VMware Basic Questions
VMware Basic Questions
VMware is the leader in providing different software and applications for virtualization.
The products of VMware can be categorized into two levels, server applications and
desktop applications. It is useful for running multiple applications and operating systems
on a single computer and is used to get high productivity from very few servers. It can
also speed up the new application deployments by simplifying IT management.
Presentation Virtualization
Storage Virtualization
Application Virtualization
Network Virtualization
An agent, which enables communication between VC and ESX server is called vCenter
Agent. It is installed on the ESX Server.
VMware Server
A virtualization interface in between ESXi host and Virtual Machine that stores VMs is
called VMKernel. It allocates all the ESXi host resources to VMs such as CPU, memory,
storage, etc. It can also control the special services like Fault tolerance, vMotion, traffic
management, NFS, and iSCSI. While accessing these particular services, the VMKernel
port should configure on ESXi server using a standard vSwitch. The hosted VMs cannot
communicate with the ESXi server without using VMKernel.
Bare-Metal
Hosted Hypervisor
Fault Tolerance logging is an option in the settings of VMKernel port, which is almost
equal to Vmotion option of the VMKernel port.
VMware Distributed Resource Scheduler (DRS) balances resources across different hosts
under the resource pool or cluster. It enables the rules and policies in deploying the
funds, and those resources must be prioritized to VMs.
The following are the components that are used in VMware infrastructure:
Database Servers
The .vmdk file is known as a disk descriptor file which is used to describe the memory
and size of the virtual disk file. This file contains -flat.vmdk file name in association with
hard drive adapter, heads, drive sectors, cylinders etc.
VMware VMotion is used to migrate the virtual machine running with zero downtime
from one physical server to another. It can automatically allocate the resource pools for
maximum utilization of hardware. Without any scheduled downtime, it can perform
hardware maintenance. It can also migrate the virtual machines from underperforming or
failing servers.
Jumbo frames are very much necessary to get the best performance from
VMotion.
VCloud Suite is used to combine the multiple components of VMware to give the
capabilities of cloud infrastructure complete set in a single package, including disaster
recovery, virtualization, application management, data centre services, etc.
VMware HA (High Availability) is used to configure on the cluster and works in host
levels. A High Availability cluster will restart and migrate all the VMs that running under
the host level. VMware HA detects and monitors all the hosts of the ESX server.
Q17) What are the differences between VMware FT and VMware HA?
VMware HA (High Availability) enabled per cluster while VMware FT (Fault Tolerance)
enabled per VM basis. In the case of VMware FT, there is no downtime, whereas VMware
HA can be powered on and restarted.
Get Vmware 100% Practical Training
Q18) What are the new features of vSphere 5?
The following are the new features in the latest version of vSphere:
Virtual Desktop Infrastructure (VDI) is used to connect the end user’s desktop with the
help of a thin client. The end-user also can connect the desktop using VMware Horizon
view.
Q21) What are the differences between clone and template in VMware?
CLONE TEMPLATE
Clone is defined as the copy of Virtual A Template is termed as the master copy of Virtual
Machine. Machine.
It can be converted back to the VM to update the base
It can be made when VM is powered on.
machine.
We cannot convert back the cloned VM. A Template can convert back to the VM.
With the help of parent virtual It is possible to convert clone into a template, but not
machines, a linked clone can share possible to Virtual Machines into a template when the
virtual disks. machine is powered on.
A full clone doesn’t share anything with
A Template cannot be powered on or edited. It is very
VMs and it is independent of parent
difficult to change the ordinary VM.
VMs.
Monitoring
Central Administration
SWAP
/opt
/var
/home
/-root
/var/core
/tmp
At the time of creation, the Virtual Machine nics with MAC address is stored in .VMX file.
The packet doesn’t allow the incoming traffic to the Virtual Machine if it doesn’t match
with MAC address of .VMX file.
Virtual LAN (VLAN) is used to break the Broadcast traffic into a lot of logic groups. VLAN
separates one broadcast domain into many tiny pieces instead of using one physical
switch for compromising one domain.
There are three types of Load balancing policies are available for vSwitch
Route Based Source MAC hash
Beacon Probing
When the user migration gets suspended or powered off, then it is called as the Cold
Migration. When the user migration is running on a powered virtual machine, then it is
known as Hot Migration.
Q35) What is meant by Platform Services Controller (PSC) and What are its
components?
Platform Services Controller is first introduced in VMware vSphere version 6 that handles
the security functions of infrastructure.
PSC has three main components:
Single Sign-On
Licensing service
Get Vmware Training with Real -Time Projects
Q36) Write about the disk types in VMware vSphere?
Eager Zeroes (Thick Provision): It is used in VMware Fault Tolerance. The disk space
requirement is allocated at the time of creation to VMs. When compared to other disk
formats, this Eager Zeroes thick provision takes a lot of time in creating a virtual disk.
Lazy Zeroes (Thick Provision): In this disk format, every virtual disk can be created by
default. There is an allocation of physical space for Virtual machines when the disk is
created. This Lazy Zeroes thick provision can’t be converted into thin.
Thin Provision: Thin provision provides the disk space allocation to Virtual Machines. The
disk size will increase in proportional to the data size.
Hybrid
All-Flash
Hybrid: Uses both magnetic and flash-based disks for storage. The magnetic disks are
used for storage or capacity, while flash-based drives are used for cash.
Q39) What are the steps in converting a physical machine into a virtual machine?
The following are the three steps required to convert a physical machine into a virtual
machine:
VMware DPM:
ESXi Shell:
ESXi Shell is a command-line which is used to repair the ESXi hosts. It can be accessed
through vCenter Server disable/enable, DCUI, and SSH.
Q41) What are the pre-requisites needed in running ESXTOP on ESXi host?
Limit: It is defined as the Host cycle consumption without crossing the defined value.
Share: It specifies the importance or relative priority of virtual machine access in a given
resource.
Reservation: It is a value that defines in the form of memory or CPU that can be available
for the virtual machine to start.
vApp is defined as a group or container in which more than one virtual machine can be
managed in multi tired apps for specific requirements like a database server, Web server,
and application server. It can also define the power-off and power-on sequences of the
virtual machine. By using vApp, we can configure several settings like memory allocation
and Internet Protocol allocation policy.
Q44) What is meant by iSCSI storage, and what are it’s naming conventions?
An iSCSI storage system holds in iSCSI SAN that contains more than one storage
processors. The communication in between storage array and host can be made possible
through the TCP/IP protocol. The configuration of iSCSI initiator is done with ESXi host.
The iSCSI initiator is not either independent or dependent; tht’s why it is called as iSCSI
software initiator.
The names iSCSI can be formatted in two ways:
.log: It is used to save log file for VMware to see glitches during the process
of installation.
.vmdk: It is used to simulate the disk file to stock the virtual machine gratify.
.vmsn: It is used in storing the snap state. It can supply both occupied period
and consecutive state.
Q48) Define the components that are used in vCenter Server architecture?
There are three main components in the architecture of the vCenter Server:
Web Client and vSphere Client: It is a user interface.
vCenter Server Database: Embedded PostgreSQL or SQL server is used to store security
roles, inventory, and resource pools.
SSO: It is a security domain.
VMware Consolidated Backup (VCB) is referred to as the backup framework that enables
third-party tools to get backups. VCB is very much helpful to back up the virtual servers
of VMware ESX. VCB is also known as ‘’Backup Proxy Server” and is not considered as
backup software. While using this VCB also, one must need backup software.
The Benefits of VCB:
VCB provides LAN-free backups because the connection of the VCB server to
the SAN is made through the adaptor of fibre channel.
It also provides the virtual server centralized storage backups on the VCB
server.
It reduces the VMware ESX server load without having a third party backup
agent.
External Deployment
Embedded Deployment
2 - Can you explain the difference between vSphere, ESXi, and vCenter?
Answer:
vSphere: This is VMware's cloud computing virtualization platform. vSphere is a comprehensive
suite that includes both ESXi and vCenter among other components. It's designed to transform
data centers into aggregated computing infrastructures that include CPU, storage, and
networking resources.
ESXi: This is the virtualization platform, or more specifically, the hypervisor that gets installed on
the physical machine. It allows multiple virtual machines (VMs) to run on a single physical
machine. ESXi takes the place of the operating system.
vCenter Server: This is the centralized management utility for VMware. It allows for the
management of multiple ESXi hosts and VMs from a single console. It provides tools for
configuring, monitoring, and administering virtualized resources.
4 - What is a VMKernel?
Answer: The VMKernel is a fundamental component of ESXi. It's responsible for core services in
VMware infrastructure, including but not limited to, VMotion (for live migration of running VMs),
storage I/O, and the management of network connections.
10 - What is VDP?
Answer: VDP stands for VMware Data Protection. It's a backup and recovery solution for VMware
virtual environments. VDP uses vSphere APIs for data protection to backup VM data and
application data without any interference in VM performance.
15 - What is the major advantage of VM running under a type 1 hypervisor than type 2
hypervisor?
The primary advantage of a VM running under a type 1 hypervisor (or "bare metal" hypervisor)
like VMware ESXi is performance and efficiency. A type 1 hypervisor runs directly on the host's
hardware to control hardware and manage guest operating systems, eliminating any middle
layer. This direct interface ensures lower overhead, reduced latency, and a smaller attack surface,
leading to better VM performance and enhanced security. On the other hand, a type 2 hypervisor
(or "hosted" hypervisor) runs atop an existing operating system, introducing an additional layer
and potential inefficiencies. For mission-critical, resource-intensive applications, or large-scale
virtualization endeavors, type 1 hypervisors are generally the preferred choice.
17 - How would you securely isolate network traffic for specific VMs in a vSphere
environment?
Answer:
To securely isolate network traffic for specific VMs, I would utilize VMware NSX to create micro-
segmentation. NSX allows for the creation of fine-grained security policies at the individual VM
interface level. This ensures that even VMs within the same subnet can be isolated from each
other. I'd also consider creating separate virtual switches or port groups and using VLANs to
further segregate traffic.
18 - Describe your experience with VMware Site Recovery Manager (SRM). How would you
use it in a disaster recovery scenario?
Answer:
VMware Site Recovery Manager (SRM) is a disaster recovery orchestration tool I've used in
previous roles to ensure high availability and business continuity. In a disaster recovery scenario,
SRM allows for the automated failover of VMs from the primary site to a secondary disaster
recovery site. The failover process, including the order of VM recovery and network
configurations, is predefined in recovery plans. I'd ensure regular testing of these recovery plans
without affecting production workloads to guarantee smooth operations in the event of an actual
disaster.
19 - How do you handle VM backups in a large vSphere environment, and what strategies
do you use to ensure data integrity and availability?
Answer:
For VM backups in a large vSphere environment, I typically utilize solutions like VMware VDP or
third-party tools like Veeam. For ensuring data integrity, I schedule regular backup verifications
and test restores. Implementing deduplication and compression can optimize backup storage. I
also advocate for a 3-2-1 backup strategy: keeping three copies of data, on two types of media,
with one copy stored off-site. Additionally, to ensure availability, I consider replication to an off-
site location or cloud provider for quick recovery in case of major incidents.
20 - Explain the concept of Storage DRS and how it benefits a VMware environment.
Answer:
Storage DRS (Distributed Resource Scheduler) is a feature in VMware vSphere that balances
storage workloads with respect to I/O and space capacity. In a manner similar to how DRS works
for compute resources, Storage DRS makes decisions about where a disk should reside within a
storage cluster. It can make recommendations or automatically move VM disk files between
datastores to balance utilization and maintain optimal performance. The primary benefits include
improved storage utilization, reduced storage-related bottlenecks, and automated management,
freeing up administrative time and ensuring a smooth end-user experience.
25 - How do you ensure secure communication between VMs in different networks within
vSphere?
Answer:
To ensure secure communication between VMs located on different networks within vSphere:
Network Segmentation: Utilize VLANs and separate port groups on virtual switches to
segregate network traffic based on function or sensitivity.
VMware NSX: Deploy NSX to implement micro-segmentation, ensuring fine-grained
security controls even for VMs within the same network segment.
Firewalls: Implement distributed firewalls available with NSX to control east-west traffic
between VMs. Define and enforce granular policies based on VM attributes or user
identity.
Encryption: Use VM encryption, introduced in vSphere 6.5, to ensure data-at-rest
encryption. For data-in-transit encryption, consider solutions like IPsec or SSL VPNs.
Regular Audits: Periodically review and audit network configurations, firewall rules, and
access controls to ensure they align with security best practices and organizational
policies.
Combining these measures ensures that even if VMs are on different networks or even different
data centers, their communication remains secure and compliant with industry standards.