Transcripts
1. Untitled video Made with Clipchamp (2): Hello, everyone.
My name is Asif. I have over 15 years
of IT experience, trained more than 70
thousandtuents globally, expert in Windows server, CCNA, MV V sphere, cloud
computing, and mode. I acquired bachelor's degree in computer applications and master's degree in
computer applications, which has provided me with
a good strong foundation in both theoretical and
practical aspects of computer science and IT. This advanced education has
played a key role in shaping my career and my ability to simplify complex IT
concepts for student. In this lesson, you will get introduction to key
Windows server features, including active directory, PNS, group policy management
console, IIS, PRV, DSCP, Windows
Deployment service, risk quotas, backup
and recovery. This lesson will provide
you an overview of these features to help you to understand their purpose
and applications. This class is perfect
for freshers exploring IT system administrators
and IT professionals, career changers looking
to break into IT. Low peer experience is required, bring your curiosity and basic understanding
of IT concepts. By the end of this class, you will understand
the purpose and functions of Windows
Server 20022 features. Be confident discussing and recognizing key features
in IT environment. Build foundational knowledge to explore further IT learning. Ready to explore Windows
Server 2022 features. Let's get started. I will
see you in the first lesson.
2. Section 1 : About Virtualization: First of all, we will see what is the meaning
of virtualization. In computing the term
virtualization refers to a digital copy
of something rare. So virtualization is a
digital copy of real things. Like the characters in computer games are the
digital copies of humans. In this example. These are the computer
game characters. They are the digital
copies of humans. These virtual copies are appearing to exist
if you see they are appearing to exist but not
exiting in the physical world. So they are not existing
in the physical world. We cannot, does them. This is the meaning
of virtualization.
3. Types Of Virtualization: In this video, we will see
types of virtualization. There are many virtualization
types available, like storage virtualization,
network virtualization. Let's talk virtualization
and server virtualization. In this course, we will
discuss server virtualization using VMware vSphere example to understand the
virtualization concepts. To understand the
server virtualization, we must understand
that traditional way to deploy the service first.
4. Section 2: Traditional Data-Centers: Let us understand
the traditional way to deploy the servers. The traditional datacenters or server roles, server room space. It is the row where we
install the server. So traditional server rules are filled with several
physical server. So if you visit any traditional server
room or data centers, you will see so many servers is stored in the server room. This example, we
have some racks. In each rack, you will
install the physical servers. If you see these racks are having multiple
physical servers, electron these physical
servers, okay, so we have multiple racks in our server room
or data center, and each rack will have
multiple physical servers. So you might be wondering why so many p's because servers, in their traditional
datacenters, the answer is, it is
a common practice to dedicate an individual server
with a single application. Let us say you have
one application. If you want to install
one application, you read one physical
server. If you want to. If you want to install
two applications, you need two physical servers. If you want to install
Android applications, you will need 100
physical servers. The ratio in their traditional data
center is one is to one.
5. Is Installing Multiple Applications On One Server Possible ?: In this section, we will discuss why this one is to one ratio. So after knowing that their traditional networks
follow one is to one ratio, you might be having
some questions like, can we install
multiple applications on one server or not? The answer is yes,
we can install multiple applications
on one server. Then you might be having
another question. The question is
if we can install multiple applications
on one server, Y to follow this one
is to one ratio. Why we are not installing all the applications
on one server? The answer is installing multiple applications
on one server is having some drawbacks.
6. Drawbacks of Installing Multiple Applications On One Server: We'll try to understand the
drawbacks using this example. Let us say our requirement
is true is further below services and applications
like Active Directory, DNS server, DHCP
server or web server, e-mail server, sequel
server run SAP. What we will do, we will take one physical server on the
top of this physical server, you will install any
server operating system. In this example,
we have installed Windows Server 2022
operating system. On the top of this
operating system, we will install the
services and applications like Active Directory,
DNS server, DHCP server, web server, evil Server and SQL Server, so that multiple services
are installed on one server. We can install multiple
services on one server. And these services are
accessed by the user. So imagine you have multiple
users in your network. These users will access these services while
operating system. Now let us see the drawbacks of installing them multiple
services on one server. The first drawback is if the operating system
gets corrupted, okay, let us say this operating
system gets corrupted. All the services are not
available to the user because the services are installed on this operating system and this operating system
is not available, so services also
are not available. This is the first robert. The second drawback is it will slow down the operating system. We are using only one
operating system here. This operating system is
serving that multiple users and we have installed multiple services on
this operating system. This operating system is
having so much of load here. So it will slow down
the operating system. And we can't install
the services like SAP, Oracle on Active Directory. So whenever we run Active
Directory on any server, it will not allow the
other services to be installed like SAP,
Oracle, et cetera. This is that third drawback of installing the multiple
services on one server.
7. One is to One Ratio Advantages: So to overcome these issues, we will follow one
is to one ratio, where we will purchase that dedicated server
for each application. Which means if you
have six applications, we will purchase six
physical servers. If we have 100 applications, we will purchase and
read physical server. So in our example, we have six applications
and services. So we have purchased six
servers, server one, server to server three, server for server Pi servers. After purchasing the
hardware server, the first thing you
will do is even installed on a server
operating system. So in our example, we have installed Windows
Server operating system on all the six servers. On the top of it, you will install the application
server one, we have installed Active
Directory on server two, we have installed DNS
server, and server three, we have installed web server or server for we have
installed sequence server, server Pi, we have SAP. On servers six, we have
installed email server. So let us see the
advantages of this. One is to one ratio. Let us say this operating system of e-mail server gets corrupted. So only this e-mail services
not available to the users. These users can access the other services
like Active Directory, DNS, web server sequence, SAP. You need to work
only on this server. This is the first advantage. The next advantage is you will get the better performance
from all the servers because we have a stalled the applications and services on separate operating system. Okay, so there is very less load on each operating system and you will get the
better performance. Fourth advantage is you can install the software
select sequence because we are using the separate server here to
install the Sequel Server. Active Directory will not stop this sequel server
to be installed.
8. Drawbacks of Traditional Data Centers: Dedicating one server
to one application is a traditional way of installing the server
send data center. This method has so
when you draw bags, will discuss about the drawbacks of traditional datacenters. That is, one is to
one ratio method. If you are dedicating
one server, one application, and if you have hundred applications and you need to purchase 100 servers. If you are using their
traditional way, you need multiple servers. If you are using
multiple servers, then you need multiple switches. And you need to do
a lot of capably. Then the next
drawback is there is a huge power consumption if you have multiple servers
in your datacenter. So there will be more
power consumption when you have a lot of servers. And you need to provide quality
for by seven oversupply. In case of power failure, we need to provide
the backup hazard or supply backup via
UPS and generator. And these generators
required here. So this is the UPS here, these are the generators and these generators
are required. Then the next one drawback is the traditional datacenters
required extra cooling. Why this cooling? Because servers and
related devices generate an enormous rate, which is the data must be
installed to make them whole. So if you have more
number of servers, they will generate more heat
and required extra Cooley. So in this example,
if you see you have installed is easier to
make the data-center core. We need largest space in their traditional data
centers because we installed multiple servers, multiple
networking devices. Then to manage the complete the additional
infrastructure, we need huge manpower. We need network engineers, engineers, technicians,
electricians, etc. In short, the
traditional datacenters. Because a lot of money,
the shocking parties, ie server in their
traditional data-center will utilize up to productive
per cent of its resources, which means we are wasting 80 per cent of resources
of each server. I've taken a screenshot
of one of the computers. If you see here, the CPU utilization
is two per cent here. Memory realization in 19% and the hard disk utilization is 0%. So imagine you are spending
a lot of money and we are utilizing only 20 per cent of the resources of each server.
9. What Is The Reason Of Installing The Traditional Data Center: Despite so many drawbacks
the companies were using, the one is to one ratio
only for one reason. And that reason is to provide a separate operating system
or separate application. In our example, if you see, we have provided a
separate operating system to Active Directory, separate operating system to DNS server operating
system cool. Web server separate
operating system to sequel server separate
operating system for SAP. Separate operating
system to e-mail server. Why we are providing this
operate Operating System, two separate application here to get the better performance. If this operating system
or eBay server goes down, other services are still available and all
the operating system are having a less float so they can give them
better performance. This is a reason
we are providing, we are using one is to one ratio in their
traditional network.
10. What Solution We Need ?: To overcome the drawbacks caused by traditional
datacenter, that is, one is to one ratio. We need a solution that allows us to run multiple
operating system on one physical server, which you will take
one physical server. On the top of this
one physical server, you will run multiple
operating system. At the same time. On the top of this
vertebral operating system, you can run different
applications. So we need this solution.
11. Server Virtualization Is The Solution: And the solution is
server virtualization. Will see what is this
server virtualization? Server virtualization. It is a technology that allows single physical server to run multiple operating
system at the same time. So what this server
virtualization will do, it will allow multiple
operating systems to run at the same time
on one physical server. With this, with this
technology, what he will do, you will take one
physical server. On the top of this
physical server, you will install virtualization software, this virtual address. So there's different
software. What it will do, it will help you create
the virtual machines. So we will create multiple
virtual machines here. So we need six
applications to be as far, so we will create six
virtual machines, 1234 by six on the top of this, each virtual machine, we will install a separate
operating system. If you see here,
Virtual Machine One is having its own
operating system. Virtual machine is having its own operating
system in the same way, virtual machine 3456, they are having their
own operating systems. On the top of this operating
systems you will install the applications like
Active Directory, DNS, web server, sequel server, SAP, Penn, e-mail server. Each application is getting its own operating system here, which is possible with this
server virtualization. And let us see their
traditional architecture and Watson architecture. With traditional
architecture, you will take the physical server
on the top of this physical server is taller. What operating
system on the top of the server operating
system human is fun. That application. With virtual architecture, you
will take physical server. On the top of this
physical server, you will install the
virtualization software, which is also called
as hypervisor. You will install
virtualization software. On the top of this
virtualization software, you will create multiple
virtual machines. Okay, Here we have created
six virtual machines. On the top of this virtual
machines you will create, you will install the
operating systems. On the top of this
operating system, you will install
the applications. This is the origin architecture.
12. Section 3: Virtualization History: Moving forward with
the virtualization, virtualization was
supposed to be limited in 1960s by IBM. Virtualization was developed
for mainframe computers. This is the main
perineal computer. Mainframe computers
are very big. If you see. It is a very big computer which took one big
hall to get is four. And they are very
expensive as well. And we can't afford to install only one application
on one computer, which means we can't afford to follow the one is to one ratio. For better utilization
of mainframe computers. Virtualization technology
was developed. Ibm has released an operating
system called STP CMS, or virtualization in 1960. In 1970, IBM has at least one more virtualization
software called VM. So these are the
virtualization software. So you might be wondering if this virtualization
technology has been there since 1960s. Why are we adopting it now? Let us try to understand the reason virtualization was developed for mainframe
computer architecture. It is developed for the
mainframe computer architecture. Today, computers like racks
or this is the Rack Server, and it is based on
X86 architecture. The architecture of
mainframe computer and Rack Server is different. We can't use the mainframe
virtualization software on exit is based on computers because the
architecture is different, so we can't use the mainframe softwares virtualize
the racks or was it tastes like we can't install the iPhone applications on
leukemias 3310 over here. So we can't install
the iPhone apps on Nokia's 3310 own here. In the same way, we can't use the mainframe computer
virtualization software. In X86 architecture computers. No company has developed the virtualization software for X86 architecture till 1999. Vmware is the first company to invent the virtualization for X86 platform in 1990s to address the under
utilization and other issues. So VM-Series, the first company to virtualize the
X86 architecture. That is why we are adopting
this technology before 1990s, we didn't have any solution to virtualize the
X86 architecture. We add the solution to virtualize only the
main frame computers.
13. Section 4: About VMware: In this section we are going to discuss what is the older. Most of the students think VMware
virtualization software, but it is a software company that develops
virtualization software. It was founded in 1998. Vmware provides Cloud computing and
virtualization software. The company was officially
launched in February 1999. The first product of VMware
is VMware workstation, which was delivered in May 1999. So VMware is not a
virtualization software. It is a company that
develops virtualization. Socrates.
14. First Company To Virtualize x86 Architecture: Vmware is the first company to invent the virtualization
for X86 platform. In 1990s, addressed the under utilization
and other issues.
15. VMware Customers: Vmware is a global leader
in X86 virtualized shared, put it, with over
400,000 customers, including 100% of
Fortune 500 company. So all the Fortune 500 companies are the VMware customers. And more than 80 per cent
of virtualized workloads. And a large percentage
of business critical applications are
running on VMware technology.
16. VMware Products: Vmware has multiple products
like vCloud Director, which is the Cloud
delivery service. We aware as G1, which virtualizes
the van connections. Horizon View, is used for
desktop virtualization. In app is used for
application virtualization. Nsx is used for network
virtualization. We sand is used for
storage virtualization. And we have v is here, which is used for a
server virtualization. In our course, we
are going to see how to virtualize the diverse, which means we are going to discuss vSphere,
VMware, vSphere.
17. Section 5: About vSphere: In this section we will
discuss what is vSphere. Vsphere is a VMware products used to virtualize
the X86 server. Server virtualization
product from VMware. Vsphere is not a
single software. It has multiple
components like ESX, psi, vCenter Server V motion and has been motion by
availability, fault-tolerance. We center single sign-on. So these are
multiple components. So we vSphere.
18. What is Hypervisor ?: We will discuss about these
two different components. One by one. We'll
see what is E6. So to understand
what is ESX size, we need to understand
what is hypervisor past. Okay, So let us see what
is the hypervisor first. Then we'll see what is ESX, say. Hypervisor virtualization
software is installed on the top
of physical server. Okay, this is a physical server. If we want to virtualize
X86 architecture, you need to install
the virtualization. This virtualization
software will create multiple
virtual machines. On the top of this
virtual machines, you will install the
operating system. On the top of operating system, you'll install that application. So we need the virtual
virtualization software to be installed on the top
of this physical server. This virtualization software
is known as hypervisor. The correct terminology of this virtualization
software is hypervisor. Virtualization
software is installed on the top of physical server. You can see we have one
physical server and we have installed the hypervisor on the top of this physical server. With the help of
this hypervisor, we can create multiple
virtual machines. So with the help of
this hypervisor, we can create multiple
virtual machines and we can run multiple operating systems on physical server
at the same time. At the same time, we can run
multiple operating systems.
19. Hypervisor Types: In this section, we will
see hypervisor types. There are two types
of hypervisors. Type one hypervisor and
type two hypervisor. Type one hypervisor directly on the hardware you will
take the server. Does say this is a
physical server. On the top of this, physicals
are on the top of this. Because there are hardware, you will install the
type one hypervisor. Type two hypervisor, you
will take the server, the top of the server. You will install the
operating system, any operating system like
Windows Server 2012 to two, or Windows ten operating system. On the top of this
Windows operating system, you will install the hypervisor, then you will create
the virtual machines. So type one hypervisor, it will run directly
on the hardware. Type two hypervisor will run on the operating
system like Windows ten. Windows Server 2020. Will discuss about
these two hypervisors, one by one in detail. First we will see
type two hypervisor. Then we will see what
is type one hypervisor.
20. Type 2 Hypervisor: Let us discuss about
type two hypervisor. Type two hypervisor doesn't
directly run on the hardware, is straight, it runs on
the operating system, will use type two hypervisor. What will you do? You
will take one computer. On the top of this computer. You will install the
operating system like Windows ten
operating system. On the top of this Windows
ten operating system, you will install the
type two hypervisor. On the top of this
type two hypervisor, you will create different
virtual machines. On the top of these
virtual machines, you will install the
operating system, installed applications
on the top of this operating system. This is how you will work
with type two hypervisor. It will not directly
run on the hardware. Type two hypervisor really show up in server-based
and even onwards. So we don't use type two
hypervisor in the real networks. And they are suitable
for individual PC users needing to run multiple
operating system without formatting their
current operating systems. Let us say you are a software developer
and you have one PC. This PC, you have already installed windows ten
operating system. And you have developed
on software and you want to test your software on different operating system
like Windows operating system, Windows Server 22
operating system, Linux operating system. But without formatting your
computer, what will you do? You will install the type two hypervisor on the top of this Windows ten
operating system. On the top of this
type two hypervisor, you will create multiple
virtual machines. On the top of this, these virtual machines you will install Windows 11
operating system, Windows Server 2022 operating is instrumental Linux
operating system. And you can test your software here without formatting here current
operating system. Type two hypervisor is
less secure than type one hypervisor because there is a mediator between type two
hypervisor and hardware. So here if you see this is a type two hypervisor and
this is the hardware. Between these type two
hypervisor and hardware we have the operating system which makes this type two
hypervisor less secure. And it is very slow as well. It is slower than
type one hypervisor. Again, the same reason we have the mediator between type two
hypervisor and heartburn.
21. Types 2 Hypervisor Examples: There are different type two hypervisors available
from different companies. Oracle, VirtualBox,
Microsoft has Microsoft Virtual PC and
VMware as VMware workstation. So these, these are the
type two hypervisors.
22. Type 1 Hypervisor: It is C type one
hypervisor in detail. A type one hypervisor directly on the
computers with hardware, as we have discussed, this type one hypervisor, it will run directly on
the physical hardware. So you will take one server. On the top of this server. You will install the
type one hypervisor. On the top of this hypervisor, type one hypervisor, you will create the different
virtual machines. On the top of this
virtual machines, you will install the
operating system, like Windows Server
operating system. On the top of this
operating system, you will install
the applications. If you see here, this is
the physical server here, and we're running that type one hypervisor on the top
of this physical hardware. And it will virtualize the
X86 architecture here, we can create them
multiple virtual machines. In this example, we have
created a virtual machine, virtual machine,
virtual machine three. In Virtual Machine, one, virtual machine, a
virtual machine. Through all these
virtual machines, we have installed the
operating systems. On the top of this
operating system, installed that application. So type one hypervisor and was directly on the
physical hardware. And it will directly
interact with the hardware resources
of the server, like CPU RAM, and
I see DVD drive. So hardware servers are having
the resources like CPU, RAM, and I see dividend IPCC. It is having the hardware
resources like CPU, RAM. And I see an DVD drive. This hypervisor will directly interact with these resources. And it is also known as
bare-metal hypervisor. Why it is known as a
bare-metal hypervisor because it is sitting
directly on the hardware. It is sitting directly
on the metal here. That is why it is known
as bare metal hypervisor. And type one hypervisor is highly appreciate because they have direct access
to the physical hardware. So this type one hypervisor, it is highly
efficient because it is interacting the
hardware directly. There is no mediator between
the hypervisor and hardware. And it increases the
security because there is nothing between
hypervisor in hardware.
23. Types 1 Hypervisor Examples: There are different type one hypervisors available
from different companies. Oracle as Oracle VM, Microsoft has Microsoft Hyper-V, VMware, hypervisor
Pauling VMware ESX site, which virtualizes
X86 architecture. So VMware hypervisor
name is ESX and ESX size they're responsible virtualize the X86 architecture, or we can say ESX size irresponsible to take the virtual copy of
physical hardware. Esx, the core component of VCRs. So guys, we have discussed that vSphere is having
multiple components, which includes ESX size. So ES6 psi is the core component because
this is the software. This is the operating
system which virtualizes the
X86 architecture. That is why it is a core
competence without this ESX, say there is no use of vSphere.
24. What is ESXi?: In our previous videos, we have discussed
what is hypervisor. Now, it will be very easy for us to understand
what this is. So let us see ES6 say in detail, ESX I stands for Elastic
is chi x integrated. Es6 I is the VMware's
type one hypervisor. So as we have discussed, type one hypervisor is installed on the top of
peace because server, so what you will do, you will
take the physical server. On the top of this
physical server, you will install the ESX side. After installing the ESX size, you can create multiple
virtual machines. So with the help
of this ESX site, we can create multiple
virtual machines. Vm1, VM2, VM3. We young poor. And on the top of this virtual, virtual machines, we will
install that operating system. Okay, we'll install
the operating system. And we can run these
multiple operating system on the same physical
server at the same time.
25. ESXi Shares The Resources With VMs: Esx, say share the resources of physical server with
multiple virtual machines. So in this example, you can see we have
one physical server. On the top of this
physical server, we have installed ESX, say on the top of this. Yes, except we have created
three virtual machines. Vm1, VM2, VM3, okay, then we have installed the operating system on
each virtual machine. Then we have installed
the application on top of this operating system. This physical server is
having some resources like CPU and I see, and DVD drive. Okay, these are the
physical resources of this physical server. So what this ESX I will do ES6, I share the resources of
peace because server, it will share this ESX. I will share the resources of this physical server with
these virtual machines. Okay? And resources are
nothing but you can say CPU RAM and I see
deviated, right? And the server with ES6 I installed is reported to
ask the host or ESX host. This server is having the ESX
size store and this server is referred to as
post or ESX cycles. And the most important part is this ES6 I is a core
component of vSphere.
26. What is DCUI ?: In this section we will
discuss about VCU. Or VCU is transport direct,
solely user interface. And it is a consoler ES6
site. This is the console. This is x, this is a DC, or it is used to do the initial configuration
of ESX hosts like volunteering the
host name or IP address, subnet mask, default
gateway, et cetera. To access the CuI, you need to be physically
available in front of server. You will access the
server directly. The CUI is used for
initial configuration or we can't perform the advanced things like
creating virtual machines. Which is why at the
CuI, if you see here, we don't have any option to create the virtual machine
or versus suggests here, which means we can't perform
the advanced things. Why DCI? It is used to do the
initial configuration only. To perform the
advanced things like creating virtual
machines switches. We need to use the
VMware host client.
27. VMware host client: In this section we will discuss
what is VMware postcard. It is used to perform
the add one things like creating virtual machines
or just switches. So if you want to create a virtual machine,
virtual switch, you will use VMware was glide, and this is the
VMware host plant. And if you see here, it is having the option to
create the virtual machine. So we can create the
virtual machine, we can manage the storage. And with the help of
this networking option, we can create the virtual
switches has been so it is a web-based application
and it is used to manage only one year
post per session. Let us try to understand what is the meaning of this
session sentence. So let us say we have
taken one physical server. On the top of this
physical server, we have installed ESX, say, we have configured the IP
address 192 dot 68 dot 148, or ten on this ESX
host using VCU, I know we want to create
the virtual machine. We want to manage this ESX host. So what will you do? You will access this ESX host
from your laptop remotely. You will open the browser and you will type
the IP address, 192 dot one, dot, one dot. Then you will get
this interface. Okay? So here we have only
one ES6 I host, and we're accessing
this ESX host, promote our laptop remotely
using one session. Let us say in your environment, you have multiple ESX host. Okay, let us say
you have ES6 side1, side2, ES6 side three, ESX size, port and IP
addresses of these ESX host. 19168 dot 140-190-1608 dot 1, 404-190-1608 dot one dot 301-90-1608 dot one for t dot. We have poor ESX hose. And if you want to manage all the poor ESX host
using VMware host client, we need to create four sessions. Let us try to understand what
does it mean by creating or sessions for managing
the poor ESX host? So if you want to
manage the ESX host, okay, you will manage
it by your PC remotely. You will take the PC. And if you want to
manage the ES6 i1, you will open up a
browser and you will type the IP address of ES6
HIV-1 190 two.16 shared. What? One for t.na separate
session is created. If you want to manage
the ESX Hosts to, again, you will
open the browser, then you will type
the IP address. 192.1.1.20 is second session is created for the
other ESX host. Okay, So prayer
session is created. So in this example,
we have created four sub units such as to
manage the board ESX cycles. If you have hundreds of
ESX host in your network, you will create 100 sessions. So let us say you
don't want to create a separate session or
separate ESX host. You want to manage all the
ESX host with one session, then you will use
vCenter Server.
28. Section 6 : vCenter Server: In this section, we will
discuss about vCenter Server. Vmware. Vcenter Server is an advanced sort of work
management software. So vCenter Server is a software. It is used to manage multiple ESX host with
one session centrally. So let us say we
have or ESX cycles. We have ESX psi one. He is excited to ES6 site three years except for the IV doses of this
or hosts are like 192 dot 168 dot 140-190-1608 dot one for t dot 201-90-1608
dot one for t dot, one, dot 168 dot one for T dot. And we want to access
all the ESX host, we want to manage them. So instead of creating or
separate sachets here, what you will do, you
will take one server. On this server, you will install
vCenter Server software. After installing
the vCenter Server software on this server, you will configure
an IP address. Let us say the IP address
of this vCenter Server is 192 dot one dot 14000. Then you will add all
the four ESX host. This vCenter Server. After adding all
the four ESX host. So this vCenter Server, we will manage them from our PC. You will go to your
PC and you will open up a browser
and you will type doc IP address of
this vCenter Server 192 dot one dot 14000. And you will be connecting to the vCenter Server with
the world session. I, like VMware host client. With one session, you will
accept the vCenter Server. Via vCenter Server,
you will access, you will manage the
multiple ESX size hosts. So in this example, if you see we have
three ESX host 123 and we have one
vCenter Server. We have added all
the three ESX host with this vCenter Server. And we're managing this
to be as excited host from the web client via vCenter
Server with one session.
29. Other Uses Of The vCenter Server: Besides managing the multiple ESX host
premise central point, vCenter Server is
mandatory who use the advanced features like V
motion and has been motion, high availability, all distributed resource
scheduler, VM cloning. And much worse, if you
don't have vCenter Server, you cannot use these
advanced features of VMware vSphere or we cannot use these
components of VMware vSphere will
discuss about this. Jersey one-by-one.
30. Section 7 : vMotion: In this section, we will
discuss about emotion. The migration of a
live virtual machine from one host to another
host is called B motion. Let us try to understand what is the meaning
of this sentence. With this example. Let us say we have
one physical server. And on the top of this
physical server we have installed ESX size. And it will become
the ESX host letters say the host name is ES6 I1. Then on the top
of this ES6 site, we will create three
virtual machines. We have View Virtual Machine, one, virtual machine,
virtual machine three. On the top of this
original machine, we have installed the
operating system, server operating system. Then on the top of
this operating system, we have installed applications. Applications like sequel server. This is our database
server that we have is for web server, an
Active Directory. And these services are
accessed by the users. Okay, everything
is working fine. Opera sometimes this ES6
i1 is running very slow. It is giving some issues. Okay, so to fix
this, the issues, we need to shut
down this server. If you shut down this ESX host, these services will not be
available to the users. This is the problem here. If you have only one ESX
host in your network, and if it is down, all the virtual machines will not be available
to the users. So what you will do, you
will take one more ESX host. You will take one more Server. Is installed on the
top of this server. And it has say it is ESX cycle. So this ESX i1 is
having some issues. It is a running variable. We need to fix it. We need to
do the maintenance of this. Esx. I1 will do the maintenance. We need to shut it off. So we will not read
this ES6 I1 right away. Before shutting it down, we will migrate the
virtual machines of this ESX, psi1, psi2. And the procedure, the method of migrating the live
virtual machines from one host to another
host is called V version. So we version is used to migrate the live virtual machines from one host to another host
without affecting any services.
31. vMagic: This is the beauty
of virtualization, or this is the
beauty of V motion, where we're migrating the
live virtual machine from one server to another server without affecting any services. Servers will be working. During the migration. Vmware referred this
technology as B version. But for me, it is a V magic.
32. Storage vMotion With Examples: In this section, we'll discuss
about storage v Moshe. Storage we motion
is used to migrate the live virtual
machine pies from one is storage to
another storage during maintenance or upgraded. This turn, this sentence. To understand what is
historically motion, we need to have the understanding
of virtual machine. So first we will see
what is Virtual Machine, then we'll discuss
are what is storage? Virtual machine? Is this software computer? Software computer means it is a collection
of multiple pies. Okay, so multiple phi's
makes one virtual machines. So these files must
be saved somewhere. So these files are
saved on history. So let us take this example. Who understand what
is a storage emotion? What is virtual machine? Let us say we have
one physical server. On the top of this physical
server we have is hard. He is on the top of this ES6. Ivf created some
virtual machines. Vm1, VM2, VM3, as
we have discussed, it is a software computer and it is the collection
of multiple pi. So these files must
be saved somewhere. So these files are
saved in a storage. This is storage
will have the VM1, VM2 pies, vm three pies, okay. All the virtual machine
pies are saved in. This is storage. Let us say it is the storage, but after sometimes
you want to upgrade it appeared this is storage we need to unwanted
from the physical server. If you unmanned the storage
from the physical servers, all the files will
not be available, which means all the
virtual machines will not be available
to the users. So what is the solution? Solution is, you will
attach one more storage. Let us say it is a storage pool. And before unwanted
data storage one, you will migrate that
you will migrate that buys from a storage
pool is storage. So how will you migrate these files from one storage
to another disorder? Using the storage, we will share technology using a
storage V motion. We can move the pies from one storage to
another is for easy. So let us see the storage. We motion definition
one more time. The storage, the motion
is used to migrate the live virtual
machine pies from one is storage to
another storage during maintenance
or off period. In this example, if you see
we have the physical server. On the top of this physical
server we have is called ESX. On the top of this
ES6 have we have created or virtual machines,
virtual machine 123.4. And these virtual
machine pi star is stored in the storage here. So we have a storage one. And storage to all the
virtual machine files are stored in the
storage on your thighs. Vm2 and VM3. We own four piles are
extraordinary storage on. And if you want to migrate these files from the storage
one to a storage pool, you will use the
storage of emotion.
33. Understanding Enhanced vMotion With Example: In this section,
we'll see and asked the motion has been
motion per palms. Emotion and storage be
more shampoo guitars. So it is a combinational. We more Shannon and
storage we emotion. If you see this example here, it is having 2 v, ESX, i1 and i2. And we have created one virtual
machine on use excitable, and we have two storage. Storage is storage. What these enhance
the emotion will do, it will migrate the
live virtual machine from one host to
another is excels. At the same time,
it will migrate the virtual machine pies from one storage for
another research.
34. Section 8 : vSphere High Availability (HA): In this section we will discuss about vSphere high availability. Vsphere high
availability provides high availability for
virtual machines. If any host phase, the virtual machines or failed hosts are restarted
on alternate or so. We'll try to understand these two sentences with one example that we'll
come back to this slide.
35. High Availability Example: Let us say we have ESX cycles. This is E one. And we have created
some virtual machines. Or this ESX cycles VM1, VM2, and VM3, and
we have ES6 psi2. Now let us see this. Esx I1 goes down abruptly. We don't have any chars. We don't have any
time to migrate the virtual machines from
ESX them onto ESX or two, it is down every roughly. Now what this HA will do, it will restart the
virtual machine of this period of host
on another ESX host, which is working fine. So guys, this high
availability is restarting the virtual
machines on another host, which will be a downtime. The virtual machines will not be available to those users for some time because it is restarting the virtual
machines here. Retained get any time to migrate the live
virtual machines. So you need to
remember this point. With HCA. They will be downtime. So it provides high availability or Virtual Machine
if any host phase. Here in this example,
if you see this is ESX i1 and it is ES6 or two ESX. Everyone is where
the virtual machines of this spill host are you
started on alternate or so all the virtual machines or this ES6 islands are restarted in ES6 site with HA you
will have downtime. Virtual machines will
not be available for some time because it is really starting them
on another host. Virtual machines are
being restarted. There will be a downtime. Virtual machine will not be available to the
users for some time. If you see we have U6, say one ES6 side to side goes down and all the virtual
machines or restarted on ES6.
36. Seciton 9 : Fault Tolerance (FT): In this section, we will discuss about fault-tolerance or f t. Fault-tolerance provides
high availability for virtual machines with no downtime unlike
high availability. So let us try to understand this sentence with this example. Notice here we have
two ESX hosts, ES6, i1, and i2. And on this one we have
one virtual machine, Vm1. And it is the mission
critical virtual machine, which means it should
run 24 by seven. It should run without
any downtime. So for that, what you will do, you will enable fault-tolerant. When you enable the
fault dominance, what will happen if
this ESX I1 goes down? This vm1 will immediately start working on ES6 psi2
without any downtime.
37. How Fault Tolerance Works?: In this section, we will see
how fault tolerance works. Fault-tolerance provides a
continuous availability of virtual machines by creating
a live shadow is trans, or a virtual machine
on another ESX host. We'll try to understand these
centers using one example. In this example, we
have two ESX hose. One is ESX, one, another one is ESX settle. On top of this ESX L1, we have created one
virtual machine, and we want this virtual machine to run cruelty four by seven. It should be available 24
by seven to the users. So what you will do, you will enable the port on is when you enable the
fault on arrays, it will create this
fault-tolerance. We'll create the
shadow virtual machine on another ESX cycles, so it will become
primary virtual machine. The other virtual machine will be the shadow of
this virtual machine. If this ESX I1 goes down, this shadow virtual
machine will become the primary Virtual Machine and it is available
to the users. And one more shadow will be created on another ES6 I host. This is how this fault
tolerance works. This is, it will make the virtual machines available
24 by seven to the users.
38. Section 10 : Distributed Resource Scheduler (DRS): In this section we
will discuss about the distributed the
resource scheduler, which is also known as DRS. Drs is a load balancing
solution vSphere. It migrates virtual
machines from over utilized ES6 I equals to n under utilized ESX
host for load balancing. Let us try to understand these two sentences
with this example.
39. DRS Example Full: Imagine we have ESX hosts. Es6, say E1. And E is excited to ESX i1 is having
some virtual machines. Let us say it is having
virtual machine one, virtual machine,
virtual machine three. And virtual machine for ES6 or two is having only
one virtual machine, which is V of Pi. Our virtual machine pipe. This ESX i1 is utilizing 90
per cent of its resources, resources in the
essays, RAM and CPU. And out of this, 90%, 50 per cent of resources
are utilized by V01. Cruelty per cent of resources
are utilized the VM2, ten per cent of resources
are utilized by VM3. Ten per cent of resources
are utilized by Vm for whereas this ES6 i2 is utilizing only ten per
cent of its resources, which is utilized by this video. But now this DRS will monitor both the ESX host and
it will find that there is no balance
between ESX psi1, psi2. So to balance this
to ES6 I host, it will move some
virtual machines from ESX I want to erase, etc. So let us say this GRS
will move vm 2341234. Okay, it was utilising cruelty
per cent of resources. It was utilizing ten per
cent of resources and it was utilizing ten per cent
of resources that VM for. Now, this EAC excite two is utilizing 50 per
cent of its resources. And ESX server is also utilizing that 50 per cent
of its resources. Now, both the ESX
host are balanced. Esx i1 is utilizing 50
per cent of resources, and ES6 i2 is also utilizing
up 50 per cent of resources. Drs will do the load
balancing based on the resource utilization. It will not do the
load balancing based on the number
of virtual machines. If you see ES6 ion is having
only one virtual machine, but it is utilizing 50
per cent of resources. Whereas ESX i2 is having
poor virtual machines. And this poor virtual machines together utilizing up 50
per cent of resources. So the load balancing will be done based
on the resources, not based on the
virtual machines.
40. DRS Uses vMotion: So DRS is a load
balancing solution for vSphere with Margaret is the virtual machines from overutilized ESX host when under utilized ESX host
for load balancing. Drs migrate the virtual machine is between ESX I was
using VMware friends. So it will use this
V motion technology to migrate the virtual machines
from one host to another. Host port will load balancing.
41. Section 11 : Single Sign On (SSO): In this section we
will discuss about the vCenter single sign-on, which is also known as SSO. Single sign-on is an
authentication service. It allows a user to log into multiple vSphere components
like vCenter Server, vCloud Director, etc,
with this signal ID. So as we all know, vSphere is having
multiple components like vCenter Server or vCloud Director to
access them to login. These are different components. We don't need to create
separate accounts. With the help of
this single sign-on. We can login to these different services
with a single ID. Like you access the
multiple applications of Google with one account. As we all know, Google is having multiple applications
like Google Search, YouTube, Play Store, google
use Gmail, meet, etc. So to access these services, we don't create a
separate account. With the help of one account. We access all the
different applications. Or is it possible? It is possible
because of this SSO, Google is also using
single sign-on. With the help of
this single sign-on, you access all the
other application, all the multiple applications
with one account.
42. SSO Supports Multiple Identity Sources: Vcenter single sign-on supports multiple identities sources like Active Directory
and opened a lab. What is this identity source? This, it is source is used
to save the user a course. So we have different
identities sources available in market. Microsoft uses Active Directory,
Linux uses open-ended.
43. Section 12 : About Virtual Machine: In this section, we
will see what is a virtual machine in detail
in our previous videos, we have seen that we can create multiple virtual machines on the top of this physical machine using virtualization software. But we don't know the
characteristics of virtual machine. What are the advantages
of virtual machines? So we're going to cover what
is virtual machine first. Then we will see the
characteristics of virtual machine. Then we are going to cover the advantages are
virtual machine. Virtual machine is a
water channel copy of a physical machine. It is also referred to as
the software computer. So virtual machine is
a software computer. And a virtual machine is
made up of multiple pi. So whenever we create a Virtual Machine is
multiple files are created. And if this virtual
machine is nothing but a set of files that
are stored on a story. So guys, as we have discussed,
whenever we create, a virtual machine is created and these files
are stored on a storage.
44. Virtual Machine Functionality: In this section we will see the virtual machine
functionality. Virtual machine provides the same functionality
as physical machines. So it will work like
a physical machine. It runs an operating system and applications like
a physical machine. So on physical machine we run any operating system like Windows operating system,
Linux operating system. The same way. We can run Windows
operating system, Linux operating system
on the virtual machine. And we can run the
applications as well. And it has additional
benefits in terms of portability, manageability,
and security.
45. Virtual Machine Resources : In this section we will discuss about the virtual
machine resources. Physical machines have physical
resources like processor, memory, graphic card, NIC, card, storage,
keyboard, mouse, etc. And virtual machines have the virtual resources
like virtual processor, virtual memory,
virtual graphic card, or MAC, or jewelry storage, virtual keyboard and mouse. But internal resources are stored in a storage
in the Obama points.
46. Virtual Machine Files : In this section we will discuss about virtual machine pies. As we have discussed earlier, the virtual machines are
made up of multiple pi. So a Virtual Machine
consist of several pies. Data is stored on
a storage device. Let us say we have created
one virtual machine. It will create multiple piles. And these multiple
pi star is stored on a storage device and
a virtual machine. Key files are configuration
file, virtual disk file. And we ran setting
files and log files.
47. Virtual Machine File Format: In this section we
will discuss about Virtual Machine file format. So when you create
a virtual machine, you need to assign a name to it. Let us say we have created one virtual machine
and we need to assign a name to this
virtual machine. Imagine we have
assigned one name, like Windows Server dashed one. This is our virtual
machine name. And the files are created with this virtual machine names like Windows server
one dot NV RAM, Windows server one dot vm, DKA, Windows server one dot VMX. So this is a file format.
48. Configuration File: In this section we
will discuss about the configuration file dot VMX is the virtual machine
configuration file. This is the VMX file. And it contains virtual
machine hardware information like our mini CPUs and NICs are available in
the virtual machine. How much RAM is available
in our gel material, this file is having the hardware information
of the virtual machine.
49. NVRAM File: In this section we
will discuss are what we ran settings file, which is also referred
to as dot n where m. Okay, so if you see here, we have this dot enemy ran pile, and it stores the state of virtual machines
bios settings. So this dot NV RAM file is now having the
virtual machines bios information and changes made to the bios settings are saved
in that dot and we remember, so whatever the changes you are making in
their bios settings, they are saved in
this dot n where m file or we can say
this dot NV RAM pile, either buy or sell
virtual machine.
50. Log File: In this section we will
discuss about the log. Log pile saves the
virtual machine logs. Okay, So this is the
log pi and of polynom, of this log file
is vmware dot loc. It doesn't have the
virtual machine name. And what is the use
of this log piracy? If there is any issue
in your network, if there is any issue
in your infrastructure, VMware support will fix the
issue after investigation. Logs in the log file. Okay, so even a problem
is there in your network, you will contact
that VMware support. They will ask you to
provide the log file. They will investigate
the log messages and they will fix the issue.
51. VMDK File Full: In this section we will discuss about virtual machine disk file. Lot VMD k is the virtual
machine disk file. This is the.vmd k. And it is a virtual hard disk of a virtual machine where
you save that data. In physical machines, we
have physical hard disk. In virtual machine we
have virtual hard disk. And.vmd k is the
virtual hard disk where we save that data. So these are the files
of a virtual machine. Virtual machines or having some other pies which you will learn in
the advanced course.
52. What Are Virtual Machine Characteristics : In this section, we will discuss about four key characteristics
of virtual machine. Virtual machines are following characteristics
like compatibility, isolation, encapsulation,
hardware independence, which offer several
benefits to users. We will discuss all these
four characteristics one by one in detail.
53. Compatibility: In this video, we will discuss
about virtual machine. First characteristic,
that is compatibility. So in our previous videos, we have discussed
virtual machine provides the same functionality
as hardware machine. So virtual machines
are compatible with all the X86 operating systems, applications and device drivers, which means we can
run the same software is that you would run
on physical machine. Okay, so you can run all
the same softwares on virtual machines that you would run on a physical machine. This is the meaning
of compatibility. So all the softwares, all the X86 or face are
compatible with virtual machines.
54. Isolation : In this video, we
will discuss about the second characteristic of virtual machine,
which is isolation. Will try to understand
what is this isolation, what is the advantage of
isolation with this example? In this example, if you see
we have one physical machine. On the top of this
physical machine, we have created three
virtual machines. Virtual machine, one,
virtual machine, and virtual machine three, all these three
virtual machines, Our sharing the resources
of same physical server. Even though they are sharing the resources of same
physical machine, they are isolated
from each other. Isolated means they are not
connected with each other, but they are not
dependent on each other. So what is the advantage
of this isolation? If one virtual
machine gets crashed? In this example, let us say
virtual machine gets crashed. It will not affect Virtual Machine one N
virtual machine three. These two virtual machines
remain available to the users. This is the advantage
of isolation if you see the sentences here. While virtual machines where the resources of same
physical machine, but they remain completely
isolated from each other, so they are independent
of each other. If one virtual machine crashes, in this example,
VM2 gets grabbed. The other two virtual machines
will not be affected. So Vm1 and Vm2, they will not be affected. And they remain
available to the users.
55. Encapsulation : In this section, we
will discuss about the third virtual
machine characteristics, which is encapsulation. As we have discussed, virtual machine
is a set of pies. If you create a Virtual Machine, multiple files are created. What this encapsulation will do. The encapsulation saves all the virtual machine
files in one capsule. Encapsulation will save
all these files in one capsule are in one
folder on a storage device, which makes Virtual
Machine portable. Because all files are saved
in one capsule or table. We can move the virtual
machine from one ESX host to another host very easily because we are moving
Virtual Machine, which means we are moving the older from one host to
another ES6 I host. This is a user encapsulation. You can move and copy. Virtual machine is
like moving and copying the regular computer pi. So it is very easy to move
the virtual machines from one host to another host because all the files
are saved in one folder. So moving is like moving
that regular pile, moving the virtual
machine is like moving the regular file from one
host to another ESX host. What it will encapsulate, what this encapsulation
will encapsulate. It will encapsulate all the virtual machine
pies operating system and its application in one
capsule or one folder. In this example, if you see, we have created three
virtual machines. Virtual machine, one,
virtual machine, and virtual machine three, all these three
virtual machines are having operating system
and applications. All the files are saved in separate folder of
each virtual machine.
56. Hardware Independence: In this section, we
will discuss about the fourth virtual
machine characteristic, which is hardware individualist. Let us try to
understand what does it mean by hardware
and liberalism. The virtual machines are
hardware independent, which means we can migrate
the virtual machine is from Intel architecture
to AMD architecture, because the virtual
machines are set of Pi. So in this example, if you
see we have two ESX host. This ESX host is having Intel architecture and this ESX host chase
AMD architecture, but we can move the
virtual machine is from architecture ESX hose to
AMD architecture ESX host. Because of virtual machines
or the set of files, they are compatible with
every architecture.
57. VM Cloning full: This video, we will see
what is a virtual machine. We only, we only thing is the process of creating an
exact or P on virtual machine. You see this example
here we have one virtual machine with
the help of threonine. We have created the exact
copy of this virtual machine. So what is a clone here? A clone is a copy of an
existing virtual machine. So this is the primary
Virtual Machine or period virtual machine. We have created the clone of this period virtual machine
and clone as same hardware, software and other configuration as original Virtual Machine. This loan will have
the same software, same operating system, L, same virtual hardware as well. The existing virtual machine called parent of the purines. So this original Virtual
Machine is known as parent, and a copy of this parent
is known as clone. Clone. Operation is completed, okay, when we create the copy, when we create the loan, the loan is a separate
virtual machines. So this clone will be a
separate virtual machine. Let us discuss what is
the use of curriculum. Goals are useful when
you need to create multiple virtual machines with the same operating
system and applications, imagine you have
a requirement to create hundred virtual machines. Width will lose 11
operating system, an MS Office application. So what you will do, you will
create virtual machines. After creating 100
virtual machines, you will install
operating system on all the Virtual
Machines one-by-one. Ledoux, we'll install the
MS Office application on all the virtual machines, which will take a lot of time. So instead of that,
what you will do, you will create one
virtual machine. On the top of this
virtual machine, you will install windows
11 operating system. On the top of this window
is 11 operating system, you will install MS Office. After that, you will
create 99 clones, which will save your time. Installing a guest
operating system and application can
be time-consuming. And with clause, you
can make many copies of a virtual machine from a single installation and
configuration process. So you need to create
only one virtual machine. And you can create
multiple clause from this virtual machine.
58. What is the use of Clone : Let us discuss what is
the use of piccolo. Those are useful when
you need to create multiple virtual machines with the same operating
system end applications, imagine you have
a requirement to create 100 virtual machines. Width will lose 11 operating system and
MS Office application. So what you will do, you will create 100 virtual machines. After creating 100
virtual machines, you will install
operating system on all the Virtual
Machines one-by-one. You will install the
MS Office application on all the virtual machines, which will take a lot of time. So instead of that,
what you will do, you will create one
virtual machine. On the top of this
virtual machine, you will install Windows
11 operating system. On the top of this window
Sullivan Operating System, you will install MS Office. After that, you will
create 99 close, which will save your time. Installing a guest
operating system and application can
be time consuming. And with clothes, you
can make many copies of a virtual machine from a single installation and
configuration process. So you need to create
only one virtual machine. And you can create
multiple clause from this virtual machine.
59. Flexibility: In this video, we will
discuss about flexibility. Virtual machines are flexible. What does it mean by flexible? You can move the
virtual machines from one ESX host to another host easily because
they are set of Pi. So in this example we have ES6, i1, and ESX R2. And we can move the
virtual machines from one ESX host to
another host easily. Because the virtual
machines are flexible, because of virtual
machines are set up piles.
60. Security full: In this video, we
will discuss about security in virtual
machine advantages. To understand the security
concept in virtual machine, we will take this example. In this example we have
one physical machine. On the top of this
physical machine, we have created three virtual
machines and let us say VM1, VM2, and VM3. And let us say VM2 gets infected with malware
like ransomware. This virtual machine
will contain the damage made by these
malware to itself. And the other two virtual
machines will not be affected. And they remain
available to the users because the virtual machines are isolated from each other. This is how it provides the
security to virtual machines.
61. Backup full: In this video, we will discuss about virtual machine backup. Virtual machines can be
backed up periodically. In this example, we have
one physical server. On the top of this
physical server, we have four virtual machines. Virtual machine 123.4. And we have discussed that virtual machines are nothing
but the collection of pies. And we have one backup server. This backup server is
responsible for taking the backup of these virtual machines
periodically, periodically miss. You will set one time, let us say at 10:00 P.M.
the backup should be taken. Server will take the
backup every day at 10:00 P.M. and it
will save this backup. It is backup repository. Okay? So virtual machines
can be backed up periodically and the backup
server creates a copy of virtual machines and save it on a backup repository that can be restored later in
case of disaster.
62. Restore : In this video, we will see when and where to restore
the backups. So you can restore the
virtual machines to the original location in case of ransomware attack and
virtual machine failure. So in our previous video, we have seen that we have
taken the backup of this for Virtual Machine and it is saved in this
backup repository. Let us say this virtual machine for is infected with
ransomware attack. In this case, what we
will do given restore the virtual machine pore
at the same location. And this virtual machine
for really start working. And let us say this Virtual
Machine one is down, it is not working at all. In this case also,
you will restore the backup at the same location
and this Virtual Machine, one really start working fine. You can restore the
virtual machines to a different location. Let us see how in this
example we have yes, X i1 and i2 and we have taken the backup of this board virtual machine. And let us say this
ESX host is down, the physical server is down. In this case, we cannot restore the virtual machine
adverse same location. We need to restore the virtual machine
at depend locations. So we will restore the
virtual machine on ESX setup. And the restoration
process is very fast. We can restore the
virtual machine is in human years, unlike
physical environment.