Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE Guida di Installazione

Navigare online o scaricare Guida di Installazione per Server Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE. Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE Installation guide [en] Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Red Hat Enterprise Linux 6

Dayle Parker Laura Novich Jacquelynn EastScott RadvanRed Hat Enterprise Linux 6Virtualization Getting Started GuideAn introduction to virtualization c

Pagina 2

Chapter 1. IntroductionThe Virtualization Getting Started Guide introduces the basics of virtualization and assists with thenavigation of other virtua

Pagina 3

Red Hat Enterprise Linux — Virtualization Getting Started Guide: This guide provides an introductionto virtualization concepts, advantages, and tools,

Pagina 4

NoteAll of the guides for these products are available at the Red Hat Customer Portal:https://access.redhat.com/documentation/en-US/Red Hat Ent erpri

Pagina 5 - Table of Contents

Chapter 2. What is virtualization and migration?This chapter discusses terms related to virtualization and migration.2.1. What is virt ualizat ion?Vi

Pagina 6 - 1. Document Convent ions

An offline migration suspends the guest virtual machine, and then moves an image of thevirtual machine's memory to the destination host. The virt

Pagina 7 - 1.2. Pull-quot e Convent ions

NoteFor more information on V2V, refer to the Red Hat Enterprise Linux 6 V2V Guide.⁠Chapt er 2 . What is virt ualiz at ion and migrat ion?11

Pagina 8

Chapter 3. Advantages and misconceptions of virtualizationThere are many advantages to virtualization and perhaps an equal amount of misconceptionssur

Pagina 9 - 2.2. We Need Feedback!

This is no longer the case; modern virtualization technology has greatly improved the speed ofvirtual machines. Benchmarks show that virtual machines

Pagina 10 - Chapter 1. Introduction

SELin u xSELinux was developed by the US National Security Agency and others to provide MandatoryAccess Control (MAC) for Linux. Under control of SELi

Pagina 11 - ⁠Chapt er 1 . Int roduct io n

deployment suited to Red Hat Enterprise Virtualization may include databases, tradingplatforms, or messaging systems that must run continuously withou

Pagina 13 - 2.2. Migrat ion

Chapter 4. Introduction to Red Hat virtualization productsThis chapter introduces the various virtualization products available in Red Hat Enterprise

Pagina 14

NoteFor more information on KSM, refer to the Red Hat Enterprise Linux 6 VirtualizationAdministration Guide.Q EMU G u est Ag en tThe QEMU Guest Agent

Pagina 15

For host systems: https://access.redhat.com/site/articles/rhel-limitsFor the KVM hypervisor: https://access.redhat.com/site/articles/rhel-kvm-limitsFo

Pagina 16 - 3.3. Performance

4.3. Virt ualized hardware devicesVirtualization on Red Hat Enterprise Linux 6 presents three distinct types of system devices to virtualmachines. The

Pagina 17 - 3.5. Securit y

Red Hat Enterprise Linux 6.1 and above provides an emulated (Intel) HDA sound device, i ntel -hd a. This device is supported on the following guest op

Pagina 18

KVM provides two emulated PCI IDE interfaces. An emulated IDE driver can beused to attach any combination of up to four virtualized IDE hard disks orv

Pagina 19

Windows Server 2008Windows 7Windows Server 2012Windows 8 (32/64 bit)T h e p ara- virt u aliz ed clo ckGuests using the Time Stamp Counter (TSC) as a

Pagina 20 - Important

USB p asst h ro u g hThe KVM hypervisor supports attaching USB devices on the host system to virtualmachines. USB device assignment allows guests to h

Pagina 21

To allow safe migration of virtual machines between hosts with different sets of CPU features, q emu -kvm does not expose all features from the host C

Pagina 22

virtio-scsi is the recommended para-virtualized storage device for guests using largenumbers of disks, or advanced storage features such as TRIM.virt

Pagina 23

Red Hat Enterprise Linux 6 Virtualization Getting Started GuideAn introduction to virtualization conceptsDayle ParkerRed Hat Engineering Content Servi

Pagina 24

Logical volumes can be used for disk images and managed using the system's LVM tools.LVM offers higher performance than file systems because of i

Pagina 25

Chapter 5. Virtualization ToolsThis chapter provides an introduction to the many tools available to assist with virtualization.5.1. vi rshvirsh is a c

Pagina 26

5.4. g uestfi shguestfish is a shell and command line tool for examining and modifying virtual machine disk images.This tool uses libguestfs and expos

Pagina 27 - 4.4. Guest CPU models

vi rt-ed i tA command line tool used to edit files that exist on a specified virtual machine. This tool isinstalled as part of the libguestfs-tools pa

Pagina 28 - 4.5. St orage

WarningUsing vi rt-rescue on running virtual machines can cause disk corruption in thevirtual machine. vi rt-rescue attempts to prevent its own use on

Pagina 29 - 4 .5.4 . Host st orage

vi rt-to pA command line utility similar to to p, which shows statistics related to virtualized domains.This tool ships in its own package: virt-top.v

Pagina 30

Revision HistoryRevisio n 1.0- 15 Fri O ct 10 2014 Dayle ParkerVersion for 6.6 GA release.Revisio n 1.0- 12 T u e O ct 07 2014 Sco t t Rad vanApp

Pagina 31 - 5.3. vi rt-i nstal l

Added GlusterFS description for BZ #979271.Removed Hypervisor Deployment Guide from documentation list.Revisio n 0.3- 32 Mo n Sep t 2 2013 Dayle Pa

Pagina 32 - 5.5. Ot her useful t ools

Revisio n 0.3- 8 T h u rs O ct 4 2012 Dayle ParkerAdded tech preview note about virtio-scsi in Ch.4 from SME review.Added QEMU Guest Agent descript

Pagina 33

Revisio n 0.2- 6 4 Mo n Ap ril 2 2012 Lau ra No vichCorrections to Chapter 2 (BZ #800401).Revisio n 0.2- 6 1 Fri March 30 2012 Dayle ParkerMade co

Pagina 34

Legal NoticeCo pyright © 20 11-20 14 Red Hat, Inc.This do cument is licensed by Red Hat under the Creative Co mmo ns Attribution-ShareAlike 3.0Unpo

Pagina 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 36 - Revision History

Preface1. Document Convent ionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of in

Pagina 37 - Revision Hist ory

C haracter T abl e. Double-click this highlighted character to place it in the T ext to co py field and then click the C o py button. Now switch back

Pagina 38

before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out;

Pagina 39

Red Hat also hosts a large number of electronic mailing lists for discussion of Red Hat software andtechnology. You can find a list of publicly availa

Commenti su questo manuale

Nessun commento