Explain security concepts such as two-factor authentication, key management and cluster lockdown

Two Factor Authentication You can enable two-factor authentication for users through a combination of a client certificate and/or username/password to address stringent security needs. Key Management Nutanix supports key-based SSH access to a cluster. Adding a key through the Prism web console provides key-based access to the cluster, Controller VM, and hypervisor host. Each node…

Read more...

Describe how Nutanix provides cluster security

User accounts control access, and the web console allows you to set the authentication method (see Configuring Authentication). Nutanix uses SSL to secure communication with a cluster, and the web console allows you to install SSL certificates (see Installing an SSL Certificate). Nutanix supports key-based SSH access to a cluster, but you have the option…

Read more...

Use the REST API Explorer to retrieve and/or make changes to a cluster

REST API Methods The HTTP verbs comprise a major portion of our “uniform interface” constraint and provide us the action counterpart to the noun-based resource. The primary or most-commonly-used HTTP verbs (or methods, as they are properly called) are POST, GET, PUT, PATCH, and DELETE. These correspond to create, read, update, and delete (or CRUD)…

Read more...

Identify how to download and configure tools and applications like Prism Central, Cmdlets, and REST API

Prism Central Coming Soon PowerShell cmdlets Sign in to the Nutanix web console. Click the user icon in the upper-right corner of the web console and select Download Cmdlets Installer. After the installer completes downloading, double-click the installer and follow the prompts. The cmdlets are installed and a desktop shortcut NutanixCmdlets is created. Double-click the…

Read more...

Differentiate between Pulse and Alert technologies

Pulse After you have completed initial setup, created a cluster, and opened ports 80 or 8443 in your firewall, each cluster sends a Pulse message once every 24 hours to a Nutanix Support server by default. Each message includes cluster configuration and health status that can be used by Nutanix Support to address any cluster…

Read more...

Describe, differentiate and utilize nCLI/aCLI to configure and monitor a cluster

Acropolis CLI (ACLI) The Acropolis CLI (aCLI) is used for managing the Acropolis portion of the Nutanix List hosts: host.list Create network: net.create [TYPE].[ID].[VSWITCH] ip_config=[A.B.C.D]/[NN] #Example net.create vlan.133 ip_config=10.1.1.1/24 List network(s): net.list Create DHCP scope: net.add_dhcp_pool [NET NAME] start=[START IP A.B.C.D] end=[END IP W.X.Y.Z] Note: .254 is reserved and used by the Acropolis DHCP server…

Read more...

Utilize Prism Element to configure and monitor a cluster

The web console is a graphical user interface (GUI) that allows you to monitor cluster operations and perform a variety of configuration tasks. Nutanix employs a license-based system to enable your entitled Nutanix features, and you can install or regenerate a license through the web console (see License Management). You can upgrade a cluster when…

Read more...

Identify methods for managing a Nutanix Enterprise Cloud

Interfaces HTML5 UI, REST API, CLI, PowerShell CMDlets, etc. Management Policy definition and compliance, service design and status, analytics and monitoring

Read more...