The requirements are as follows:
■ ESXi 7.0 Update 1
■ VMware vSphere 7 Enterprise Plus with Add-on for Kubernetes license
■ vCenter Server 7.0 Update 1
In the vSphere Client, you can use the Workload Management interface to upgrade
the Supervisor cluster. You can use vLCM to upgrade the host’s ESXi version.
To use vLCM with vSphere with Tanzu with vSphere networking, you need vCenter
Sever 7.0 Update 2 and ESXi 7.0 Update 2 or later.
UMDS is a 64-bit Linux application that is bundled with the vCenter Server Appli-
ance 8.0. You can use that bundle to install UMDS on a separate Linux system.
You cannot upgrade UMDS on a Linux system. Instead, you can uninstall UMDS,
perform a fresh installation, and continue using an existing patch store. To install
UMDS, you can use the following procedure:
Step 1. Log on to a supported Linux system, such as Ubuntu (14.04, 18.04, 18.04
LTS, or 20.04 LTS) or Red Hat Enterprise Linux (7.4, 7.5, 7.7, or 8.1). If
you select Red Hat Enterprise 8.1, install the libnsl package Version 2.28
or later.
Step 2. Verify that you have administrative privileges.
Step 3. Open a command shell.
Step 4. Copy VMware-UMDS-8.0.1-build_number.tar.gz to the Linux server.
Step 5. Run the vmware-install.pl script.
Step 6. When prompted, accept the EULA, select an installation directory, pro-
vide proxy settings, and specify the directory for storing patches.
To connect UMDS to third-party vendor websites, you can use the following
command:
vmware-umds -S --add-url https://web1.vendor1.com/index.html
/index.xml --url-type HOST
To export data from UMDS to a specific location that serves as a shared repository
for vSphere Lifecycle Manager, you can use the following command, where reposito-
ryPath represents a valid path to the shared repository:
vmware-umds -E -export-store repositoryPath
Step 6. On the Select Patches Manually page, optionally select specific patches
from the set of patches that do not meet the criteria for automatic inclu-
sion to include in the baseline.
Step 7. On the Summary page, click Finish.
NOTE Starting with vSphere 7.0, the vendor name of VMware for inbox compo-
nents has changed from VMware, Inc to VMware. If you filter the components by
VMware, the results contain both VMware, Inc for 6.x patches and VMware for 7.0
patches.
If a user has the View Compliance Status privilege, you can use the Updates tab for
a selected object to view the object’s compliance with baselines or images. You can
select a host or cluster that is managed with baselines and click on Updates > Base-
lines. From there, you can do the following tasks:
■ Check the compliance of hosts or clusters against baselines and baseline
groups.
■ Attach and detach baselines and baseline groups to hosts or clusters.
■ Perform a remediation precheck.
■ Stage patches or extensions to prepare for remediation.
■ Check the compliance of ESXi hosts against an image.
■ Remediate hosts against baselines and baseline groups.
■ Remediate hosts that are part of a vSAN cluster against system-managed
baselines.
You can select a cluster that is managed with an image and click on Updates >
Images. From there, you can do the following tasks:
■ Export, import, and edit the image used by the cluster.
■ Upgrade the firmware of the ESXi hosts in the cluster.
■ Check for and examine recommended images for the cluster.
Chapter 13: Managing vSphere and vCenter Server 539
■ Check for hardware compatibility for a selected ESXi version against the
vSAN HCL.
■ Check the compliance of the ESXi hosts against the image.
■ Run a remediation precheck.
■ Remediate the ESXi hosts against the cluster’s image.
You can select a host and then select Updates > Hosts > Hardware Compatibility to
check the host hardware against the VMware Compatibility Guide. You can select a
host and then select Updates > Hosts and then select VMware Tools or VM Hard-
ware to check and upgrade the VMware Tools version and virtual hardware version
of the virtual machines.
Table 13-5 provides definitions of vSphere Lifecycle Manager terms.
NOTE During the synchronization of a depot, vLCM downloads only the VIB
metadata.
In vSphere releases prior to 7.0, VIBs are packaged into bulletins. Starting with
vSphere 7.0, VIBs are packaged into components, which are created by VMware,
original equipment manufacturers, and third-party software providers. A component
is much like a bulletin with extra metadata containing the component name and
version. VMware bundles components together into fully functional ESXi images.
Original equipment manufacturers bundle components into add-ons that are deliv-
ered via the VMware online depot as offline bundles. Third-party vendors create
and ship drivers packaged as components.
vLCM can consume bulletins and components. It lists the available components
as bulletins when baselines are used to manage a host or cluster. When images are
used, vSphere Lifecycle Manager works only with components.
The ESXi base image, which is the ESXi image that VMware provides with each
release of ESXi, is a complete set of components that can boot up a server. A base
image has a friendly name, has a unique version that corresponds to the ESXi
release, and is hosted in the VMware online depot. Alternatively, you can download
an ESXi installer ISO file and an offline bundle (ZIP file) that contains the ESXi
version from my.vmware.com.
A vendor add-on is a collection of components that you can use to customize an
ESXi image with OEM content and drivers. You cannot use vendor add-ons on their
own. You can use a vendor add-on to add, update, or remove components that are
part of the ESXi base image. You can use the vSphere Client to view the list of
components that a vendor add-on adds to or removes from an ESXi base image.
Prior to vSphere 7.0, OEMs created custom images by merging their content with
the stock VMware-provided image. OEMs release custom images in accordance
with the major and update releases of vSphere. Starting with vSphere 7.0, in addi-
tion to releasing custom ISO images and offline bundles, OEMs can release ZIP
files that contain only the vendor add-on. This approach decouples the release cycle
of OEMs from the release cycle of VMware.
vLCM can consume software updates delivered as an online depot, as an offline
depot, or as an installable ISO image. An online depot is a hosted version of the soft-
ware updates. Starting with vSphere 7.0, the default, the VMware online depot pro-
vides vendor add-ons to hosts. The default depot also contains VMware-certified,
ESXi-compatible I/O device drivers. You can use the vSphere Client to access third-
party online depots containing additional components.
Chapter 13: Managing vSphere and vCenter Server 541
Offline bundles are ZIP files that contain the software metadata and the respec-
tive VIBs. Starting with vSphere 7.0, an OEM can distribute an add-on ZIP file
that contains the delta between the OEM custom image and the base image that
VMware provides.
A baseline is a set of bulletins. Patch baselines, extension baselines, and upgrade
baselines contain patch bulletins, extension bulletins, and ESXi images, respectively.
You can attach baselines to hosts, check compliance of a host with its associated
baseline, and remediate (update) hosts by using the baseline.
You can classify baselines based on the following:
■ Update type (such as patch baselines, extension baselines, and upgrade
baselines)
■ Content (such as fixed or dynamic)
■ Predefined, recommendation, or custom baselines
■ Predefined host patches (such as host security patches, critical host patches,
and non-critical host patches)
You cannot modify or delete the predefined baselines. You can use the predefined
baselines to create custom patch, extension, and upgrade baselines. Recommenda-
tion baselines are baselines generated automatically by vSAN. You can use recom-
mendation baselines only with vSAN clusters.
A baseline group is a set of non-conflicting baselines that you can apply as a single
entity. A host baseline group can contain a single upgrade baseline plus patch and
extension baselines. For efficiency, you can attach and apply baselines and baseline
groups to container objects (such as folders, vApps, and clusters) rather than to the
individual underlying objects (virtual machines and hosts).
To check a cluster’s compliance against an image, you can select the cluster, select
Updates > Hosts > Image, and click the Check Compliance button. When you check
a cluster’s compliance with a Lifecycle Manager image, one of the following four
compliance states is identified for each member host:
■ Compliant: The host’s image matches the image applied to the cluster.
■ Non-Compliant: The host’s image does not match the image applied to
the cluster. Some potential causes are differences in the ESXi version, the
firmware version, or the set of components. Another potential cause is that the
host contains a standalone VIB.
542 VCP-DCV for vSphere 8.x Cert Guide
The hardware support manager enables you to select a firmware add-on to include
in an image and the firmware versions to be installed on the hosts. During remedia-
tion, vSphere Lifecycle Manager requests the selected hardware support manager to
update the firmware on the hosts in accordance with the firmware add-on specified
in the image.
In vSphere 8.0, you can deploy hardware support manager plug-ins from Dell and
HPE. Dell’s plug-in, which you deploy as an appliance, is part of the Dell Open-
Manage Integration for VMware vCenter Server (OMIVV). HPE’s plug-in, which
you deploy as an appliance, is part of the HPE iLO Amplifier management tool. You
should follow the vendor’s specific deployment and configuration documentation.
These are the main steps:
Step 1. Deploy and power on the virtual appliance.
Step 2. Register the virtual appliance as a vCenter Server extension.
Step 3. Use the plug-in’s UI in the vSphere Client.
You can use the following procedure to manage the firmware on cluster member
hosts that are managed with a single image:
Step 1. In the vSphere Client, select the cluster in the inventory pane.
Step 2. Examine the cluster member hosts and verify that they are from the same
vendor.
Step 3. Select the cluster and click Updates > Hosts > Image.
Step 4. In the Image card, click Edit.
Step 5. In the Edit Image card, click Firmware and Drivers Addon > Select.
Step 6. In the dialog box, select a hardware support manager.
Step 7. Select a firmware add-on from the provided list and review the right
panel, which contains information such as whether the selected add-on
contains the necessary drivers for the ESXi versions in the cluster.
Step 8. Click Select.
Step 9. In the Image card, validate and save the image, which triggers a compli-
ance check against the new image.
Step 10. In the Image Compliance card, review the results.
544 VCP-DCV for vSphere 8.x Cert Guide
Step 11. If any host in the cluster has firmware that is non-compliant with the new
image firmware, remediate that host or the cluster, using the following steps:
a. Optionally, in the Image Compliance card, click Run Pre-check for
the cluster or for a selected host.
b. In the Image Compliance card, initiate remediation.
c. To remediate all hosts in the cluster, click the Remediate All button. If
the remediation of a single host fails, the remediation for the cluster is
aborted.
d. Alternatively, to remediate a single host, click the vertical ellipsis icon
for the host and select Remediate.
NOTE The host vendor must match the selected hardware support manager vendor.
Otherwise, a compliance check will report that the hosts are from a different vendor
or will report an incompatibility. Firmware remediation will fail.
NOTE If you intend to use the image in another vCenter Server, export it as a JSON
file and as a ZIP file. You can import both the JSON file and the ZIP file to the target
vCenter Server system.
You can use the same procedure to upgrade VMware Tools, except you should
choose Upgrade VMware Tools to Match Host in step 3. On the VMware Tools
page, you can choose Set Auto Update. Optionally, you can use a virtual machine’s
Updates tab to turn on the Automatically Upgrade on Reboot feature.
For more information concerning VMware Tools and virtual machine hardware,
such as procedures for interactive installation, host compatibility, and log levels, see
Chapter 14, “Managing Virtual Machines.”
Chapter 13: Managing vSphere and vCenter Server 547
You can use the vSphere Host Client interface to manage the host’s services. To get
started, log on to the vSphere Host Client as the root user or as another user with
local administrator privileges and navigate to Manage > Services. Here you can
examine the state of each ESXi service. To change the state of a service, right-click
on the service and select Start, Stop, or Reset. You can also change a service’s startup
policy such that it automatically starts with the host or associated firewall ports or is
only started manually, as illustrated in Figure 13-1. You can perform similar opera-
tions using the vSphere Client by selecting the host and navigating to Configure >
System > Services.
548 VCP-DCV for vSphere 8.x Cert Guide
To manage firewall rules on an ESXi host, you can select the host in the vSphere
Client and navigate to Configure > System > Firewall, as illustrated in Figure 13-2.
Here you can view the currently allowed incoming and outgoing firewall services.
The details for each service include the service name, the associated TCP ports,
the associated UDP ports, and the allowed IP addresses. To make changes, you can
use the Edit button to view all the currently defined services, select the services you
want to allow, and optionally restrict the available IP addresses for the service. To
perform similar operations in the vSphere Host Client, navigate to Networking >
Firewall Rules.
In the vSphere Client, you can right-click on a specific host and choose from a set
of available actions. For example, to address a vCenter Server connection to a host,
you can choose Connection > Disconnect, wait for the task to complete, and choose
Connection > Connect. To remove a host from the vCenter Server inventory, you
can first choose Enter Maintenance mode and then choose Remove from Inventory.
If you want to perform maintenance activities on a host, such as upgrading its hard-
ware, you can choose Maintenance Mode > Enter Maintenance Mode. Following
the completion of a maintenance activity, you can select Maintenance Mode > Exit
Maintenance Mode. To test a host’s ability to be used with Distributed Power Man-
agement (DPM), you can choose Power > Enter Standby Mode.
Chapter 13: Managing vSphere and vCenter Server 549
The following are some of the other options you can select for a host in the vSphere
client:
■ Certificates (for example, renewing certificates or refreshing CA certificates)
■ Host Profiles (including Attach, Detach, Extract, Change Host Profile, or
Remediate)
■ Export System Logs
■ Assign License
■ Settings
■ Move To
■ Add Permission
The “VIMTOP” and “vCenter Server Management” sections in Chapter 10, “Man-
aging and Monitoring Clusters and Resources,” provide information about monitor-
ing the resource usage of the services and database running in the vCenter Server
Appliance. If database resources are low, you can consider adjusting the statistics
interval, statistics level, task retention, and event retention settings. If you determine
that the appliance is low on disk space, you can add more space. To increase the
disk space for a vCenter Server Appliance 7.0 and later, you can use the following
procedure:
Step 1. Use the vSphere Client (or Host Client) to navigate the vSphere environ-
ment that is hosting the vCenter Server Appliance.
Step 2. Select the vCenter Server Appliance (virtual machine), edit its settings,
and increase the virtual disk size.
Step 3. Use SSH to connect to the vCenter Server as the root user.
Step 4. Run the following command:
com.vmware.appliance.system.storage.resize
Optionally, to see the impact of the command, you can use the following command
to examine the total and used storage (in kilobytes) before and after step 4:
com.vmware.appliance.version1.resources.storage.stats.list
NOTE If you want to keep a complete history of tasks and events for your vCenter
Server, do not use the database retention options.
NOTE If you are using Internet Explorer, verify that TLS 1.0, TLS 1.1, and TLS 1.2
are enabled in the security settings.
After logging in to the VAMI as root, you can perform any of the tasks described in
Table 13-6.
Chapter 13: Managing vSphere and vCenter Server 551
Task Steps/Details
Configure network 1. Click Networking.
settings for vCenter
2. Click Edit and fill in the following networking details:
Server
■ DNS settings
■ IPv4 settings
■ IPv6 settings
■ Proxy server settings
When configuring a proxy server, you can enable HTTPS, FTP, and
HTTP options. You should provide the proxy server’s IP address or host
name, user credentials, and a port number.
Configure the 1. Click Firewall.
firewall rules for the
2. Examine the existing set of rules and choose from the following
vCenter Server
commands to change the rule set.
■ Add
■ Edit
■ Delete
■ Reorder
3. For each rule, include the appropriate NIC, IP address, subnet, and
action (Accept, Ignore, Reject, or Return).
Configure the time 1. Click Time.
settings for the
2. Click Time Zone > Edit and select the appropriate time zone.
vCenter Server
3. Click Time Synchronization > Edit and select Mode to Disable,
Host, or NTP.
Start, stop, and 1. Click Services
restart a service in the
2. Select a service and click Start, Stop, or Restart.
vCenter Server
Configure settings 1. Click Update.
for updating vCenter
2. Click Settings, set the options for automatic update checking, and
Server
set the repository to the default or to a custom (HTTPS or FTPS)
URL. Optionally provide credentials if a custom repository is used.
3. Click Check Updates to manually check for updates.
Change the root user 1. Click Administration.
password in vCenter
2. Click Password > Change. Set the password and the password
Server
expiration details. If you set the password to expire, provide the
number of days and an address for the email warning.
Chapter 13: Managing vSphere and vCenter Server 553
Task Steps/Details
Configure log 1. Click Syslog.
forwarding on the
2. Click Configure (or Edit, if you previously configured syslog
vCenter Server
hosts), enter up to three destination hosts in the Create Forward
Configuration pane, and set the protocol and port.
3. Select one of the following protocol options:
■ TLS: Transport Layer Security
■ TCP: Transmission Control Protocol
■ RELP: Reliable Event Logging Protocol
■ UDP: User Datagram Protocol
Configure and 1. Click Backup.
schedule backups of
2. Click Backup > Backup Now to initiate a backup or click
the vCenter Server
Backup > Configure to schedule backups.
3. Use the Activity table to monitor backups.
Table 13-7 describes the possible colors (icons) for the Health Status badge.
NOTE When responding to an alert, you should begin by examining the details in
the Health Messages pane.
You can use the following procedure to reconfigure the FQDN, IP address, or pri-
mary network identifier (PID) of the vCenter Server:
Step 1. Log in to the VAMI using your administrator SSO credentials.
Step 2. Select Networking > Network Settings > Edit.
554 VCP-DCV for vSphere 8.x Cert Guide
NOTE If you set an IP address as a system name during the deployment of the appli-
ance, you can later change the primary network identifier to a fully qualified domain
name. If vCenter High Availability (HA) is enabled, you must disable the vCenter HA
setup before reconfiguring the primary network identifier.
The default statistics level for all statistical intervals is 1. You can set the statistics
level to a value between 1 and 4, inclusive. The lower the level, the smaller the
number of statistics counters used. Level 4 uses all statistics counters, but it is typi-
cally used only for debugging purposes. When setting a statistics level for a specific
statistics interval, you must use a value less than or equal to the statistics level for the
preceding statistics interval. Table 13-10 provides a summary of the metrics that are
included for each statistics level.
560 VCP-DCV for vSphere 8.x Cert Guide
NOTE If you increase the collection level, you may need to allocate more storage
and system resources to avoid a decrease in performance.
Chapter 13: Managing vSphere and vCenter Server 561
NOTE Other staging options include Stage and Install, Unstage, and Resume.
If you choose to use the Check URL option, the vCenter Server uses the configured
VMware repository URL. The default VMware repository URL requires Internet
access. If your vCenter Server is not connected to the Internet or if required by your
security policy, you can configure a custom repository URL for your vCenter Server
patches by using the following procedure:
Step 1. Download the vCenter Server Appliance patch ZIP file from VMware’s
website (https://my.vmware.com/web/vmware/downloads).
Step 2. On a local web server, create a repository directory under the root.
Step 3. Extract the ZIP file into the repository directory.
Step 4. Log on to the VAMI as root.
Step 5. Select Update > Settings.
Step 6. Set the Repository settings: Choose use specified repository, provide
the URL and (optionally) the user credentials.
Step 7. Click OK.
After staging the patches to the vCenter Server, you can install the patches by using
the following procedure:
Step 1. Log on to the VAMI as root.
Step 2. Ensure that the patches are staged or use the staging procedure, but for
the staging options, select Stage and Install.
Step 3. Click Update.
Step 4. Select the range of patches to apply and click Install.
Step 5. Read and accept the end-user license agreement (EULA).
Step 6. Wait for the installation to complete and then click OK.
Step 7. If a reboot is required, click Summary > Reboot.
NOTE You should perform the previous procedure only during a maintenance
period because the services provided by the vCenter Server become unavailable dur-
ing the patch installation. As a precaution, you should also back up the vCenter Server
prior to patching.
Chapter 13: Managing vSphere and vCenter Server 563
Purpose Command/Utility
Install patches directly from the configured software-packages install --url
repository URL
Install patches directly from a repository URL software-packages install --url
that is not currently configured in the vCenter URL_of_the_repository
Server
Reboot the vCenter Server following a patch shutdown reboot -r “patch reboot”
installation
NOTE To stage only third-party patches, include the --thirdParty option with
the software-packages stage command. To directly accept the EULA, include the
--acceptEulas option.
You can use the following procedure to perform backup and restore operations on a
vCenter HA cluster:
Step 1. Use the Active node’s VAMI to obtain a file-based backup of the Active
vCenter Server node. (Do not back up the Passive node or Witness node.)
Step 2. Before you begin the restore operation, power off and delete all vCenter
HA nodes and remove the cluster configuration.
Step 3. Restore the Active node from the backup. The Active node is restored as a
standalone vCenter Server.
Step 4. Reconfigure vCenter HA.
Before Repointing
Domain1.local Domain2.local
After Repointing
Domain2.local
Figure 13-4 illustrates a vCenter Server (Node A) being repointed from a multi-
node domain to an existing domain.
566 VCP-DCV for vSphere 8.x Cert Guide
Before Repointing
Domain1.local Domain2.local
After Repointing
Domain1.local Domain2.local
Figure 13-5 illustrates a vCenter Server (Node A) being repointed from a multi-
node domain to a new domain that is created with the repoint command.
Before Repointing
Domain1.local
After Repointing
Domain2.local Domain1.local
If the source domain contains multiple (linked) vCenter Servers, then the repointing
process involves additional steps to shut down the vCenter Server and unregister it
from the source domain. If the vCenter Server is repointed to a new domain, you do
not need to run a precheck or supply the replication partner parameters. Repointing
Chapter 13: Managing vSphere and vCenter Server 567
is only supported with vCenter Server 6.7 Update 1 and later. You should back up
each node prior to repointing.
To repoint a vCenter Server to another domain, you can use the following
procedure:
Step 1. If multiple vCenter Servers exist in the source domain:
a. Shut down the chosen vCenter Server.
b. To unregister the chosen vCenter Server from the source domain, log
in to one of the other nodes in the source domain and run the fol-
lowing command, where username and password are credentials for the
source SSO domain administrator account:
cmsso-util unregister --node-pnid Target_vCenter_FQDN
--username --passwd password
Step 4. Run the following execute command, which applies any precheck data
and either repoints the chosen vCenter Server to the existing domain or
creates a new domain for repointing:
cmsso-util domain-repoint -m execute --src-emb-admin
Administrator --replication-partner-fqdn Replication_
Partner_FQDN --replication-partner-admin Existing_Domain_
Admin --dest-domain-name Existing_Domain
If the chosen vCenter Server is being pointed to a new domain, you do
not need to supply the replication partner parameters.
Chapter 13: Managing vSphere and vCenter Server 569
Review Questions
1. You need to restore the vCenter Server from a file-based backup. Which of the
following will not be restored?
a. Resource pool hierarchy and setting
b. vSphere DRS cluster state
c. Cluster-host membership
d. vSphere DRS configuration and rules
3. You are configuring remediation setting for Lifecycle Manager. Which of the
following settings is available only when working with baselines?
a. PXE Booted Hosts and Removable Media Devices
b. Quick Boot and VM Power State
c. VM Migration and Admission Control
d. VM Migration and Maintenance Mode Failures
Chapter 13: Managing vSphere and vCenter Server 571
4. Your vCenter Server is offline, and the distributed switch for an ESXi host
management network is not functioning. Which of the following steps might
fix the ESXi management connectivity?
a. Use the vSphere Host Client to restart ESXi networking.
b. Use the vSphere Client to restart ESXi networking.
c. Use SSH to restart ESXi networking.
d. In the DCUI, select Restore Standard Switch.
5. You are repointing a vCenter Server to an existing domain. In which of the fol-
lowing scenarios would you need to run a precheck?
a. Multiple vCenter Servers exist in the target domain.
b. Multiple vCenter Servers exist in the source domain.
c. A single vCenter Server exists in the target domain.
d. A single vCenter Server exists in the source domain.
This chapter covers the following topics:
Table 14-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Questions
Creating and Configuring Virtual Machines 1–3
Managing Virtual Machines 4–6
Advanced Virtual Machine Management 7, 8
Content Libraries 9, 10
1. You are creating a virtual machine in your vSphere 8.0 environment, and
you want the virtual disk and NVDIMM devices to share the same PMem
resources. Which of the following options should you choose?
a. In the Memory settings, select PMem.
b. In the Memory settings, select Standard.
c. In the Storage Type settings, select PMem.
d. In the Storage Type settings, select Standard.
574 VCP-DCV for vSphere 8.x Cert Guide
2. You want to change the logging for the VMware Tools installation, such that
vminst.log is sent to the host but vmmsi.log remains in the virtual machine.
Which option should you choose?
a. vmx.log.guest.level = “warning”
b. vmx.log.guest.level = “info”
c. vmx.log.guest.level = “verbose”
d. vmx.log.guest.level = “trivia”
3. You want to deploy new virtual machines using linked clones. Which of the
following should you use?
a. vSphere API
b. vSphere Client
c. vSphere Host Client
d. vCenter Management Interface
4. You are updating a virtual machine and want to use hardware Version 14.
Which of the following compatibility settings should you choose?
a. ESXi 7.0 and later
b. ESXi 6.7 Update 2 and later
c. ESXi 6.7 and later
d. ESXi 6.5 and later
5. You want to control the host compatibility for your virtual machines at vari-
ous levels of the inventory. On which of the following objects can you set the
Default VM Compatibility option?
a. Cluster
b. VM folder
c. Virtual machine
d. Template
6. Which option should you choose to minimize the time required to create a
virtual machine snapshot?
a. Snapshot the memory and quiesce the file system
b. Snapshot the memory but do not quiesce the file system
c. Quiesce the file system but do not snapshot the memory
d. Do not quiesce the file system or snapshot the memory
Chapter 14: Managing Virtual Machines 575
8. You are considering whether to use vGPUs for some of the virtual machines in
your vSphere environment. Which of the following is not a common use case
for vGPUs?
a. Fast provisioning
b. High-end graphics in VDI
c. Machine learning
d. Artificial intelligence
9. You are setting permissions for a vCenter Server. You want to ensure that a
specific user can manage the vCenter Server’s content libraries and content but
can only view content libraries belonging to other vCenter Servers. Which set-
tings should you make?
a. Grant the read-only role as a global permission and the administrator
role on the vCenter Server.
b. Grant the content library administrator role as a global permission and
the administrator role on the vCenter Server.
c. Grant just the administrator role on the vCenter Server.
d. Grant just the content library administrator role on the vCenter Server.
10. You want to add items to the content library. Which of the following is not a
valid choice?
a. You can import a vApp.
b. You can select a virtual machine and choose Clone to Template in
Library.
c. You can import an ISO.
d. You can migrate a virtual machine to the library.
576 VCP-DCV for vSphere 8.x Cert Guide
Foundation Topics
To create a virtual machine, you can use the New Virtual Machine wizard and select
Create a New Virtual Machine. In the wizard, you should provide all required infor-
mation, including compute resource (host, cluster, resource pool, or vApp), storage
type and location, virtual machine compatibility, guest OS, Windows virtualization-
based security (for a Windows virtual machine), and hardware customization.
When selecting the storage type on a host that has PMem memory, you can select
either the Standard or PMem radio button. If you chose PMem storage for a virtual
machine, its default virtual disk, new virtual disk, and NVDIMM devices share the
same PMem resources. You should adjust the size of newly added devices. The
wizard alerts you if issues exist.
Powering On a VM
To power on a virtual machine from the vSphere client, you can right-click the vir-
tual machine and choose Power On. The following are some likely causes of power-
on failures:
■ The evaluation period (or license) has expired.
■ Permissions are insufficient.
■ There is insufficient storage space to create files, such as the swap file.
■ The assigned MAC address conflicts with VMware reserved MAC addresses.
■ The operation would violate admission control.
Opening a Console to a VM
To open a console to a virtual machine, you can use an integrated web-based console
or the independent VMware Remote Console (VMRC). To use the integrated web-
based console, you should ensure that the virtual machine is powered on, select it in
the inventory pane, and either choose Launch Web Console in the vSphere Client
or Open Browser Console in the vSphere Host Client.
To use the VMRC to access a virtual machine, you should first ensure that it is
installed on your local system and, if necessary, prepare a proxy server. Then you
can launch it from the vSphere Client or the vSphere Host Client. In the vSphere
Client, select the virtual machine in the inventory pane and select Summary >
Launch Remote Console. In the vSphere Host Client, select the virtual machine in
the inventory pane and select Console > Launch Remote Console.
578 VCP-DCV for vSphere 8.x Cert Guide
To configure a proxy server for VMware Remote Console, you can browse to
vmrc://settings or use the menu if VMware Remote Console is already open. Then
choose Preferences in the appropriate menu:
■ Windows: Select VMRC > Preferences.
■ macOS: Select VMware Remote Console > Preferences.
■ Linux: Select File > Remote Console Preferences.
The main steps are to select the Enable Proxy for Remote Virtual Machine option
and to set the appropriate settings, such as the proxy server’s host name or IP (IPv4
or IPv6) address and port, and optionally provide user credentials. The specific steps
depend on the OS type (Windows, Linux, or macOS).
NOTE The open source implementation of VMware Tools for Linux is Open VM
Tools.
Previous versions of vSphere allow you to use Update Manager to upgrade virtual
machine hardware and VMware Tools. In vSphere 7.0 and later, you can use the
vSphere Client directly to upgrade the hardware and VMware Tools for a set of vir-
tual machines in a container, such as a folder or cluster, as described in the “Upgrad-
ing Virtual Machines” section in Chapter 13, “Managing vSphere and vCenter
Server.”
VMware Tools Lifecycle Management provides a simplified and scalable approach
for installing and upgrading VMware Tools. You can configure your virtual machine
to automatically check for and apply VMware Tools upgrades each time you power
on your virtual machine. Automatic Tools upgrades are not supported for Solaris or
Netware guests. The prerequisites for automatic VMware Tools upgrades are that
the virtual machines must be hosted by ESX/ESXi 3.5 or later, must be managed by
vCenter Server 3.5 or later, must be using VMware Tools shipped with ESX/ESXi
3.5 or later, and must be running a guest OS that is supported for ESX/ESXi 3.5 and
vCenter Server 3.5 or later.
You can set the vmx.log.guest.level option as described in Table 14-2 to control the
use of log files for VMware Tools installation.
When using the setup.exe command to install VMware Tools, you can use the
/mg or “LOGMODE=G” options to control and suppress logging to the host. To
suppress logging during automatic upgrades, you can set the install-vmxGuestLog
Disabled parameter to true in the tools.conf file. To use the tools.conf file in some
versions of Windows, you might need to create the file and deal with a hidden
application data or program data file. To do so, you could open a text editor (such as
Notepad) using Run as Administrator. If you change the tools.conf file, you do not
580 VCP-DCV for vSphere 8.x Cert Guide
need to restart VMware Tools. By default, the Tools service checks the configuration
file for changes every 5 seconds.
To clone a virtual machine to a template, in the vSphere client, right-click the virtual
machine, select Clone > Clone as Template, and complete the wizard. In the wizard,
provide a template name, folder, compute resource, and datastore.
NOTE You cannot change the storage policy if you clone an encrypted virtual
machine.
You can clone a virtual machine to a create a new virtual machine. The following
privileges are required to clone a virtual machine to create a new virtual machine:
■ Virtual Machine.Provisioning.Clone Virtual Machine on the virtual machine
you are cloning
■ Virtual Machine.Inventory.Create from Existing on the data center or virtual
machine folder
■ Virtual Machine.Configuration.Add New Disk on the data center or virtual
machine folder
Chapter 14: Managing Virtual Machines 581
You can clone a virtual machine to create a new virtual machine by right-clicking the
virtual machine and selecting Clone > Clone to Virtual Machine. In the wizard, you
should provide all the required information, such as name, compute resource, com-
patibility, and storage. The procedure is much like the procedure in the “Deploy-
ing a Virtual Machine from a Template” section, later in this chapter, including the
option to customize the guest OS.
NOTE You cannot use the vSphere Client to clone a virtual machine using linked
clones or instant clones. You can do so with API calls.
If the source virtual machine has an NVDIMM device and virtual PMem hard disks,
the destination host or cluster must have an available PMem resource. If the virtual
machine has virtual PMem hard disks but does not have an NVDIMM device, the
destination host or cluster must have an available PMem resource. Otherwise, all
hard disks of the destination virtual machine use the storage policy and datastore
selected for the configuration files of the source virtual machine.
To deploy a virtual machine from a template, in the vSphere client, right-click the
template and select Clone Deploy from Template. In the wizard, you should provide
all required information, such as name, compute resource, compatibility, storage,
and guest customization options. The guest customization choices are Select an
Existing Specification, Create a Specification, and Create a Specification from an
Existing Application.
operation, you can provide the customization settings or select a prebuilt customiza-
tion specification.
Guest OS customization requires a supported guest OS installed on SCSI node 0:0
and VMware Tools. Windows guest customization requires ESXi Version 3.5 or
later. Linux guest customization requires Perl in the guest OS. To customize a Linux
guest OS, you need to install VMware Tools 10.10.10 or later and enable the enable-
custom-scripts option (which is disabled by default).
Optionally, you can create a custom application for vCenter Server to use to gener-
ate computer names and IP addresses during guest customization. To do so, create
a custom script based on the sample reference script (sample-generate-name-ip.
pl) found at https://kb.vmware.com/s/article/2007557 and configure the associated
vCenter Server advanced settings. For example, set config.guestcust.name-ip-gen-
erator.program to c:\perl\bin\perl.exe and set config.guestcust.name-ip-generator.
arg1 to c:\sample-generate-name-ip.pl.
You can use the following procedure to create a guest customization specification for
Linux:
Step 1. In the vSphere Client, navigate to Menu > Policies and Profiles > VM
Customization Specifications.
Step 2. Click the Create a New Specification icon.
Step 3. On the Name and Target OS page, enter a name and a description for the
customization specification, select Linux as the target guest OS, and click
Next.
Step 4. On the Computer Name page, configure one of the following options in
order to assign the computer name:
■ Use the Virtual Machine Name
■ Enter a Name in the Clone/Deploy Wizard
■ Enter a Name (For this option, enter a name in the provided box and
optionally select the Append a Numeric Value checkbox.)
■ Generate a Name Using the Custom Application Configured with
vCenter Server (For this option, optionally enter a parameter to pass
to the application.)
Step 5. Enter the domain name and click Next.
Step 6. Select the time zone and click Next.
584 VCP-DCV for vSphere 8.x Cert Guide
To create a guest customization specification for Windows, you can use the previous
procedure with the following modifications:
■ On the Name and Target OS page, select Windows as a target guest OS and
optionally select Generate a New Security Identity (SID).
■ On the Set Registration Information page, enter the virtual machine owner’s
name and organization and click Next.
■ On the Windows License page, provide a Windows product key. For a Win-
dows Server specification, either select the Per Seat option or configure the
maximum concurrent connections for the Per Server option. Click Next.
■ On the Set Administrator Password page, configure the password, optionally
select Automatically Logon as Administrator, and click Next.
■ On the Networking page, if you choose Manually Select Custom Settings, use
the DNS tab to provide DNS server details and click WINS to provide WINS
details.
■ On the Set Workgroup or Domain page, either provide a workgroup name or
provide user credentials and a domain name and click Next.
import guest customization specifications. You can also select a particular specifica-
tion and select one of the following actions:
■ Edit Customization Spec
■ Duplicate Customization Spec
■ Export Customization Spec
■ Delete Customization Spec
Step 5. Complete the wizard by providing typical details for a new vir-
tual machine, such as storage policy, storage location, and network
configuration.
Step 6. Optionally, customize the deployment properties on the Customize
Template page.
Step 7. Optionally, select a binding service provider on the vService Bindings
page.
Step 8. On the Ready to Complete page, click Finish.
The compatibility setting impacts the supported features for the virtual machine.
Table 14-4 lists some of the feature sets available in recent hardware versions.
To control the default hardware compatibility for new virtual machines, you can set
the Default VM Compatibility setting at the host, cluster, or data center level. The
settings on a host override the settings on a cluster, which override the settings on
the data center. To make the settings on a host or cluster, you must have the Host.
Inventory.Modify Cluster privilege. To make the settings on a data center, you must
have the Datacenter.Reconfigure Datacenter privilege.
You can upgrade the compatibility level of an existing virtual machine but should
first upgrade VMware Tools. For example, you can select a virtual machine and use
the Compatibility > Schedule VM Compatibility Upgrade option to upgrade the
compatibility the next time you restart the virtual machine. Optionally, you can
select Only Upgrade After Normal Guest OS Shutdown to upgrade compatibility
during regularly scheduled guest maintenance.
You can change the number of virtual CPUs used by a virtual machine. Specifically,
you can set the number of cores and the number of cores per socket. In ESXi 8.0,
the maximum number of virtual CPU sockets is 128. To configure a virtual machine
with more than 128 virtual CPUs, you must use multicore virtual CPUs.
By default, you cannot add CPU resources to a virtual machine when it is turned
on. To change this behavior, you can enable the virtual machine’s CPU hot adding
option, but the following conditions apply:
■ For best results, set virtual machine compatibility to ESXi 5.0 or later.
■ Hot adding multicore virtual CPUs requires compatibility set to ESXi 5.0 or
later.
■ You can use hot adding to increase the number of virtual CPUs for a virtual
machine that already has more than 128 virtual CPUs.
■ You can disable hot adding for virtual machines with guest operating systems
that do not support CPU hot adding.
■ For virtual machines with compatibility set to ESXi 4.x and later, to support
CPU hot adding, set Number of Cores per Socket to 1.
■ Hot adding CPU resources to a virtual machine disconnects and reconnects all
USB passthrough devices.
Chapter 14: Managing Virtual Machines 589
CPU identification (CPU ID) masks control the visibility of CPU features to the
guest OS. Masking CPU features can impact a virtual machine’s availability for
migration using vMotion. For example, if you mask the AMD No eXecute (NX)
or the Intel eXecute Disable (XD) bits, you prevent the virtual machine from using
those features, but you allow the virtual machine to hot migrate to hosts that do not
include this capability.
NOTE Changing the CPU compatibility masks can result in an unsupported con-
figuration. Do not manually change the CPU compatibility masks unless instructed to
do so by VMware Support or a VMware Knowledge Base article.
You can change a virtual disk from the thin format to thick format by navigating to
Datastore > Files in the vSphere Client and choosing the Inflate action for the vir-
tual disk file. The vSphere Client does not provide a deflate option. To change a vir-
tual disk provisioning type from thick to thin, you can migrate the virtual machine
storage and select the appropriate policy.
Creating and growing a virtual disk provisioned for thick provisioned eager zeroed
may take significantly longer than with a virtual disk provisioned for thick provi-
sioned lazy zeroed.
You can configure virtual machines with virtual disks greater than 2 TB (large-
capacity virtual disks), but you must meet resource and configuration requirements.
The maximum size for large-capacity virtual disks is 62 TB. You should avoid using
the maximum size because some operations, such as those involving snapshots and
linked clones, may not finish when the maximum amount of disk space is allocated
to a virtual disk. Operations such as snapshot quiescence, cloning, Storage vMotion,
and vMotion in environments without shared storage can take significantly longer
to finish. The following conditions and limitations apply to virtual machines with
large-capacity disks:
■ You must use a guest OS that supports large-capacity virtual hard disks.
■ Target hosts for migration and cloning operations must use ESXi 6.0 or later.
■ NFS, vSAN, and VMFS Version 5 or later datastores are supported.
■ Fault Tolerance is not supported.
■ BusLogic Parallel controllers are not supported.
To increase the size of a virtual disk, you need the following privileges:
■ Virtual Machine.Configuration.Modify Device Settings on the virtual machine
■ Virtual Machine.Configuration.Extend Virtual Disk on the virtual machine
■ Datastore.Allocate Space on the datastore
To control how a virtual disk is impacted by snapshots, you can set the disk mode for
a virtual disk to the settings described in Table 14-6.
You can set shares for a virtual disk, and they work much like CPU or memory
shares for a virtual machine. The disk shares provide a relative priority for access-
ing the disk during periods of disk I/O contention for the underlying storage. The
values Low, Normal, High, and Custom are compared to the sum of all shares of all
virtual machines on the host. To control the maximum amount of disk I/O for a vir-
tual disk, you can set the virtual disk’s Limit–IOPS value. By default, the virtual disk
is set for normal shares and unlimited IOPS.
You can add virtual disks to virtual machines, including new virtual disks, existing vir-
tual disks, and raw device mappings (RDMs). To add an RDM to a virtual machine,
you need to use an account with the Virtual Machine.Configuration.Configure Raw
Device privilege, select a target LUN, choose where to store the mapping file, choose
a compatibility mode (physical or virtual), and select a disk mode. Disk modes are not
available for RDMs using physical compatibility mode.
A storage controller is included by default when you create a virtual machine.
You can add additional SCSI controllers (BusLogic Parallel, LSI Logic Parallel,
LSI Logic SAS, and VMware Paravirtual SCSI), AHCI, SATA, and NVM Express
(NVMe) controllers. The following limitations apply to storage controllers:
■ ESXi 4.x and later compatibility is required for LSI Logic SAS and VMware
Paravirtual SCSI.
■ ESXi 5.5 and later compatibility is required for AHCI SATA.
■ ESXi 6.5 and later compatibility is required for NVMe.
■ BusLogic Parallel controllers do not support large-capacity disks.
■ Disks on VMware Paravirtual SCSI controllers may not provide the expected
performance if they have snapshots or if the host’s memory is overcommitted.
Before changing the storage controller type, you should ensure that the guest OS
has the drivers for the target controller type, or the disks will become inaccessible.
Likewise, in the following cases, adding storage controller types to a virtual machine
that uses BIOS firmware may cause boot problems and require you to fix the issue
by entering the BIOS setup:
592 VCP-DCV for vSphere 8.x Cert Guide
■ If the virtual machine boots from LSI Logic SAS or VMware Paravirtual
SCSI, and you add a disk that uses BusLogic, LSI Logic, or AHCI SATA
controllers
■ If the virtual machine boots from AHCI SATA, and you add BusLogic Parallel
or LSI Logic controllers
NOTE Adding additional disks to virtual machines that use EFI firmware does not
cause boot problems.
A virtual machine name must be unique within the folder where the virtual machine
is located. If you move a virtual machine to a different datastore folder or host
that already has a virtual machine of the same name, you must change the virtual
Chapter 14: Managing Virtual Machines 593
machine’s name to keep it unique. Changing a virtual machine name impacts how
the virtual machine is identified by vCenter Server and does not impact file (or
folder) names or the guest OS. After changing a virtual machine name, you can
leverage Storage vMotion to migrate the virtual machine, which renames the associ-
ated files to match the new virtual machine name.
You can encrypt a virtual machine by editing its storage policies or by editing
VM Options. Before encrypting a virtual machine, you must meet the following
prerequisites:
■ Establish a trusted connection with the KMS and select a default KMS.
■ Create an encryption storage policy (or plan to use the sample VM encryption
policy).
■ Ensure that the virtual machine is powered off.
■ Verify that you have the required privileges:
■ Verify that you have the Cryptographic Operations.Encrypt New
Privilege.
■ If the host encryption mode is not enabled, verify that you have the
Cryptographic Operations.Register Host privilege.
To take a snapshot, in the vSphere client, you can right-click a virtual machine,
select Snapshots > Take Snapshot, and provide a snapshot name. Optionally, you can
provide a snapshot description and select Snapshot the Virtual Machine’s Memory.
Also, you can optionally choose Quiesce Guest File System. Quiescing the file sys-
tem requires the virtual machine to be powered on, VMware Tools to be running,
and Snapshot the Virtual Machine’s Memory to be deselected.
NOTE To minimize the impact to a running virtual machine and to reduce the time
required to take a snapshot, do not snapshot the memory state or quiesce the guest
file system.
After creating a snapshot, you can use the Snapshot Manager to view the snapshot
hierarchy of the virtual machine, which appears as a tree with branches, as illustrated
in Figure 5-2 in Chapter 5, “vCenter Server Features and Virtual Machines.” To
open the Snapshot Manager from the vSphere client, right-click the virtual machine
and choose Snapshots > Manage Snapshots. In the Snapshot Manager, the snapshot
that appears above the You Are Here icon is the parent snapshot. If you revert to a
snapshot, that snapshot becomes the parent snapshot. If you take a snapshot of a
virtual machine that already has at least one snapshot, the new snapshot is a child of
the parent snapshot.
To revert a virtual machine to a specific snapshot, select the snapshot in the Snap-
shot Manager for the virtual machine and select Revert To. To do this, you must
have the Virtual Machine.Snapshot Management.Revert to Snapshot privilege on
the virtual machine.
When you revert the virtual machine to a snapshot, you return its virtual disks and
settings to the state captured in the snapshot. If the snapshot includes the memory
state, reverting to the snapshot returns the virtual machine’s memory to that state.
You can revert the virtual machine to any available snapshot in the Snapshot Man-
ager. Subsequent snapshots from this point create a new branch of the snapshot tree.
596 VCP-DCV for vSphere 8.x Cert Guide
When you revert to a snapshot, no snapshots are removed, but you lose the virtual
machine’s current disk state. In other words, all changes to disk data made since the
last snapshot are permanently lost. If you revert to a snapshot without memory state,
the virtual machine is in the powered-off state.
You can delete a snapshot for a running virtual machine without disrupting its end
users. Deleting a snapshot removes your ability to revert to that snapshot’s state in
the future. To delete a specific snapshot, select the snapshot in the Snapshot Man-
ager for the virtual machine and select Delete. Optionally, to delete all snapshots,
select Delete All.
If the virtual machine is in a state where it has no snapshots but has one or more
delta disks contributing to the active state of the virtual machine, then the vSphere
Client may provide a “Consolidation Needed” warning. In this state, you can right-
click the virtual machine in the vSphere client and select Snapshots > Consolidate.
The system merges the data from delta disks into the base disks and deletes the delta
disks. In normal conditions, your virtual machine is in a state where the Consolidate
option is not available.
To perform a hot cross-host (vMotion) migration, you can apply the previous cold
migration procedure with the following changes:
■ Start with a powered-on virtual machine.
■ Select to change the compute resource only.
■ You are not prompted to select a destination datastore.
■ Select either Schedule vMotion with High Priority or Schedule Regular
vMotion.
To perform a hot cross-data store (Storage vMotion) migration, you can apply the
previous cold migration procedure with the following changes:
■ Start with a powered-on virtual machine.
■ Select to change storage only.
■ You are not prompted to select a destination host.
To perform a hot cross-host and cross-data store (vMotion without shared storage)
migration, you can apply the previous cold migration procedure with the following
changes:
■ Start with a powered-on virtual machine.
■ Select to change both the compute resource and storage.
598 VCP-DCV for vSphere 8.x Cert Guide
Virtualization-Based Security
Starting with vSphere 6.7, you can enable Microsoft virtualization-based security
(VBS) on supported Windows guest operating systems. VBS is a Microsoft feature
for Windows 10 and Windows Server 2016 operating systems that uses hardware
and software virtualization to enhance system security by creating an isolated,
Chapter 14: Managing Virtual Machines 599
In many cases, you need to change the execution policy, which by default is set to the
most secure policy (Restricted). For example, to change the policy to RemoteSigned,
you can use the following command:
Set-ExecutionPolicy RemoteSigned
To start a virtual machine named win-01, you can use the following commands:
Get-VM win-01 | Start-VM
You can use PowerCLI to create virtual machines from specifications provided in an
XML file. The XML content could provide detailed specifications for multiple vir-
tual machines. For example, you can use the following sample XML content, which
represents the minimum specifications for two virtual machines named MyVM1 and
MyVM2, each having a 100 GB virtual disk:
<CreateVM>
<VM>
<Name>MyVM1</Name>
<HDDCapacity>100</HDDCapacity>
</VM>
<VM>
<Name>MyVM2</Name>
<HDDCapacity>100</HDDCapacity>
</VM>
</CreateVM>
If you save the sample content to a file named MyVMs.xml, you can use the follow-
ing commands to read the file, parse the XML content into a variable, and create a
virtual machine based on each specification:
[xml]$s = Get-Content myVM.xml
$s.CreateVM.VM | foreach {New-VM -VMHost $vmHost1 -Name $_.Name
-DiskGB $_.HDDCapacity}
You can use PowerCLI to migrate virtual machines. Consider a scenario where
you need to automate frequent, massive migrations of virtual machines between
Chapter 14: Managing Virtual Machines 601
datastores to prepare for storage array upgrades. At the lowest level, you need a
command that migrates a virtual machine to a specified datastore. For example, you
can use the following command to migrate a virtual machine named MyVM1 to a
datastore named DS2:
Get-VM MyVM1 | Move-VM -Datastore DS2
For the VMware Horizon VDI use case, depending on your hardware, you may have
multiple options for sharing GPUs. For example, with NVIDIA hardware, you can
choose to share GPUs using the NVIDIA vGPU (GRID) technology or the Virtual
Shared Graphics Acceleration (vSGA) technology. In the vSGA model, the vSphere
hypervisor presents a virtual VMware SVGA 3D GPU to each virtual machine. In
the GRID model, each hardware GPU presents multiple virtual GPUs that the
hypervisor passes through to the virtual machines. In the GRID model, you can
use a vGPU profile to assign a portion of the GPU hardware to a virtual machine.
602 VCP-DCV for vSphere 8.x Cert Guide
The vSGA model tends to be flexible and cost-effective for supporting virtual desk-
tops running office, video, and 2D CAD applications. But the performance of the
GRID model may be preferred for virtual desktops running 3D modeling software.
For a side-by-side comparison of the vSGA and GRID models, see Figure 14-1.
vSGA GRID
VM VM VM VM
VMware VMware VMware VMware
GPU GPU GPU GPU
Driver Driver Driver Driver
vGPU vGPU
GPU Grid GPU
The procedure to configure the GPU hardware, ESXi host, and virtual machine
depends on your choice for GPU configuration. For example, you can use the fol-
lowing procedure to implement the GRID model using a vGPU profile (named
grid_p100-8a) to allow a virtual machine to use up to 8 GB of the GPU’s memory:
Step 1. Obtain the NVIDIA vGPU software and license.
Step 2. In the vSphere Client, select the ESXi host in the inventory pane and
navigate to Configure > Hardware > Graphics > Host Graphics.
Step 3. Click Edit.
Step 4. Select the Shared Direct (Vendor Shared Passthrough Graphics)
option.
Step 5. Reboot the host and enter Maintenance Mode.
Step 6. In the ESXi Shell, enter the following command but replace the path
with the actual path to the downloaded VIB file:
esxcli software vib install -v /vmfs/volumes/ARL-ESX14-
DS1/ NVIDIA/NVIDIA-VMware_ESXi_6.7_Host_Driver_390.42-1OEM.
670.0.0.7535516.vib
Chapter 14: Managing Virtual Machines 603
Content Libraries
This section provides details for implementing and using content libraries to
provide templates, ISOs, and other content across multiple vCenter Servers in a
vSphere environment.
In addition, you must have the Datastore.Allocate Space privilege on the target
datastore.
Chapter 14: Managing Virtual Machines 605
NOTE When you enable authentication for the content library, you effectively set
a password on the static username vcsp, which you cannot change. This is a user
account that is not associated with vCenter Single Sign-On or Active Directory.
606 VCP-DCV for vSphere 8.x Cert Guide
NOTE The transfer service on the vCenter Server is responsible for importing and
exporting content between the subscriber and the publisher, using HTTP NFC.
Open Virtual Format (OVF) template, Open Virtual Appliance (OVA) template,
Microsoft virtualization-based security (VBS), VMware PowerCLI, graphics
processing unit (GPU), content library
Chapter 14: Managing Virtual Machines 611
Review Questions
1. Which of the following is a requirement for guest OS customization?
a. ESXi 5.0 or later
b. VMware Tools 11.0 or later
c. A supported guest OS installed on SCSI node 0:0
d. A supported guest OS installed on any SCSI node
2. You want to create a virtual machine that can use up to 4096 MB of video
memory. Which compatibility option should you choose?
a. ESXi 7.0 and later
b. ESXi 6.7 Update 2 and later
c. ESXi 6.7 and later
d. ESXi 6.5 and later
3. You are snapshotting production virtual machines and want to minimize the
impact to users and the performance of the guest OS and its applications.
Which option should you choose?
a. Snapshot the memory and quiesce the file system
b. Snapshot the memory but do not quiesce the file system
c. Quiesce the file system but do not snapshot the memory
d. Do not quiesce the file system or snapshot the memory
4. In your vSphere 8.0 environment, you want to export a virtual machine for
portability to other systems. Which approach should you use?
a. Export to OVF
b. Export to OVA
c. Export as a VM template
d. Export as a VMDK
5. You want to add items to the content library. Which of the following is not a
valid choice for importing?
a. ISO file
b. OVA
c. A running virtual machine
d. OVF
This page intentionally left blank
CHAPTER 15
Final Preparation
Getting Ready
Here is a list of actions and considerations that you should address prior to
taking the exam:
■ Review the VCP-DCV 2023 or current certification requirements,
as described in the Introduction in this book.
■ If you are taking an updated version of the VMware Professional
vSphere 8.x exam rather than 2V0-21.23, download the corresponding
online appendix from the Pearson companion website. Use the appendix,
written by the authors of this book for each exam update, as your guide for
preparing for the exam. The appendix covers product and exam changes.
It provides an updated table that maps exam objectives to chapters and
sections in this book.
■ Gain hands-on experience with vSphere 8. If you have not done so already,
you should access a vSphere 8 environment and use it to practice perform-
ing the procedures described in this book. If you do not have a suitable
vSphere 8 environment, consider using VMware Hands-on Labs (http://
labs.hol.vmware.com) to search for vSphere and vSAN offerings. You can
follow the lab exercises as designed or use them as a playground to gain
hands-on familiarity with specific vSphere features that may be difficult
for you to implement in your own lab, such as vSAN or vVols. The follow-
ing are examples of labs that might be helpful:
■ VMware vSphere 8: What’s New (HOL-2311-01-SDC)
■ VMware vSphere: Advanced Topics (HOL-2211-02-SDC)
■ VMware vSphere: Security Getting Started (HOL-2211-03-SDC)
■ VMware vSAN 8: Quick Start—Lightning Lab (HOL-2308-91-HCI)
614 VCP-DCV for vSphere 8.x Cert Guide
■ Practice performing most of the procedures that are described in this book.
■ Review the following items in each chapter in this book until you have them
committed to memory:
■ The “Do I Know This Already?” questions at the beginning of each
chapter
■ The key topics table at the end of each chapter
■ The key terms at the end of each chapter
■ The “Review Questions” at the end of each chapter
■ Take the practice exams included with the book. The standard edition includes
two exams, and the premium edition includes two more exams. If you miss any
questions, read the provided explanation and the related section in this book.
Continue taking the practice exams until you feel you know and can explain
each answer. If you are preparing for an updated version of the exam, be sure
to look for updated practice exam questions.
■ Prior to registering for the exam, create an account with VMware Certification,
at https://mylearn.vmware.com/MgrReg/login.cfm?ui=www_cert.
■ Create an account at Pearson Vue (www.vue.com), which delivers all VMware
career certification exams. To register for the 2V0-21.23 exam, use the infor-
mation in the Introduction of this book to navigate to 2V0-21.23 exam details
and click the Schedule Exam link. Follow the link to log in with your VMware
Certification account. After successfully logging in, you will be redirected to
the Pearson Vue website to complete the registration. In the wizard, you select
the exam location, date, and time and provide payment.
NOTE Currently, you can choose to take the exam at home or in a Pearson Vue
testing center. To take the exam at home, you must meet strict requirements, such
as compatibility for audio, camera, and bandwidth. Pay careful attention to all the
requirements and precheck information before choosing this option.
■ Arrive at the exam center 30 minutes prior to the scheduled exam start time so
you have ample time to complete the sign-in procedure and address personal
needs. During the sign-in procedure, you should expect to place personal
belongings in a locker, provide credentials, review the test regulations, and sign
the agreement.
■ Be sure to pay attention to the rules and regulations concerning the exam. For
example, follow the venue’s protocol for requesting help during the exam and
for signaling your completion of the exam. Each venue’s rules may be unique.
■ Pay close attention to the wording of each question and each choice. (The
exam format is multiple choice, provided via a web-based user interface.) The
following are some examples of what to expect:
■ Some questions may ask you to select “which statement is correct,” and
some questions may ask you to select “which statement is incorrect.”
■ Most questions call for you to select a single choice from a list of mul-
tiple choices. Whenever a question calls for you to select more than one
choice, it does so explicitly by including a phrase such as “Select two.”
■ Read each question carefully enough to ensure that you successfully
interpret feature names and terminology. For example, when a question
contains the word heartbeat, you need to carefully determine if it is refer-
ring to an HA network heartbeat, an HA datastore heartbeat, a VMFS
heartbeat, a VMware Tools heartbeat, or some other heartbeat.
■ Questions tend to be written in a concise manner, and at first glance, you
might think that insufficient details are provided. For example, a ques-
tion could provide a symptom and ask you to select three actions that you
should take to troubleshoot the issue. Your first thought might be that
you would take analytical steps or remediation steps that are not provided
as choices for the question. You might even consider the provided choices
to be unpractical or insufficient. Do not get frustrated. Just select the best
choices that fit the question.
■ Questions that ask you to select multiple choices to accomplish a specific
task may not clearly state whether all the selected choices must be per-
formed or whether performing just one of the selected choices is suffi-
cient. Although you may wish the question was worded more clearly, you
should see that only one set of choices fits the question.
■ Strive for good time management during the exam. For the 2V0-21.23 exam,
you need to answer 70 questions in 135 minutes. You could, for example, allow
yourself 1.5 minutes per question, leaving 30 minutes at the end of the exam
to review your marked questions. A timer is provided in the top-right corner
616 VCP-DCV for vSphere 8.x Cert Guide
of the exam user interface, along with the number of remaining questions. You
might want to watch for the following milestones and pick up your pace when
necessary:
■ With 50 questions remaining, at least 105 minutes left
■ With 30 questions remaining, at least 75 minutes left
■ With 10 questions remaining, at least 45 minutes left
■ Don’t allow yourself to spend too much time on a question. For example, if a
question is tricky or if more than one choice seems to fit for a question that
calls for a single choice, determine which choice is most likely the choice that
VMware wants. In some cases, you might find it easier to answer the question
by focusing on which choices to eliminate.
■ Be sure to answer all questions. You will not be penalized for incorrect
answers. Guessing provides an opportunity for a higher score.
■ Whenever you are unsure of an answer or feel rushed to make a decision,
answer it the best you can, select the box to mark the question for review, and
continue forward.
■ After answering all the questions, use the Review Page, which identifies all
questions that you marked for review and all questions that are incomplete.
If sufficient time remains, use the links provided on the review page to return
to any questions that you marked or any questions that are identified as
incomplete.
APPENDIX A
Chapter 2
1. c. Explanation: NPIV requires the use of virtual machines with RDMs. An
RDM is a mapping file containing metadata that resides in a VMFS datastore.
2. a. Explanation: A vSphere pod requires ephemeral storage to store Kubernetes
objects, such as logs, emptyDir volumes, and ConfigMaps.
3. b. Explanation: Symmetric Multiprocessing Fault Tolerance (SMP-FT) is
supported when PFFT is set to 0 and Data Locality is set to Preferred or Sec-
ondary DRS should be automated. You should disable vSphere HA datastore
heatbeats.
4. b. Explanation: If you choose RAID 5/6 and PFTT=2 for a 100 GB virtual
disk, the required capacity is 150 GB, and the usable capacity is 67%.
5. a. Explanation: The following are the VAAI primitives for NAS: Full File
Clone, Fast File Clone/Native Snapshot Support, Extended Statistics, and
Reserve Space.
6. d. Explanation: Protocol endpoints (PEs) are logical I/O proxies, used for
communication with virtual volumes and the virtual disk files.
7. a. Explanation: When the VMware NMP receives an I/O request, it calls the
appropriate PSP, the PSP selects an appropriate physical path, and the NMP
issues the I/O request.
8. c. Explanation: A VM storage policy for tag-based placement is helpful for
storage arrays that do not support VASA and their storage characteristics are
not visible to the vSphere client.
9. a. Explanation: The available vSAN storage policies include PFTT, SFTT,
Data Locality, Failure Tolerance Method, Number of Disk Stripes per Object,
Flash Read Cached Reservation, Force Provisioning, Object Space Reserva-
tion, Disable, Object Checksum, and IOPS Limit for Object.
10. b. Explanation: If the space used on datastore A is 82% and on datastore B
is 79%, the difference is 3. If the threshold is 5, Storage DRS will not make
migration recommendations from datastore A to datastore B.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 619
Chapter 3
1. d. Explanation: On a vSS, you can set the following network policies: Teaming
and Failover, Security, Traffic Shaping, and VLAN.
2. b. Explanation: The following NIC teaming options are available on vSS and
vDS: Route Based on Originating Virtual Port, Route Based on IP Hash,
Route Based on Source MAC Hash, and Use Explicit Failover Order.
3. a. Explanation: Distributed virtual switches can do both inbound and
outbound traffic shaping, whereas standard virtual switches handle just
outbound traffic shaping.
4. c. Explanation: If you reserved 1.0 Gbps for virtual machine system traffic on
a distributed switch with 8 uplinks, then the total aggregated bandwidth avail-
able for virtual machine reservation on the switch is 8.0 Gbps (8 uplinks times
1.0 Gbps per uplink). Each network resource pool can reserve a portion of
the 8 Gbps capacity. Because you already reserved 512 Mbps for one network
resource pool, you have 7.5 Gbps (8.0 Gbps - 512 Mbs) remaining for other
network resource pools. See Figure 3-3 for a similar example.
5. c. Explanation: When marking traffic, you can create a rule to configure
qualifiers to identify the data to be tagged and set Action to Tag.
6. c. Explanation: A vDS supports up to 64 LAGs. LACP support is not
compatible with software iSCSI port binding or nested ESXi.
7. a. Explanation: The required vDS configuration for the virtual switch teaming
policy health check is at least two active physical NICs and two hosts.
8. c. Explanation: Cisco Discovery Protocol (CDP) support was introduced with
ESX 3.x. CDP is available for standard switches and distributed switches that
are connected to Cisco physical switches. Link Layer Discovery Protocol
(LLDP) is supported in vSphere 5.0 and later for vDS (5.0.0 and later), but not
for vSS.
9. a. Explanation: With DirectPath I/O in a vSphere 7.0 environment, a virtual
machine can be part of a cluster, but it cannot migrate across hosts.
10. a. Explanation: The available services for a custom stack are Management,
vMotion, IP-based storage, Provisioning, Fault Tolerance logging, vSphere
Replication, vSphere Replication NFC, and vSAN.
Chapter 4
1. b and d. Explanation: An EVC requirement is that the hosts must be attached
to a vCenter Server. The options for VMware EVC are Disable EVC, Enable
EVC for AMD Hosts, and Enable EVC for Intel Hosts. You can apply a
custom CPU compatibility mask to hide host CPU features from a virtual
machine, but VMware does not recommend doing so.
620 VCP-DCV for vSphere 8.x Cert Guide
Chapter 5
1. d. The first object that you must create in a vSphere inventory is a data center
(with the exception of a folder to contain data centers).
2. d. Explanation: A subscribed library is a library whose content you cannot
change or publish. It receives its content from a published library.
3. b. Explanation: The file named <vmName>-flat.vmdk is the virtual machine
data disk file. It is commonly called the flat file. <vmName>. vmdk is the virtual
machine data disk file.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 621
Chapter 6
1. d. Explanation: Use cases for vSphere with Tanzu include providing a familiar
single stack for containers and virtual machines and streamlining the develop-
ment of modern applications.
2. b. Explanation: Aria Operations is commonly used for continuous performance
optimization and intelligent remediation.
3. a. Explanation: Aria for Logs is commonly used to decrease time and effort
spent on root cause analysis and centralized log management and analysis.
622 VCP-DCV for vSphere 8.x Cert Guide
Chapter 7
1. d. Explanation: The key size requirement is 2048 to 16,384 bits, not 1024 to
16,384 bits.
2. a. Explanation: vCenter Server supports these certificate modes for ESXi:
VMware Certificate Authority, Custom Certificate Authority, and Thumbprint
Mode.
3. a. Explanation: In vCenter Server 8.0, the system roles include read-only,
administrator, no access, no cryptography administrator, trusted infrastructure
administrator, and no trusted infrastructure administrator.
4. a. Explanation: To migrate a virtual machine with Storage vMotion, the user
must have the Resource.Migrate Powered On Virtual Machine on the virtual
machine or folder and Datastore.Allocate Space on the destination datastore.
5. d. Explanation: In normal lockdown mode, user accounts that are in the
Exception Users list and that have administrator privileges on the host can
access the DCUI. Also, users identified in the host’s DCUI.Access advanced
option can access the DCUI.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 623
Chapter 8
1. a. Explanation: The ESXi installation prerequisites include downloading the
ESXi installer ISO and preparing the hardware system to boot from it.
2. b. Explanation: There is a default installation script included with the ESXi
installer. The default ks.cfg installation script is in the initial RAM disk at /etc/
vmware/weasel/ks.cfg.
3. c. Explanation: Prior to running the deployment command, you can run a pre-
deployment check by using the command vcsa-deploy install --verify-only
path-to-JSON-file.
4. a. Explanation: VECS does not store ESXi certificates. ESXi certificates are
stored locally on the ESXi hosts in the /etc/vmware/ssl directory.
5. d. Explanation: All users have must have the object of class inetOrgPerson. All
groups must have the object of class groupOfUniqueNames. All groups must
have the group membership attribute uniqueMember.
6. c. Explanation: A user must be a member of the CAAdmins group to perform
most certificate management operations, such as using the certool command.
7. a. Explanation: You should not select the Use Machine Account option if you
plan to rename the machine. Instead, you need to select Use Service Principle
Name (SPN) and provide the SPN, UPN, and password.
8. a. Explanation: In scenarios where vCenter Server is installed in a secured net-
work with no Internet access, you can install the Update Manager Download
Service (UMDS) and use it to download updates.
624 VCP-DCV for vSphere 8.x Cert Guide
9. d. Explanation: For the Passive node, connect NIC 0 to the Management net-
work and NIC 1 to the vCenter HA network. For the Witness node, connect
NIC 1 to the vCenter HA network.
10. b. Explanation: The following kernel boot options have been deprecated
and are no longer supported in ESXi 7.0: --no-auto-partition,
autoPartition CreateUSBCoreDumpPartition, and
autoPartitionDiskDumpPartitionSize.
Chapter 9
1. a. Explanation: To add physical adapters to a vSS, you can select the host,
navigate to Configure > Networking > Virtual Switches, select the switch, and
select Manage Physical Adapters. In the wizard, click the Add Adapters (green
plus sign) button.
2. b. Explanation: You can set the VLAN ID to 0 (external switch tagging), 1 to
4094 (virtual switch tagging), or 4095 (virtual guest tagging).
3. d. Explanation: You can change the general setting of a vDS, including
Name, Number of Uplinks, Network I/O Control (enable or disable), and
Description.
4. a. Explanation: You can change the Advanced settings for a vDS, including
MTU (in bytes), Multicast Filtering Mode (Basic or IGMP/MLD Snooping),
Discovery Protocol, and Administrator Contact.
5. a. Explanation: When creating a VMkernel adapter, you should configure the
VMkernel Adapter IP, MTU, Stack, and Available Services settings.
6. c. Explanation: NIOC applies shares to each of the following network traffic
types: management traffic, Fault Tolerance (FT) traffic, NFS traffic, vSAN
traffic, vMotion traffic, vSphere Replication (VR) traffic, vSphere Data Protec-
tion backup traffic, and virtual machine traffic.
7. b. Explanation: For port mirroring, you can select one of the following session
types: distributed port monitoring, remote mirroring source, remote mirroring
destination, or encapsulated remote mirroring (L3) source.
8. a. Explanation: The number of ports in each port channel must match the
number of physical NICs that will be aggregated on the host (the minimum is
two). The same hashing algorithm must be used for the port channel and the
associated LAG on the vDS. All the NICs in a LAG must be configured with
the same speed and duplexing.
9. b. Explanation: You can enable the VLAN and MTU and the Teaming and
Failover health checks.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 625
10. d. Explanation: You can use the following to qualify data: IP address (to iden-
tify packets by source and destination addresses and ports), MAC address (to
identify packets by source and destination addresses and by VLAN), and sys-
tem traffic (to identify data by system traffic type).
Chapter 10
1. c. Explanation: If you initially selected the Skip Quickstart option, you should
add hosts manually. If you previously used Quickstart but selected Configure
Networking Settings Later, you can add hosts by using Quickstart but must
manually configure the host networking.
2. a, b, and c. Explanation: The default value for CPU and Memory Limit is
unlimited. The default value for Reservation Type is Expandable.
3. a. Explanation: Define Host Failover Capacity can be set to Cluster Resource
Percentage, Slot Policy (powered-on VMs), Dedicated Host Failures, or
Disabled.
4. b. Explanation: To configure Virtual Machine Component Protection (VMCP)
in a vSphere HA cluster, you can select Failures and Responses > Datastore
with PDL and choose Issue Events or Power Off and Restart VMs.
5. c. Explanation: You need to install a supported vendor-supplied vSphere Client
plug-in and register the proactive HA provider. Ensure that vSphere HA and
DRS are enabled. To allow remediation actions, you need the Host.Config.
Quarantine and Host.Config.Maintenance privileges.
6. b. Explanation: If the guest OS reports that memory paging is occurring, you
should increase the memory size of the virtual machine.
7. a. Explanation: If a virtual disk is thin provisioned, you may be maximizing the
use of your storage space while decreasing the virtual machine’s performance
and increasing its risk of denial of service.
8. b. Explanation: %DRPTX is the percentage of transmit packets dropped. It
indicates that the physical network adapter cannot meet the demand, perhaps
due to load from other virtual machines.
9. a. Explanation: Warning, Information, and Audit are valid event types. Another
valid type is Alert, which indicates that a fatal problem has occurred in the
system.
10. c. Explanation: The ESXi host agent log contains data related to the agent that
manages and configures the ESXi host and its virtual machines.
626 VCP-DCV for vSphere 8.x Cert Guide
Chapter 11
1. c. Explanation: In hybrid clusters, magnetic disks are used for capacity, and
flash devices serve as a read cache and a write buffer. In a hybrid cluster, 70%
of the flash space is used for the read cache, and 30% is used for the write
buffer.
2. d. Explanation: To use Quickstart to configure a vSAN cluster, the hosts must
use ESXi 6.0 Update 2 or later. The hosts must have a similar network con-
figuration to allow Quickstart to configure network settings based on cluster
requirements. You can use Quickstart to enable vSAN in the cluster. vSAN
uses local storage.
3. d. Explanation: A datastore is expandable when the backing storage device has
free space immediately after the datastore extent.
4. b. Explanation: Multiple IP addresses or DNS names can be used with NFS
Version 4.1 multipathing.
5. b. Explanation: Select the datastore, enable Configuration > Properties > Stor-
age I/O Control, click Advanced, and modify the threshold for contention
(which must have a value between 5 ms and 100 ms).
6. d. Explanation: If you want to perform a maintenance activity on an SDRS
cluster member datastore or its underlying storage devices, you can place it
in Maintenance Mode. To place a datastore in Maintenance Mode using the
vSphere Client, right-click the datastore in the inventory pane, select Enter
SDRS Maintenance Mode, and optionally apply any recommendations.
7. a, d, and e. Create a new VMkernel virtual network adapter on a virtual switch
and configure its uplink to use the RDMA paired uplink (for example, vmnic9).
Navigate to Configure > Networking > RDMA Adapters to review the bind-
ings. Select Add software NVMe over RDMA adapter.
8. b. Explanation: In vPMem mode, a virtual machine can directly access PMem
resources and use the resources as regular memory.
9. c. Explanation: FIXED and LB_RR are path selection schemes (PSS) used by
the HPP module. VMW_PSP_FIXED is the NMP path selection module that
uses a preferred path.
10. a and b. Explanation: To configure vVols in a vSphere 7.0 environment, you
need to configure the following components on the storage side: protocol end-
points, storage containers, storage profiles, and replication configurations (if
you plan to use vVols with replication).
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 627
Chapter 12
1. d. Explanation: To join vCenter Server systems in Enhanced Linked Mode,
you need to connect them to the same SSO domain. External PSCs are not
used in vSphere 8. ELM does not require vCenter HA.
2. a. Explanation: In a vSphere environment, you cannot change the object, user,
or user group in a permission, but you can change the role.
3. b and c. Explanation: The Certificate Management page shows the certificate
types in the VMware Endpoint Certificate Service (VECS). By default, the
types are machine SSL certificates and trusted root certificates.
4. a. Explanation: To perform certificate management for ESXi, you must have
the Certificates.Manage Certificates privilege.
5. d. Explanation: You can change the required length, change the character class
requirement, and allow passphrases by using the Security.PasswordQuality-
Control advanced option.
6. a. Explanation: An orange icon indicates that the status of the device has
changed, and you must reboot the host before you can use the device.
7. b. Explanation: If the host acceptance level is VMwareAccepted, you cannot
install VIBs at the PartnerSupported level.
8. a. Explanation: You can use the following command to run the Secure Boot
validation script on an upgraded ESXi host: /usr/lib/vmware/secureboot/
bin/secureBoot.py -c
9. b. Explanation: To configure a trust relationship between a KMS and vCenter,
in the vSphere Client, select the vCenter Server, navigate to Configuration >
Key Management Servers, and click Add.
10. c. Explanation: Multiple steps are needed. For example, on the Trust Authority
cluster, you should import trusted host data and create the trusted key pro-
vider. A final step is to configure the trusted key provider for the trusted hosts
on the trusted cluster (using Register-KeyProvider and Set-KeyProvider).
Chapter 13
1. c. Explanation: The vCenter Server Appliance Management Interface (VAMI)
provides a file-based backup feature for the vCenter Server. Alternatively, you
can perform image-based backups by using the vSphere API.
2. b, d, and e. Explanation: When restoring from backup, you can choose the
location and the protocol. Valid protocol choices are FTP, FTPS, HTTP,
HTTPS, SFTP, NFS, or SMB.
628 VCP-DCV for vSphere 8.x Cert Guide
Chapter 14
1. c. Explanation: When selecting the storage type on a host that has PMem
memory, you can select either the Standard or PMem radio button. If you
chose PMem storage for a virtual machine, its default virtual disk, new virtual
disk, and NVDIMM devices share the same PMem resources.
2. b. Explanation: With the vmx.log.guest.level = "info" setting, vminst.log is sent
to the host, but vmmsi.log remains in the virtual machine.
3. a. Explanation: You cannot use the vSphere Client to clone a virtual machine
using linked clones or instant clones. You can do so with API calls.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 629
Chapter 1
1. c. Explanation: Fault Tolerance is supported for up to two vCPUs in vSphere
8.0 Standard.
2. d. Explanation: VMware Directory Service for the vCenter Single Sign-On
(SSO) domain (vsphere.local) is a service in vCenter Server Appliance.
3. b. Explanation: To install ESXi 8.0, ensure that the hardware system has 4 GB
or more of physical RAM. VMware recommends 8 GB or more for production
environments.
4. c and d. Explanation: You must run the GUI deployment from a Windows,
Linux, or Mac machine that is in the network on which you want to deploy the
appliance.
630 VCP-DCV for vSphere 8.x Cert Guide
Chapter 2
1. d. Explanation: ESXi 6.5 and later supports VMFS versions 5 and 6, but not
version 3.
2. c. Explanation: Ruby vSphere Console (RVC) is a command-line interface
used for managing and troubleshooting vSAN. RVC provides a cluster-wide
view and is included with the vCenter Server deployment.
3. a. Explanation: VASA storage providers are software components that integrate
with vSphere to provide information about the physical storage capabilities.
4. a. Explanation: MRU is the default path selection policy for most active/
passive storage devices.
5. b. Explanation: Thick eager zeroed is the slowest method for virtual disk
creation, but it is the best for guest performance.
Chapter 3
1. b. Explanation: When you enable traffic shaping for a standard switch or port
group, you can configure the options Average Bandwidth, Peak Bandwidth,
and Burst Size.
2. c. Explanation: At the distributed port level, you can override policies applied
to the distributed port group and apply unique policies to a distributed port.
3. b. Explanation: In vSphere 8.0, the default settings for a distributed port group
are static binding, elastic port allocation, and eight ports.
4. d. Explanation: Single Root I/O Virtualization (SR-IOV) is a feature that
allows a single Peripheral Component Interconnect Express (PCIe) device
to appear as multiple devices. It is useful for supporting an application in a
guest OS that is sensitive to network latency. SR-IOV-enabled devices provide
virtual functions (VFs) to the hypervisor or guest operating system.
5. b. Explanation: After configuring NetFlow on a vDS, you can configure
monitoring policies on vDS port groups and ports.
Chapter 4
1. b. Explanation: Enhanced vMotion Compatibility (EVC) is a cluster fea-
ture. The source and target processors must come from the same vendor
class (AMD or Intel) to be vMotion compatible. Clock speed, cache size, and
number of cores can differ between source and target processors.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 631
Chapter 5
1. b. Explanation: Although making snapshots may be a useful step for a backup
utility, a snapshot is not by itself a backup. A snapshot does not provide a
redundant copy of data. If the base flat file is lost or corrupt, you cannot
restore the virtual machine by reverting to a snapshot.
2. a. Explanation: You can enable or disable hardware acceleration. You can
set debugging and statistics to run normally, record debugging information,
record statistics, or record statistics and debugging.
3. a. Explanation: The vMotion process involves the following phases:
Compatibility check, Pre-copy, Iterations of Pre-copy, and Switchover.
4. c. Explanation: During a vMotion migration without shared storage the virtual
disk data is transferred over the vMotion network.
5. a. Explanation: During an instant clone (vmFork) operation, the system qui-
esces and stuns the source virtual machine, creates and transfers a checkpoint,
customizes the destination MAC address and UUID, and forks the memory
and disk.
Chapter 6
1. b. Explanation: Aria Orchestrator is a key component of vRA that provides
custom workflows to support anything as a service (XaaS).
2. d. Explanation: VMware Horizon is commonly used for remote users, kiosk
and task users, and call centers.
3. b. Explanation: To configure replication, in the vSphere Client, navigate to
Home > Site Recovery > Open Site Recovery.
632 VCP-DCV for vSphere 8.x Cert Guide
Chapter 7
1. c. Explanation: Do not use CRL distribution points, authority information
access, or certificate template information in any custom certificates.
2. b. Explanation: You cannot modify permissions on the following entities
that derive permissions from the root vCenter Server system: custom fields,
licenses, roles, statistics intervals, or sessions.
3. d. Explanation: By default, the services that are running in ESXi include
DCUI, Load-Based Teaming, CIM Server, and VMware vCenter Agent.
4. b. Explanation: You should remove any expired or revoked certificates from
the vCenter Server to avoid MITM attacks.
5. d. Explanation: Prerequisites for enabling UEFI boot for your virtual
machines are UEFI firmware, virtual hardware Version 13 or later, VMware
Tools Version 10.1 or later, and an operating system that supports UEFI
Secure Boot.
Chapter 8
1. d. Explanation: In the first stage when using the GUI installer, you navigate
through the installation wizard, choose the deployment type, provide the
appliance settings, and deploy the OVA. In the second stage you use a wizard
to configure the appliance time synchronization, configure vCenter Single
Sign-On (SSO), and start the services in the newly deployed appliance.
2. d. Explanation: When adding an Active Directory over LDAP identity source,
you need to provide required information such as the name, the base DN for
users, and the base DN for groups.
3. d. Explanation: The vSphere Lifecyle Manager service is available via the
vSphere Client immediately after vCenter Server deployment. No special steps
are required to install vSphere Lifecyle Manager.
4. c. Explanation: A rule can identify target hosts by boot MAC address, SMBIOS
information, BIOS UUID, vendor, model, or fixed DHCP IP address.
5. b. Explanation: After selecting Remediate and selecting the hosts, you need
to click Pre-check Remediation to determine whether the selected hosts are
ready for remediation.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 633
Chapter 9
1. b. Explanation: You can set VLAN ID to 0 (external switch tagging), 1 to 4094
(virtual switch tagging), or 4095 (virtual guest tagging).
2. c. Explanation: As a rollback plan, you should export the distributed switch
configuration prior to upgrading. In the export wizard, choose the option to
include the distributed port groups.
3. c. Explanation: Edit the distributed port group setting. In the settings, click
General and then, from the Network Resource Pool drop-down menu, select
the network resource pool and click OK.
4. d. Explanation: The provisioning stack supports traffic for virtual machine
cold migration, cloning, and snapshot migration. It also supports the Network
File Copy (NFC) traffic used for cloning virtual disks during long-distance
vMotion. You can use this stack to isolate provisioning traffic by placing it on a
separate gateway. The default stack provides networking support for manage-
ment traffic and for all VMkernel traffic types.
5. a. Explanation: To enable NetFlow in a distributed port group, select the dis-
tributed port group, select Configure > Policies, click Edit, and then, on the
Monitoring page, select Enable NetFlow or Disable NetFlow.
Chapter 10
1. c. Explanation: Optionally, you can set Memory Reservation to a numeric
value (the default is 0) and a unit of measure (MB, GB, MHz, or GHz).
2. c. Explanation: In the Aria Operations GUI, locate the appropriate vCenter
Server adapter instance. Select the adapter, choose Advanced Settings, and set
Provide Data to vSphere Predictive DRS to True.
3. d. Explanation: To disable admission control, set Define Host Failover
Capacity to Disabled.
4. a. Explanation: VIMTOP is a tool you can run in vCenter Server Appliance to
see resource usage for services that are running.
5. d. Explanation: vmware.log is in the same folder as the virtual machine con-
figuration file.
Chapter 11
1. c. Explanation: To provide the encryption keys for a vSAN datastore, you must
implement a key management server (KMS) cluster server that is KMIP 1.1
compliant and is in the vSphere compatibility matrices.
634 VCP-DCV for vSphere 8.x Cert Guide
Chapter 12
1. b. Explanation: To assign a global permission, you should use the vSphere Cli-
ent with a user account that has the Permissions.Modify Permission privilege
on the root object of all inventory hierarchies.
2. d. Explanation: A yellow alarm is raised if a certificate’s status is Expiring
Shortly (that is, if it expires in less than eight months).
3. a. Explanation: With this setting, passwords of one and two character classes
are disabled, and so are passphrases. An uppercase character that begins a pass-
word and a number that ends a password do not count toward the number of
character classes used.
4. d. Explanation: If the “Host secure boot was disabled” message appears in
the vSphere Client, you must re-enable Secure Boot to resolve the problem.
If the “No cached identity key, loading from DB” message appears, you must
disconnect and reconnect the host.
5. a. Explanation: You can leverage the files that you exported during the
configuration of vTA vSphere as your backup. If you need to restore vTA, you
can use the exported files to reconfigure vTA.
Chapter 13
1. b. Explanation: After a restore completes, the following configurations are
restored: virtual machine resource settings, resource pool hierarchy and
setting, cluster-host membership, DRS configuration, and rules.
2. c. Explanation: If you choose to transfer configuration, historical, and
performance data, you can transfer the configuration data during the upgrade
and transfer the remaining data in the background following the upgrade.
Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 635
Chapter 14
1. c. Explanation: Guest OS customization requires a supported guest OS
installed on SCSI node 0:0 and VMware Tools. Windows guest customization
requires ESXi Version 3.5 or later. Linux guest customization requires Perl in
the guest OS.
2. a. Explanation: The compatibility setting controls which virtual machine
hardware version is used. Setting the compatibility to ESXi 7.0 and later uses
hardware Version 17, which is the minimum version that support 4 GB video
memory.
3. d. Explanation: To minimize the impact to a running virtual machine and to
reduce the time required to take a snapshot, do not snapshot the memory state
or quiesce the guest file system.
4. a. Explanation: You can export a virtual machine, virtual appliance, or vApp as
an OVF or OVA template to create virtual appliances that can be imported by
other users. Starting in vSphere 6.5, you can only export to OVF.
5. c. Explanation: You can import items such as OVA / OVF templates and vApps
to a content library. You can also import ISO images. You can also add content
to the library by cloning VMs or templates to the library.
This page intentionally left blank
Glossary
A
add-on: In vSphere Lifecycle Manager, a collection of components that you
can use to customize an ESXi image with OEM content and drivers.
App Volumes: A set of application and user management solutions for
VMware Horizon, Citrix Virtual Apps and Desktops, and Remote Desktop
Services Host (RDSH) virtual environments.
AppDefense: A data center endpoint security product that protects applica-
tions running in vSphere.
B
baseline: In vSphere Lifecyle Manager, a set of bulletins.
C
Certificate Manager: A command-line utility that you can use to generate
certificate signing requests (CSRs) and replace certificates for machine and
solution users.
client performance charts: vSphere charts that enable you to view perfor-
mance metrics in different ways, depending on the selected object and metric
type.
cluster: A set of ESXi hosts that are intended to work together as a unit.
Common Information Model (CIM): An open standard that defines a
framework for agentless, standards-based monitoring of ESXi host hardware
resources. The framework consists of a CIM broker and a set of CIM providers.
content library: A repository (container) for objects such as virtual machine
templates, vApp templates, ISO images, and files that you might want to share
among multiple vCenter Servers in a vSphere environment.
638 Glossary
CPU Ready Time: A metric that indicates the amount of time a VCPU is ready
to work (that is, has a workload and is ready to be scheduled) but is waiting to be
scheduled on hardware. High CPU Ready Time is a sign of CPU contention.
D
data center: A container object in the vSphere inventory that is an aggregation of
all the different types of objects used to work in virtual infrastructure.
disk group: A group of local disks on an ESXi host that contributes to the vSAN
datastore.
Distributed Resource Scheduler (DRS): A vSphere feature that balances VM
workload in a cluster based on compute usage. It includes live (vMotion) migrations
of VMs, when necessary.
E-F
ESXi base image: The ESXi image that VMware provides with each release of
ESXi, which is a complete set of components that can boot up a server.
ESXTOP: A utility that provides a detailed real-time look at resource usage from
the ESXi Shell.
EtherChannel: A logical channel formed by bundling together two or more links
to aggregate bandwidth and provide redundancy. Other acceptable names for Ether-
Channel (an IOS term) are port channel (an NX-OS term) and link aggregation
group (LAG).
G
graphics processing unit (GPU): A specialized processor developed for parallel
processing, primarily for rendering graphical images.
H
High-Performance Plug-in (HPP): The default plug-in that claims NVMe-oF
targets.
host profile: A feature that enables you to encapsulate the configuration of one
host and apply it to other hosts.
hybrid cloud: A cloud that is a combination of a private cloud, a public cloud, and
on-premises infrastructure.
Glossary 639
I-L
I/O filter: A software component that can be installed on ESXi hosts and can offer
additional data services to virtual machines.
image: In vSphere Lifecyle Manager, a description of which software, drivers, and
firmware to run on a host.
Intel Software Guard Extension (SGX): A processor-specific technology
that enables application developers to protect code and data from disclosure or
modification.
M
managed object browser (MOB): A web-based interface that provides you with a
means to explore the VMkernel object model.
microsegmentation: A type of network segmentation that decreases the level of
risk and increases the security posture of a data center by providing granular control
and distributed stateful firewalling. It effectively allows you to place a firewall on
each VM network connection.
Microsoft virtualization-based security (VBS): A Microsoft feature for
Windows 10 and Windows Server 2016 operating systems that uses hardware
and software virtualization to enhance system security by creating an isolated,
hypervisor-restricted, specialized subsystem.
N
NetFlow: A switch feature that collects IP network traffic as it enters or exits an
interface. NetFlow data provides an overview of traffic flows, based on the network
source and destination.
network resource pool: A mechanism that enables you to apply a part of the
bandwidth that is reserved for virtual machine system traffic to a set of distributed
port groups.
Non-Volatile Memory Express (NVMe) device: A high-performance alterna-
tive to SCSI storage.
O
Open Virtual Appliance (OVA) template: A single-file distribution of an OVF
package.
Open Virtual Format (OVF) template: A set of files with the OVF, VMDK, and
MF file extensions.
640 Glossary
P-Q
PMem device: A non-volatile dual in-line memory module (NVDIMM) on the
ESXi host that resides in a normal memory slot.
port mirroring: A process that allows administrators to duplicate everything that
is happening on one distributed port to then be visible on another distributed port.
Predictive DRS: A feature that leverages the predictive analytics of vRealize
Operations (vROps) Manager and vSphere DRS to provide workload balancing
prior to the occurrence of resource utilization spikes and resource contention.
private VLAN (PVLAN): An extension of the VLAN standard that is not double
encapsulated but that allows a VLAN to effectively be subdivided into other VLANs.
Proactive HA: A vSphere feature that minimizes VM downtime by proactively
detecting hardware failures and placing the host in Quarantine Mode or Mainte-
nance Mode.
Proactive High Availability (Proactive HA): A feature that integrates with select
hardware partners to detect degraded components and evacuate VMs from affected
vSphere hosts before an incident causes a service interruption.
R
raw device mapping (RDM): A mapping file that contains metadata that resides
in a VMFS datastore and acts as a proxy for a physical storage device (LUN),
allowing a virtual machine to access the storage device directly.
resource pool: A container object in the vSphere inventory that is used to
compartmentalize the CPU and memory resources of a host or cluster.
S
Single Root I/O Virtualization (SR-IOV): A feature that allows a single Periph-
eral Component Interconnect Express (PCIe) device to appear as multiple devices to
the hypervisor (ESXi) or to a virtual machine’s guest operating system.
Site Recovery Manager (SRM): A VMware business continuity solution that you
can use to orchestrate planned migrations, test recoveries, and disaster recoveries.
Skyline: A proactive support technology developed by VMware Global Services
that is available to customers with an active Production Support or Premier Services
agreement.
stateless caching: A type of caching in which Auto Deploy does not store ESXi
configuration or state data within the host. Instead, during subsequent boots, the
host must connect to the Auto Deploy server to retrieve its configuration.
Glossary 641
Storage I/O Control (SIOC): A vSphere feature that allows you to prioritize
storage access during periods of contention, ensuring that the more critical virtual
machines obtain more I/O than less critical VMs.
Storage vMotion: The hot cross-datastore migration of a virtual machine.
T-U
template: An object in the vSphere inventory that is effectively a non-executable
virtual machine.
Trusted Platform Module (TPM): A chip that is a secure cryptoprocessor that
enhances host security by providing a trust assurance rooted in hardware as opposed
to software.
V
vApp: A container object in vSphere that provides a format for packaging and
managing applications.
vCenter Converter: A free solution that automates the process of converting
existing Windows and Linux machines into virtual machines running in a vSphere
environment.
vCenter HA: A native high availability solution for vCenter Server Appliance.
vCenter Single Sign-On (SSO): An authentication broker and security token
exchange infrastructure.
vCenter Single Sign-On Security Token Service (STS): A web service that
issues, validates, and renews security tokens.
VIMTOP: A tool you can run in vCenter Server Appliance to see resource usage
for services that are running.
virtual LAN (VLAN): A logical partition of a physical network at the data link
layer (Layer 2).
Virtual Machine Component Protection (VMCP): A vSphere HA feature that
can detect datastore accessibility issues and provide remediation for impacted virtual
machines.
virtual machine snapshot: A copy that captures the state of a virtual machine and
the data in the virtual machine at a specific point in time.
virtual PMem disk (vPMemDisk): A regular virtual disk that is assigned a PMem
storage policy, which forces it to be placed on a host-local PMem datastore.
642 Glossary
W-Z
witness host: A stretched vSAN component that consists only of metadata and
acts as a tiebreaker.
Index
LAGs (link aggregation groups), 95, link aggregation groups (LAGs), 95,
350–354 350–354
LANs, virtual. See VLANs (virtual LANs) linked clones, 182, 200
latency sensitivity, VMs (virtual machines), load balancing, 359
395 DRS (Distributed Resource Scheduler),
lazy zeroed thick virtual disks, 81 140
LCM (Lifecycle Manager), 52, 219, 228, SDRS (Storage DRS), 83
318–319. See also vLCM (vSphere load-based NIC teaming, 108
Lifecycle Manager) Load-Based Teaming Daemon, 258
LDAP (Lightweight Directory Access local storage, 35
Protocol), 11, 309, 313 Lockdown Mode, ESXi, 496–497
least significant bit (LSB), 101 lockout policy, 316
legacy fault tolerance, 524 Log Assist (Skyline), 215
legacy hosts, SSL certificate verification for, log files
561 Aria for Logs, 217–218
libraries, content, 603 ESXi, 405–407, 503
adding items to, 608 limiting number of, 271
authentication, 605 log levels, 408–409
creating, 604–605 monitoring and management, 405–412
definition of, 604 system event log
deploying VMs with, 608–609 configuration, 409–410
managing VM templates in, 609 streaming events to, 401–402
overview of, 176–178 viewing, 401
permissions, 606–607 vRLI (vRealize Log Insight), 411–412
publishing, 605 vCenter Server, 407–408
subscribing to, 606 VMware Skyline, 215
synchronization options, 607 vSAN, 68
versioning, 177 logical unit numbers (LUNs), 35
License Service, 11 LSB (least significant bit), 101
licenses LUNs (logical unit numbers), 35
vSAN, 67–68, 421–422 LZ4, 58
vSphere, 8–9
LicenseSevice.Administrators group, 315 M
Lifecycle Manager (LCM), 52, 219, 228, MAC (media access control) addresses,
318–319. See also vLCM (vSphere 102–103
Lifecycle Manager) definition of, 94
Lightweight Directory Access Protocol network security policies and, 102–103
(LDAP), 11, 309, 313 MAC Address Changes option, network
line charts, 379 security policies, 103
Link Aggregation Control Protocol Machine certificate store, 244
(LACP), 95, 118–119 machine learning (ML), 601
link aggregation groups, 350–354 machine SSL certificates, 243
management 663
vSphere with Tanzu, 208–213, 521–523 vRLI (vRealize Log Insight), 411–412
vSphere+213–214 VRMS (vSphere Replication Management
VMware Remote Console (VMRC), Service), 24, 225
577–578 VRS (vSphere Replication Service), 24, 225
VMware Service Broker, 27 vSAN. See also vSphere HA
VMware Service Lifecycle Manager, benefits of, 47–48
161–162 best practices, 68
VMware Skyline, 215–216 boot devices and, 68
Skyline Advisor, 392 characteristics of, 48–50
Skyline Health, 390–391 clusters
VMware Tools, 153, 188, 189, 221 creating with Quickstart, 419
compatibility, 524 encryption in, 61, 434–437
configuration, 324 expanding, 424–426
installation, 578–580 extending across two sites, 428–430
lifecycle management, 579 managing devices in, 430–432
performance counters, 272 requirements for, 67
upgrading, 578–580 space efficiency in, 58–60, 433
virtual machine monitoring and manage- standard, 53
ment, 189, 395 stretched, 55–58
VMware vCenter Agent (vpxa), 259 two-host, 54
VMware vCloud Director, 27 compatibility, 524
VMware vCloud Suite, 27 component state, 51
VMware vSphere 8 STIG Readiness Guide, datastores
484 overview of, 43
VMware Workspace ONE Access, 222 types of, 50
VMWARE_HTTPSPROXY environment viewing, 422
variable, 578 deployment, 53–58
VMwareAccepted VIBs, 498 disabling, 423
VMwareCertified VIBs, 498 disk version, 524
VMware-I/O Vendor Program (IOVP), 75 DRS (Distributed Resource Scheduler)
VMX files, 179, 271 automation modes, 139
vmx.log.guest.level option, 579 description of, 7
vNICs (virtual NICs), 96 evacuation workflow, 141
vobd, 547 memory metric for load balancing, 140
vPMeM (Virtual Persistent Memory), 141, migration sensitivity, 143–144
458–459 network-aware DRS, 140
vPMem (Virtual PMem), 458–459 NVM (non-volatile memory) support,
vPMemDisk (Virtual Persistent Memory 141
Disk), 141, 459 Predictive DRS, 156, 374
vpxd certificate store, 244 recent enhancements, 139–142
vpxd-extension certificate store, 244 resource pools, 144–148
vpxuser, 499 rules, 142–143
vRealize Suite. See Aria Suite virtual machine distribution, 140
vSphere 689
Memory Tables
Chapter 1
Chapter 2
Table 2-4 Comparison of NFS Version 3 and Version 4.1 Support for vSphere Features and
Solutions
NFS Features and Functionalities Version 3 Version 4.1
vMotion and Storage vMotion Yes Yes
High Availability (HA) Yes Yes
Fault Tolerance (FT) Yes Yes (Supports the new FT mechanism
introduced in vSphere 6.0 that supports
up to four vCPUs, not the legacy FT
mechanism.)
Distributed Resource Scheduler (DRS) Yes
6 VCP-DCV for vSphere 8.x Cert Guide
Policy Description
In stretched clusters, this policy defines how many additional
host failures can be tolerated after a site failure’s PFTT has been
reached. If PFTT = 1, SFTT = 2, and one site is inaccessible, two
more host failures can be tolerated. The default setting for this
policy is 1, and the maximum is 3.
If PFTT = 0, this option is available. The options for this policy
are None, Preferred, and Secondary. This allows objects to be
limited to one site or one host in stretched clusters. The default
setting for this policy is None.
This policy defines whether the data replication mechanism is
optimized for performance or capacity. If RAID-1 (Mirroring)—
Performance is selected, there will be more space consumed in the
object placement but better performance for accessing the space.
If RAID-5/6 (Erasure Coding)—Capacity is selected, there will be
less disk utilization, but performance will be reduced.
This policy determines the number of capacity devices where each
VM object replica is striped. Setting this above 1 can improve
performance but consumes more resources. The default setting for
this policy is 1, and the maximum is 12.
This policy defines the amount of flash capacity that is reserved for
read caching of VM objects. This is defined as a percentage of the
size of the VMDK. This is supported only in hybrid vSAN clusters.
The default setting for this policy is 0%, and the maximum is
100%.
If set to yes, this policy forces provisioning of objects, even when
policies cannot be met. The default setting for this policy is no.
This policy defines the percentage of VMDK objects that must be
thick provisioned on deployment. The options are as follows:
■ Thin provisioning (default value)
■ 25% reservation
■ 50% reservation
■ 75% reservation
■ Thick provisioning
A checksum is used end-to-end in validating the integrity of the
data to ensure that data copies are the same as the original. In the
event of a mismatch, incorrect data is overwritten. If this policy is
set to yes, a checksum is not calculated. The default setting for this
policy is no.
This policy sets a limit for IOPS of an object. If set to 0, there is
no limit.
8 VCP-DCV for vSphere 8.x Cert Guide
Chapter 3
Physical network
adapter
Physical function
(PF) driver in ESXi
Guest OS
Virtual function
(VF) driver in
guest OS
10 VCP-DCV for vSphere 8.x Cert Guide
Chapter 4
Managing multitier Manage the resources for a group of virtual machines (in a
applications specific resource pool), which is easier than managing resources
per virtual machine.
Option Description
Defines the maximum bound on the memory slot size.
Defines the maximum bound on the CPU slot size.
Defines the default memory resource value assigned to a virtual
machine whose memory reservation is not specified or is zero.
This is used for the Host Failures Cluster Tolerates admission
control policy.
Defines the default CPU resource value assigned to a virtual
machine whose CPU reservation is not specified or is zero.
This is used for the Host Failures Cluster Tolerates admission
control policy. If no value is specified, the default of 32 MHz is
used.
das.heartbeatdsperhost Specifies the number of heartbeat datastores required per host.
The default is 2. The acceptable values are 2 to 5.
das.config.fdm. Specifies the number of seconds the system delays before
isolationPolicyDelaySec executing the isolation policy after determining that a host
is isolated. The minimum is 30. A lower value results in a
30-second delay.
Determines whether vSphere HA should enforce VM–VM
anti-affinity rules even when DRS is not enabled.
Chapter 5
Description
Virtual machine BIOS or UEFI configuration file
Virtual machine snapshot file
Virtual machine snapshot data file
Virtual machine swap file
Virtual machine suspend file
Current virtual machine log file
Old virtual machine log file, where # is a number starting with 1
Encryption
Options
Power
Management
VMware Tools Settings allow you to choose how to respond to specific power operations.
For example, you can choose whether to power off the virtual machine or
shut down the guest when the red power-off button is clicked.
Virtualization
Based Security
(VBS)
Boot Options
Advanced Options
Fibre Channel Settings allow the virtual machine to use N_Port ID Virtualization (NPIV),
NPIV including whether to generate new worldwide names (WWNs).
vApp Options Settings allow you to control vApp functionality for the virtual machine,
such as enable/disable and IP allocation policy. vApp settings that are made
directly to a virtual machine override settings made on the vApp.
Appendix B: Memory Tables 13
Chapter 6
Chapter 7
Chapter 8
IP address Optional
Subnet mask Optional
Gateway Optional
Component Description/Purpose
Servers as a command-line engine for driving Auto Deploy.
Servers as a command-line engine for building images.
Manages the vSphere inventory and provides host profiles.
Provides IP configuration to the host and redirects the host to the
PXE server.
Boots the host and directs it to the TFTP server.
Provides the appropriate boot image.
Holds a collection of VIBs either online (accessible via HTTP) or
offline (accessible via a USB drive or CD/DVD).
Holds a collection of VIBs used to install the ESXi server and saved
as ZIP files or ISO images. You can obtain image profiles from
VMware and VMware partners, and you can create custom image
profiles by using ESXi Image Builder.
Packages a collection of files (such as drivers) into an archive similar
to a ZIP file. Each VIB is released with an acceptance level that
cannot be changed. The host acceptance level assigned to each host
determines which VIBs can be installed to the host. These are the
acceptance levels, from highest to lowest:
■ VMwareCertified
■ VMwareAccepted
■ PartnerSupported
■ CommunitySupported
Store Description
Solution user stores: VECS includes one store for each solution user.
■ Machine
■ vpxd
■ vpxd-extension
■ vsphere-webclient
Used by VMCA to support certificate reversion.
The SSO domain contains many predefined groups, including the following:
■ Users: This group contains all users in the SSO domain.
■ ____________: Members of this group can perform domain controller admin-
istrator actions on VMware Directory Service.
■ ____________: Each solution user authenticates individually to vCenter Single
Sign-On with a certificate. By default, VMCA provisions solution users with
certificates. Do not add members to this group explicitly.
■ ____________: Members have administrator privileges for VMCA. Adding
members to these groups is not usually recommended, but a user must be a
member of this group to perform most certificate management operations,
such as using the certool command.
■ SystemConfiguration.BashShellAdministrators: Members can enable and
disable access to the BASH Shell.
■ ____________: Members can view and manage the system configuration and
perform tasks such as restarting services.
■ ____________: Members have full write access to all licensing-related data and
can add, remove, assign, and un-assign serial keys for all product assets regis-
tered in licensing service.
■ ____________: Members can perform SSO administration tasks for VMware
Directory Service (vmdir).
24 VCP-DCV for vSphere 8.x Cert Guide
Chapter 9
Table 9-2 VLAN ID Details
VLAN ID VLAN Tagging Mode Description
The virtual switch does not pass traffic
associated with a VLAN.
The virtual switch tags traffic with the
entered tag.
Virtual machines handle VLANs. The virtual
switch passes traffic from any VLAN.
Enhanced LACP support for vDS supports the following load-balancing modes
(hashing algorithms):
■ Destination IP address
■ Destination IP address and TCP/UDP port
■ Destination IP address and VLAN
■ Destination IP address, TCP/UDP port, and VLAN
■ Destination MAC address
■ Destination TCP/UDP port
Appendix B: Memory Tables 27
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ _____________________________
■ VLAN
Chapter 10
Datastore: Space
utilization is high.
30 VCP-DCV for vSphere 8.x Cert Guide
The vCenter Server collects only error entries in its log files.
The vCenter Server collects warning and error entries in its log files.
Chapter 11
Option Description
Move selected folders or files to a new location on the datastore
or on another datastore.
Rename selected files.
Delete selected folders or files.
Convert a selected thin virtual disk to thick.
Table 11-7 SCSI over Fabric and NVMe over Fabric Comparison
Shared Storage SCSI over Fabric NVMe over Fabric
Capability
RDM Supported
Coredump Supported
SCSI-2 reservations Supported
Shared VMDK Supported
vVols Supported
Hardware acceleration Supported
with VAAI plug-ins
Appendix B: Memory Tables 37
Chapter 12
Chapter 13
Term Definition
A VIB that is not included in a component.
The hosted version of updates provided by VMware, OEMs, and third-
party software vendors, containing the metadata and the actual VIBs.
An archive (ZIP file) that contains VIBs and metadata that you use for
offline patching and updates. A single offline bundle might contain
multiple base images, vendor add-ons, or components.
A VMware partner, such as Dell, HPE, or VMware Cloud on AWS.
1 week
1 month
1 year
This page intentionally left blank
APPENDIX C
Chapter 2
Table 2-4 Comparison of NFS Version 3 and Version 4.1 Support for vSphere Features and
Solutions
NFS Features and Functionalities Version 3 Version 4.1
vMotion and Storage vMotion Yes Yes
High Availability (HA) Yes Yes
Fault Tolerance (FT) Yes Yes (Supports the new FT mechanism
introduced in vSphere 6.0 that supports
up to four vCPUs, not the legacy FT
mechanism.)
Distributed Resource Scheduler (DRS) Yes Yes
6 VCP-DCV for vSphere 8.x Cert Guide
Policy Description
Secondary Level of In stretched clusters, this policy defines how many additional
Failures to Tolerate host failures can be tolerated after a site failure’s PFTT has been
(SFTT) reached. If PFTT = 1, SFTT = 2, and one site is inaccessible, two
more host failures can be tolerated. The default setting for this
policy is 1, and the maximum is 3.
Data Locality If PFTT = 0, this option is available. The options for this policy
are None, Preferred, and Secondary. This allows objects to be
limited to one site or one host in stretched clusters. The default
setting for this policy is None.
Failure Tolerance Method This policy defines whether the data replication mechanism is
optimized for performance or capacity. If RAID-1 (Mirroring)—
Performance is selected, there will be more space consumed in the
object placement but better performance for accessing the space.
If RAID-5/6 (Erasure Coding)—Capacity is selected, there will be
less disk utilization, but performance will be reduced.
Number of Disk Stripes This policy determines the number of capacity devices where each
per Object VM object replica is striped. Setting this above 1 can improve
performance but consumes more resources. The default setting for
this policy is 1, and the maximum is 12.
Flash Read Cache This policy defines the amount of flash capacity that is reserved for
Reservation read caching of VM objects. This is defined as a percentage of the
size of the VMDK. This is supported only in hybrid vSAN clusters.
The default setting for this policy is 0%, and the maximum is
100%.
Force Provisioning If set to yes, this policy forces provisioning of objects, even when
policies cannot be met. The default setting for this policy is no.
Object Space Reservation This policy defines the percentage of VMDK objects that must be
thick provisioned on deployment. The options are as follows:
■ Thin provisioning (default value)
■ 25% reservation
■ 50% reservation
■ 75% reservation
■ Thick provisioning
Disable Object Checksum A checksum is used end-to-end in validating the integrity of the
data to ensure that data copies are the same as the original. In the
event of a mismatch, incorrect data is overwritten. If this policy is
set to yes, a checksum is not calculated. The default setting for this
policy is no.
IOPS Limit for Object This policy sets a limit for IOPS of an object. If set to 0, there is
no limit.
8 VCP-DCV for vSphere 8.x Cert Guide
Chapter 3
Chapter 4
Option Description
das.slotmeminmb Defines the maximum bound on the memory slot size.
das.slotcpuinmhz Defines the maximum bound on the CPU slot size.
das.vmmemoryminmb Defines the default memory resource value assigned to a virtual
machine whose memory reservation is not specified or is zero.
This is used for the Host Failures Cluster Tolerates admission
control policy.
das.vmcpuminmhz Defines the default CPU resource value assigned to a virtual
machine whose CPU reservation is not specified or is zero.
This is used for the Host Failures Cluster Tolerates admission
control policy. If no value is specified, the default of 32 MHz is
used.
das.heartbeatdsperhost Specifies the number of heartbeat datastores required per host.
The default is 2. The acceptable values are 2 to 5.
das.config.fdm. Specifies the number of seconds the system delays before
isolationPolicyDelaySec executing the isolation policy after determining that a host
is isolated. The minimum is 30. A lower value results in a
30-second delay.
das. Determines whether vSphere HA should enforce VM–VM
respectvmvmantiaffinityrules anti-affinity rules even when DRS is not enabled.
Chapter 5
File Description
vmname.nvram or nvram Virtual machine BIOS or UEFI configuration file
vmname.vmsd Virtual machine snapshot file
vmname.vmsn Virtual machine snapshot data file
vmname.vswp Virtual machine swap file
vmname.vmss Virtual machine suspend file
vmware.log Current virtual machine log file
vmware-#.log Old virtual machine log file, where # is a number starting with 1
Chapter 6
Chapter 7
Chapter 8
Component Description/Purpose
Auto Deploy PowerCLI Servers as a command-line engine for driving Auto Deploy.
Image Builder PowerCLI Servers as a command-line engine for building images.
vCenter Server Manages the vSphere inventory and provides host profiles.
DHCP server Provides IP configuration to the host and redirects the host to the
PXE server.
PXE server Boots the host and directs it to the TFTP server.
TFTP server Provides the appropriate boot image.
Software depot Holds a collection of VIBs either online (accessible via HTTP) or
offline (accessible via a USB drive or CD/DVD).
Image profile Holds a collection of VIBs used to install the ESXi server and saved
as ZIP files or ISO images. You can obtain image profiles from
VMware and VMware partners, and you can create custom image
profiles by using ESXi Image Builder.
vSphere Installation Packages a collection of files (such as drivers) into an archive similar
Bundle (VIB) to a ZIP file. Each VIB is released with an acceptance level that
cannot be changed. The host acceptance level assigned to each host
determines which VIBs can be installed to the host. These are the
acceptance levels, from highest to lowest:
■ VMwareCertified
■ VMwareAccepted
■ PartnerSupported
■ CommunitySupported
Store Description
Solution user stores: VECS includes one store for each solution user.
■ Machine
■ vpxd
■ vpxd-extension
■ vsphere-webclient
vSphere Certificate Manager utility Used by VMCA to support certificate reversion.
backup store (BACKUP_STORE)
Other stores Other stores might be added by solutions. For example,
the Virtual Volumes solution adds an SMS store.
The SSO domain contains many predefined groups, including the following:
■ Users: This group contains all users in the SSO domain.
■ DCAdmins: Members of this group can perform domain controller adminis-
trator actions on VMware Directory Service.
■ SolutionUsers: Each solution user authenticates individually to vCenter
Single Sign-On with a certificate. By default, VMCA provisions solution users
with certificates. Do not add members to this group explicitly.
■ CAAdmins: Members have administrator privileges for VMCA. Adding mem-
bers to these groups is not usually recommended, but a user must be a member
of this group to perform most certificate management operations, such as
using the certool command.
■ SystemConfiguration.BashShellAdministrators: Members can enable and
disable access to the BASH Shell.
■ SystemConfiguration.Administrators: Members can view and manage the
system configuration and perform tasks such as restarting services.
■ LicenseService.Administrators: Members have full write access to all licens-
ing-related data and can add, remove, assign, and un-assign serial keys for all
product assets registered in licensing service.
■ Administrators: Members can perform SSO administration tasks for VMware
Directory Service (vmdir).
24 VCP-DCV for vSphere 8.x Cert Guide
Chapter 9
Enhanced LACP support for vDS supports the following load-balancing modes
(hashing algorithms):
■ Destination IP address
■ Destination IP address and TCP/UDP port
■ Destination IP address and VLAN
■ Destination IP address, TCP/UDP port, and VLAN
■ Destination MAC address
Appendix C: Memory Table Answers 27
Chapter 10
Chapter 11
Option Description
Move to Move selected folders or files to a new location on the datastore
or on another datastore.
Rename to Rename selected files.
Delete Delete selected folders or files.
Inflate Convert a selected thin virtual disk to thick.
Table 11-7 SCSI over Fabric and NVMe over Fabric Comparison
Shared Storage SCSI over Fabric NVMe over Fabric
Capability
RDM Supported Not supported
Coredump Supported Not supported
SCSI-2 reservations Supported Not supported
Shared VMDK Supported Not supported
vVols Supported Not supported
Hardware acceleration Supported Not supported
with VAAI plug-ins
Appendix C: Memory Table Answers 37
Chapter 12
Chapter 13
Term Definition
Standalone VIB A VIB that is not included in a component.
Depot The hosted version of updates provided by VMware, OEMs, and third-
party software vendors, containing the metadata and the actual VIBs.
Offline bundle/ An archive (ZIP file) that contains VIBs and metadata that you use for
offline depot offline patching and updates. A single offline bundle might contain
multiple base images, vendor add-ons, or components.
OEM (original A VMware partner, such as Dell, HPE, or VMware Cloud on AWS.
equipment
manufacturer)
Third-party software A provider of I/O filters, device drivers, CIM modules, and so on.
provider
Complete Review
Questions using the book
1. vSphere Overview, Components and Requirements or PTP exam engine
Complete Review
Questions using the book
2. Storage Infrastructure or PTP exam engine
Complete Review
Questions using the book
3. Network Infrastructure or PTP exam engine
Complete Review
Questions using the book
4. Clusters and High Availability or PTP exam engine
Complete Review
Questions using the book
5. vCenter Server Features and Virtual Machines or PTP exam engine
Complete Review
Questions using the book
6. VMWare Product Integration or PTP exam engine
Complete Review
Questions using the book
7. vSphere Security or PTP exam engine
Complete Review
Questions using the book
8. vSphere Installation or PTP exam engine
Complete Review
Questions using the book
9. Configure and Manage Virtual Networks or PTP exam engine
10. Monitoring and Managing Clusters and Resources Read Foundation Topics
Review Key Topics using
the book or companion
10. Monitoring and Managing Clusters and Resources website
Define Key Terms using
the book or companion
10. Monitoring and Managing Clusters and Resources website
Repeat DIKTA questions
using the book or PTP
10. Monitoring and Managing Clusters and Resources exam engine
Complete Review
Questions using the book
10. Monitoring and Managing Clusters and Resources or PTP exam engine
Complete Review
Questions using the book
11. Manage Storage or PTP exam engine
Complete Review
Questions using the book
14. Virtual Machine Management/Provision, Migrate, Replication or PTP exam engine
A
add-on: In vSphere Lifecycle Manager, a collection of components that you
can use to customize an ESXi image with OEM content and drivers.
App Volumes: A set of application and user management solutions for
VMware Horizon, Citrix Virtual Apps and Desktops, and Remote Desktop
Services Host (RDSH) virtual environments.
AppDefense: A data center endpoint security product that protects applica-
tions running in vSphere.
B
baseline: In vSphere Lifecyle Manager, a set of bulletins.
C
Certificate Manager: A command-line utility that you can use to generate
certificate signing requests (CSRs) and replace certificates for machine and
solution users.
client performance charts: vSphere charts that enable you to view perfor-
mance metrics in different ways, depending on the selected object and metric
type.
cluster: A set of ESXi hosts that are intended to work together as a unit.
Common Information Model (CIM): An open standard that defines a
framework for agentless, standards-based monitoring of ESXi host hardware
resources. The framework consists of a CIM broker and a set of CIM providers.
content library: A repository (container) for objects such as virtual machine
templates, vApp templates, ISO images, and files that you might want to share
among multiple vCenter Servers in a vSphere environment.
2 Glossary
CPU Ready Time: A metric that indicates the amount of time a VCPU is ready
to work (that is, has a workload and is ready to be scheduled) but is waiting to be
scheduled on hardware. High CPU Ready Time is a sign of CPU contention.
D
data center: A container object in the vSphere inventory that is an aggregation of
all the different types of objects used to work in virtual infrastructure.
disk group: A group of local disks on an ESXi host that contributes to the vSAN
datastore.
Distributed Resource Scheduler (DRS): A vSphere feature that balances VM
workload in a cluster based on compute usage. It includes live (vMotion) migrations
of VMs, when necessary.
E-F
ESXi base image: The ESXi image that VMware provides with each release of
ESXi, which is a complete set of components that can boot up a server.
ESXTOP: A utility that provides a detailed real-time look at resource usage from
the ESXi Shell.
EtherChannel: A logical channel formed by bundling together two or more links
to aggregate bandwidth and provide redundancy. Other acceptable names for Ether-
Channel (an IOS term) are port channel (an NX-OS term) and link aggregation
group (LAG).
G
graphics processing unit (GPU): A specialized processor developed for parallel
processing, primarily for rendering graphical images.
H
High-Performance Plug-in (HPP): The default plug-in that claims NVMe-oF
targets.
host profile: A feature that enables you to encapsulate the configuration of one
host and apply it to other hosts.
hybrid cloud: A cloud that is a combination of a private cloud, a public cloud, and
on-premises infrastructure.
Glossary 3
I-L
I/O filter: A software component that can be installed on ESXi hosts and can offer
additional data services to virtual machines.
image: In vSphere Lifecyle Manager, a description of which software, drivers, and
firmware to run on a host.
Intel Software Guard Extension (SGX): A processor-specific technology
that enables application developers to protect code and data from disclosure or
modification.
M
managed object browser (MOB): A web-based interface that provides you with a
means to explore the VMkernel object model.
microsegmentation: A type of network segmentation that decreases the level of
risk and increases the security posture of a data center by providing granular control
and distributed stateful firewalling. It effectively allows you to place a firewall on
each VM network connection.
Microsoft virtualization-based security (VBS): A Microsoft feature for
Windows 10 and Windows Server 2016 operating systems that uses hardware
and software virtualization to enhance system security by creating an isolated,
hypervisor-restricted, specialized subsystem.
N
NetFlow: A switch feature that collects IP network traffic as it enters or exits an
interface. NetFlow data provides an overview of traffic flows, based on the network
source and destination.
network resource pool: A mechanism that enables you to apply a part of the
bandwidth that is reserved for virtual machine system traffic to a set of distributed
port groups.
Non-Volatile Memory Express (NVMe) device: A high-performance alterna-
tive to SCSI storage.
O
Open Virtual Appliance (OVA) template: A single-file distribution of an OVF
package.
Open Virtual Format (OVF) template: A set of files with the OVF, VMDK, and
MF file extensions
4 Glossary
P-Q
PMem device: A non-volatile dual in-line memory module (NVDIMM) on the
ESXi host that resides in a normal memory slot.
port mirroring: A process that allows administrators to duplicate everything that
is happening on one distributed port to then be visible on another distributed port.
Predictive DRS: A feature that leverages the predictive analytics of vRealize
Operations (vROps) Manager and vSphere DRS to provide workload balancing
prior to the occurrence of resource utilization spikes and resource contention.
private VLAN (PVLAN): An extension of the VLAN standard that is not double
encapsulated but that allows a VLAN to effectively be subdivided into other VLANs
Proactive HA: A vSphere feature that minimizes VM downtime by proactively
detecting hardware failures and placing the host in Quarantine Mode or Mainte-
nance Mode.
Proactive High Availability (Proactive HA): A feature that integrates with select
hardware partners to detect degraded components and evacuate VMs from affected
vSphere hosts before an incident causes a service interruption.
R
raw device mapping (RDM): A mapping file that contains metadata that resides
in a VMFS datastore and acts as a proxy for a physical storage device (LUN),
allowing a virtual machine to access the storage device directly.
resource pool: A container object in the vSphere inventory that is used to
compartmentalize the CPU and memory resources of a host or cluster.
S
Single Root I/O Virtualization (SR-IOV): A feature that allows a single Periph-
eral Component Interconnect Express (PCIe) device to appear as multiple devices to
the hypervisor (ESXi) or to a virtual machine’s guest operating system.
Site Recovery Manager (SRM): A VMware business continuity solution that you
can use to orchestrate planned migrations, test recoveries, and disaster recoveries.
Skyline: A proactive support technology developed by VMware Global Services
that is available to customers with an active Production Support or Premier Services
agreement.
stateless caching: A type of caching in which Auto Deploy does not store ESXi
configuration or state data within the host. Instead, during subsequent boots, the
host must connect to the Auto Deploy server to retrieve its configuration.
Glossary 5
Storage I/O Control (SIOC): A vSphere feature that allows you to prioritize
storage access during periods of contention, ensuring that the more critical virtual
machines obtain more I/O than less critical VMs.
Storage vMotion: The hot cross-datastore migration of a virtual machine.
T-U
template: An object in the vSphere inventory that is effectively a non-executable
virtual machine.
Trusted Platform Module (TPM): A chip that is a secure cryptoprocessor that
enhances host security by providing a trust assurance rooted in hardware as opposed
to software.
V
vApp: A container object in vSphere that provides a format for packaging and
managing applications.
vCenter Converter: A free solution that automates the process of converting
existing Windows and Linux machines into virtual machines running in a vSphere
environment.
vCenter HA: A native high availability solution for vCenter Server Appliance.
vCenter Single Sign-On (SSO): An authentication broker and security token
exchange infrastructure.
vCenter Single Sign-On Security Token Service (STS): A web service that
issues, validates, and renews security tokens.
VIMTOP: A tool you can run in vCenter Server Appliance to see resource usage
for services that are running.
virtual LAN (VLAN): A logical partition of a physical network at the data link
layer (Layer 2).
Virtual Machine Component Protection (VMCP): A vSphere HA feature that
can detect datastore accessibility issues and provide remediation for impacted virtual
machines.
virtual machine snapshot: A copy that captures the state of a virtual machine and
the data in the virtual machine at a specific point in time.
virtual PMem disk (vPMemDisk): A regular virtual disk that is assigned a PMem
storage policy, which forces it to be placed on a host-local PMem datastore.
6 Glossary
W-Z
witness host: A stretched vSAN component that consists only of metadata and
acts as a tiebreaker.