Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE Guide d'installation

Naviguer en ligne ou télécharger Guide d'installation pour Serveurs Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE. Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE Installation guide [en] Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - Red Hat Enterprise Linux 6

Dayle Parker Laura Novich Jacquelynn EastScott RadvanRed Hat Enterprise Linux 6Virtualization Getting Started GuideAn introduction to virtualization c

Page 2

Chapter 1. IntroductionThe Virtualization Getting Started Guide introduces the basics of virtualization and assists with thenavigation of other virtua

Page 3

Red Hat Enterprise Linux — Virtualization Getting Started Guide: This guide provides an introductionto virtualization concepts, advantages, and tools,

Page 4

NoteAll of the guides for these products are available at the Red Hat Customer Portal:https://access.redhat.com/documentation/en-US/Red Hat Ent erpri

Page 5 - Table of Contents

Chapter 2. What is virtualization and migration?This chapter discusses terms related to virtualization and migration.2.1. What is virt ualizat ion?Vi

Page 6 - 1. Document Convent ions

An offline migration suspends the guest virtual machine, and then moves an image of thevirtual machine's memory to the destination host. The virt

Page 7 - 1.2. Pull-quot e Convent ions

NoteFor more information on V2V, refer to the Red Hat Enterprise Linux 6 V2V Guide.⁠Chapt er 2 . What is virt ualiz at ion and migrat ion?11

Page 8

Chapter 3. Advantages and misconceptions of virtualizationThere are many advantages to virtualization and perhaps an equal amount of misconceptionssur

Page 9 - 2.2. We Need Feedback!

This is no longer the case; modern virtualization technology has greatly improved the speed ofvirtual machines. Benchmarks show that virtual machines

Page 10 - Chapter 1. Introduction

SELin u xSELinux was developed by the US National Security Agency and others to provide MandatoryAccess Control (MAC) for Linux. Under control of SELi

Page 11 - ⁠Chapt er 1 . Int roduct io n

deployment suited to Red Hat Enterprise Virtualization may include databases, tradingplatforms, or messaging systems that must run continuously withou

Page 13 - 2.2. Migrat ion

Chapter 4. Introduction to Red Hat virtualization productsThis chapter introduces the various virtualization products available in Red Hat Enterprise

Page 14

NoteFor more information on KSM, refer to the Red Hat Enterprise Linux 6 VirtualizationAdministration Guide.Q EMU G u est Ag en tThe QEMU Guest Agent

Page 15

For host systems: https://access.redhat.com/site/articles/rhel-limitsFor the KVM hypervisor: https://access.redhat.com/site/articles/rhel-kvm-limitsFo

Page 16 - 3.3. Performance

4.3. Virt ualized hardware devicesVirtualization on Red Hat Enterprise Linux 6 presents three distinct types of system devices to virtualmachines. The

Page 17 - 3.5. Securit y

Red Hat Enterprise Linux 6.1 and above provides an emulated (Intel) HDA sound device, i ntel -hd a. This device is supported on the following guest op

Page 18

KVM provides two emulated PCI IDE interfaces. An emulated IDE driver can beused to attach any combination of up to four virtualized IDE hard disks orv

Page 19

Windows Server 2008Windows 7Windows Server 2012Windows 8 (32/64 bit)T h e p ara- virt u aliz ed clo ckGuests using the Time Stamp Counter (TSC) as a

Page 20 - Important

USB p asst h ro u g hThe KVM hypervisor supports attaching USB devices on the host system to virtualmachines. USB device assignment allows guests to h

Page 21

To allow safe migration of virtual machines between hosts with different sets of CPU features, q emu -kvm does not expose all features from the host C

Page 22

virtio-scsi is the recommended para-virtualized storage device for guests using largenumbers of disks, or advanced storage features such as TRIM.virt

Page 23

Red Hat Enterprise Linux 6 Virtualization Getting Started GuideAn introduction to virtualization conceptsDayle ParkerRed Hat Engineering Content Servi

Page 24

Logical volumes can be used for disk images and managed using the system's LVM tools.LVM offers higher performance than file systems because of i

Page 25

Chapter 5. Virtualization ToolsThis chapter provides an introduction to the many tools available to assist with virtualization.5.1. vi rshvirsh is a c

Page 26

5.4. g uestfi shguestfish is a shell and command line tool for examining and modifying virtual machine disk images.This tool uses libguestfs and expos

Page 27 - 4.4. Guest CPU models

vi rt-ed i tA command line tool used to edit files that exist on a specified virtual machine. This tool isinstalled as part of the libguestfs-tools pa

Page 28 - 4.5. St orage

WarningUsing vi rt-rescue on running virtual machines can cause disk corruption in thevirtual machine. vi rt-rescue attempts to prevent its own use on

Page 29 - 4 .5.4 . Host st orage

vi rt-to pA command line utility similar to to p, which shows statistics related to virtualized domains.This tool ships in its own package: virt-top.v

Page 30

Revision HistoryRevisio n 1.0- 15 Fri O ct 10 2014 Dayle ParkerVersion for 6.6 GA release.Revisio n 1.0- 12 T u e O ct 07 2014 Sco t t Rad vanApp

Page 31 - 5.3. vi rt-i nstal l

Added GlusterFS description for BZ #979271.Removed Hypervisor Deployment Guide from documentation list.Revisio n 0.3- 32 Mo n Sep t 2 2013 Dayle Pa

Page 32 - 5.5. Ot her useful t ools

Revisio n 0.3- 8 T h u rs O ct 4 2012 Dayle ParkerAdded tech preview note about virtio-scsi in Ch.4 from SME review.Added QEMU Guest Agent descript

Page 33

Revisio n 0.2- 6 4 Mo n Ap ril 2 2012 Lau ra No vichCorrections to Chapter 2 (BZ #800401).Revisio n 0.2- 6 1 Fri March 30 2012 Dayle ParkerMade co

Page 34

Legal NoticeCo pyright © 20 11-20 14 Red Hat, Inc.This do cument is licensed by Red Hat under the Creative Co mmo ns Attribution-ShareAlike 3.0Unpo

Page 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 36 - Revision History

Preface1. Document Convent ionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of in

Page 37 - Revision Hist ory

C haracter T abl e. Double-click this highlighted character to place it in the T ext to co py field and then click the C o py button. Now switch back

Page 38

before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out;

Page 39

Red Hat also hosts a large number of electronic mailing lists for discussion of Red Hat software andtechnology. You can find a list of publicly availa

Commentaires sur ces manuels

Pas de commentaire