After a security audit, a company is being required to implement a new subnet for all Nutanix services.
Which action should the administrator take immediately following the implementation of the new subnet?
After implementing a new subnet for all Nutanix services, it is necessary to rediscover the new target or reestablish file sessions. When Nutanix is configured with a new network subnet, all the services running on the Nutanix cluster need to communicate with each other over the new network. Rediscovering the new target or reestablishing file sessions allows Nutanix to start using the new IP addresses on the new subnet, ensuring that communication between the different Nutanix services is established.
According to Nutanix Support & Insights1, ''If you change the IP address of a Controller VM, hypervisor or IPMI interface on any node in a cluster that has iSCSI or Files enabled, you must rediscover the new target or reestablish Files sessions.'' This is because ''the iSCSI and Files services use static IP addresses for communication.''
A two-VM Oracle RAC cluster was recently configured with Linux Red Hat using a Nutanix Volume Group. At the time Of performing the failover tests Of simulating a failure in each Of the three Nutanix cluster nodes, the cluster administrator noticed that tile virtual machines Of the RAC cluster do not come up and the failover fails.
The administrator must to follow the best practices from Nutanix to construct the RAC cluster using AHV.
What should the administrator Veri'/ in the Steps performed to configure the RAC cluster to prevent this situation from occurring again?
Nutanix volume groupsare collections of vDisks that can be exposed to virtual machines or physical hosts using iSCSI protocol. Nutanix volume groups have a shared attribute that allows multiple VMs to access them concurrently.
In the step for attach the volume group to the RAC VMs, he must create it with an attribute of shared = true. This is because if the volume group is not created with shared = true, then only one VM can access it at a time, which would prevent Oracle RAC from working properly.
An administrator needs to audit and analyze the operations and contents of a file server.
Which File software tool should the administrator use to fulfill this task?
Files Analytics Dashboardis one of these tools that enables administrators to audit and analyze the operations and contents of a file server. The Files Analytics Dashboard provides insights into user activity, file access patterns, data growth trends, data distribution across tiers and clouds, data protection status and more.
An administrator is implementing a storage solution with these requirements:
Is easily searchable
Natively supports disaster recovery
Access to each item needs to be fast
Can scale to petabytes of data
users are granted access after authentication
user data is isolated, but could be shared
How should the administrator satisfy these requirements?
This is because Objects can provide fast access to each item using S3-compatible API which can be easily searched using metadata tags or third-party tools3.Objects also natively supports disaster recovery using replication policies1.Objects can scale to petabytes of data using erasure coding which reduces storage overhead1.Users can be granted access after authentication using AD integration which simplifies identity management1.User data can be isolated but could be shared using buckets which are logical containers for objects that can have different policies applied1.
Which two network requirements must an administrator take into consideration for a new scale-out Files cluster when configuring and defining separate client and storage networks? (Choose two.)
These are two essential requirements that an administrator must take into consideration when configuring separate client and storage networks.
these are some of the network requirements that an administrator must take into consideration for a new scale-out Files cluster when configuring and defining separate client and storage networks:
The client and storage networks must have different subnets12. This is because FSVMs use IP addresses from both networks, so they must be distinct to avoid conflicts.
Ensure there are enough IP addresses available for both networks12. This is because each FSVM requires one IP address from each network, plus one virtual IP address (VIP) per network per cluster. For example, if you have a three-node cluster with three FSVMs, you need six IP addresses for the client network (three for FSVMs and three for VIPs) and six IP addresses for the storage network (three for FSVMs and three for VIPs).
Ensure the client and storage networks use tagged VLANs if they share physical interfaces1. This is because VLAN tagging allows multiple logical networks to coexist on a single physical interface without interfering with each other.
Ensure there are no firewall rules or port blocking that prevent communication between clients, FSVMs, CVMs and Prism Element1. This is because Nutanix Files uses various ports for different protocols and services such as SMB, NFS, NTP, DNS etc.