An administrator is deploying a new application to a Nutanix Enterprise Cloud. The application requires a security to prevent unauthorized access. The application also uses many non-standard ports that are unique to it. Security should not be changed for existing applications.
What should the administrator do to meet these requirement?
An administrator has a 32-node hybrid cluster with CPU, RAM and storage utilization of 80%. A database VM is configured with VM Flash.
What is causing this IO latency?
The networking team makes changes to the Top of Rack switches to which the Nutanix cluster are attached. A few VMs are able to communicate with each other on the same node but are unable to connect to other parts of the network.
What is the likely cause of this issue?
Refer to the exhibit.
An administrator logged into Prism Element, notices the following in the home dashboard, and showing the exhibit.
Which action should the administrator take next?
A customer has a four-node cluster and is using Volume Groups to provide storage services to a SQL cluster.
In the event of a CVM failure in the cluster, what is the expected IO path of the volume group's iSCSI targets?