Page 1 out of 30 Pages ... Showing Questions in Random order from Exam |
In the event of a disk failure, which process will immediately ad automatically scans Cassandra to find all data previously hosted on the failed disk, and all disks in that node?
A. Curator
B. Stargate
C. Genesis
D. Prism
Explanation: Curator is the process that runs on every node in a Nutanix cluster and is responsible for data management tasks such as deduplication, compression, erasure coding, and replication factor compliance. Curator also handles disk failure recovery by scanning Cassandra to find all data previously hosted on the failed disk, and all disks in that node. Curator then rebuilds the data on other nodes in the cluster using the distributed storage fabric1.
Refer to the exhibit.
The Linux Admin role has been created to manage only Linux VMs in the environment.
However, the Admin1 user does not have access to all Linux VMs.
What step should be taken to grant the proper access?
A. Add the hosts to the entities KM for the role.
B. Grant the admin1 user the viewer role (or the cluster.
C. Add the role to the Linux images.
D. Add the proper category to each Linux VM.
Explanation: According to the Nutanix Prism Central Guide, role-based access control
(RBAC) in Prism Central allows you to create custom roles and assign them to users or
groups based on the categories of the entities they need to manage1. Categories are keyvalue
pairs that you can assign to entities such as VMs, hosts, clusters, images, etc. to
group them logically2. For example, you can create a category key called “OS” and assign
values such as “Linux” or “Windows” to different VMs based on their operating system.
In the exhibit, the Linux Admin role has been created with the following settings:
The role has the “VM Admin” permission, which allows the user to perform all
actions on VMs3.
The role has been assigned to the admin1 user.
The role has been scoped to the entities that have the category key “OS” and the value “Linux”.
However, the admin1 user does not have access to all Linux VMs in the environment. This
means that some of the Linux VMs do not have the proper category assigned to them. To
grant the proper access, the administrator should add the category key “OS” and the value
“Linux” to each Linux VM that needs to be managed by the Linux Admin role. This can be
done either individually or in bulk through Prism Central4. Once the categories are added,
the admin1 user will be able to see and manage all Linux VMs in the environment.
Which Nutanix service control ncli, the HTML5 UI, and Rest API?
A. Prism
B. Cassandra
C. Zookeeper
D. Chronos
Explanation:
Prism is the central service control used by Nutanix to manage the clusters. It provides a unified view of the entire system, and it is used to control the HTML5 UI, the nCLI, and the REST API. Prism is used to manage the resources of the system, such as the nodes, storage, and networks, as well as to monitor the performance of the system and the applications running on it.
PrismKey Role: UI and API
·Prism is the management gateway for components and administrators to configure and monitor the Nutanix cluster.This includes Ncli, the HTML5 UI, and REST API.
·Prism runs on every node in the cluster and uses an elected leader like all components in the cluster. All requests are forwarded to the leader using Linux Iptables. This allows access to PRISM using any CVM Ip address.
·Prism communicates with Zeus for cluster configuration data and Cassandra for statistics to present to the user. It also communicates with the ESXi hosts for VM status and related information
These are only some of the essential services that make up the CVM functionality. For more information on all the services and various Nutanix Cluster components, refer to the portal documentation.
What is the function of the virbr0 bridge on AHV?
A. To carry all traffic between the user VMs and the upstream network.
B. To carry management and storage communication between user VMs and the CVM.
C. To carry management and storage communication between user VMs and AHV host.
D. To carry storage communication between the guest VMs and the CVM
An administrator is concerned about the amount of data that a VM reading and writing to the storage fabric.
Which metric will provide that data?
A. Host Hypervisor IO Bandwidth
B. Host Disk IOPS
C. VM Storage Controller IOPS
D. VM Storage Controller Bandwidth
Explanation:
The correct answer is D. VM Storage Controller Bandwidth.
VM Storage Controller Bandwidth is a metric that measures the amount of data that a VM is reading and writing to the storage fabric. The storage fabric is the network of storage controllers (CVMs) that provide distributed and fault-tolerant storage services to the VMs on the Nutanix cluster. The VM Storage Controller Bandwidth metric shows the read and write bandwidth in megabytes per second (MBps) for each VM. The higher the bandwidth, the more data the VM is transferring to and from the storage fabric1.
The administrator can use Prism Central to view the VM Storage Controller Bandwidth metric for each VM in a chart or a widget. The administrator can also use Prism Central to view other metrics related to the VM’s storage performance, such as VM Storage Controller IOPS, VM Storage Controller Latency, and VM Disk Usage2.
Reference: [Reference: Nutanix Metrics, ]
Which capability refers to the storage of VM data on the node where the VM is running and ensure that the read I/O does not have to traverse the network?
A. Intelligent Locally
B. Data Locality
C. Intelligent Tiering
D. Data Tiering
Explanation: Data locality is the capability of storing VM data on the node where the VM is running and ensuring that the read I/O does not have to traverse the network. Data locality is a unique feature of Nutanix that provides high performance and low latency for VMs by minimizing network traffic and crosstalk. Data locality works by writing one copy of the data local to the VM and the other copy (or copies) on other nodes. When a VM migrates to another node, Nutanix also moves its data to the new node and serves all I/O requests locally. Data locality also adapts to changing workloads and access patterns by dynamically moving data to where it is needed most1.
Page 1 out of 30 Pages |