1. Document Conventions
1.1. T ypographic Conventions
1.2. Pull-quote Conventions
1.3. Notes and Warnings
2. Getting Help and Giving Feedback
2.1. Do You Need Help?
2.2. We Need Feedback!
Chapter 1. Server best practices
Chapter 2. Security for virtualization
2.1. Storage security issues
2.2. SELinux and virtualization
2.3. SELinux
2.4. Virtualization firewall information
Chapter 3. sVirt
3.1. Security and Virtualization
3.2. sVirt labeling
Chapter 4 . KVM live migration
4.1. Live migration requirements
4.2. Live migration and Red Hat Enterprise Linux version compatibility
4.3. Shared storage example: NFS for a simple migration
4.4. Live KVM migration with virsh
4.4.1. Additonal tips for migration with virsh
4.4.2. Additional options for the virsh migrate command
4.5. Migrating with virt-manager
Chapter 5. Remote management of guests
5.1. Remote management with SSH
5.2. Remote management over T LS and SSL
5.3. T ransport modes
Chapter 6. Overcommitting with KVM
6.1. Introduction
6.2. Overcommitting virtualized CPUs
Chapter 7. KSM
Chapter 8. Advanced virtualization administration
8.1. Control Groups (cgroups)
8.2. Hugepage support
Chapter 9. Miscellaneous administration tasks
9.1. Automatically starting guests
9.2. Guest memory allocation
9.3. Using qemu-img
9.4. Verifying virtualization extensions
9.5. Setting KVM processor affinities
9.6. Generating a new unique MAC address
9.7. Improving guest response time
9.8. Disable SMART disk monitoring for guests
. . . . . . . . . . . . . . .
9.9. Configuring a VNC Server
9.10. Gracefully shutting down guests
9.11. Virtual machine timer management with libvirt
9.12. Using PMU to monitor guest performance
9.13. Guest virtual machine power management
9.14. QEMU Guest Agent Protocol
9.14.1. guest-sync
9.14.2. guest-sync-delimited
9.15. Setting a limit on device redirection
9.16. Dynamically changing a host or a network bridge that is attached to a virtual NIC
Chapter 10. Storage concepts
10.1. Storage pools
10.2. Volumes
Chapter 11. Storage pools
11.1. Creating storage pools
11.1.1. Disk-based storage pools
11.1.1.1. Creating a disk based storage pool using virsh
11.1.1.2. Deleting a storage pool using virsh
11.1.2. Partition-based storage pools
11.1.2.1. Creating a partition-based storage pool using virt-manager
11.1.2.2. Deleting a storage pool using virt-manager
11.1.2.3. Creating a partition-based storage pool using virsh
11.1.2.4. Deleting a storage pool using virsh
11.1.3. Directory-based storage pools
11.1.3.1. Creating a directory-based storage pool with virt-manager
11.1.3.2. Deleting a storage pool using virt-manager
11.1.3.3. Creating a directory-based storage pool with virsh
11.1.3.4. Deleting a storage pool using virsh
11.1.4. LVM-based storage pools
11.1.4.1. Creating an LVM-based storage pool with virt-manager
11.1.4.2. Deleting a storage pool using virt-manager
11.1.4.3. Creating an LVM-based storage pool with virsh
11.1.4.4. Deleting a storage pool using virsh
11.1.5. iSCSI-based storage pools
11.1.5.1. Configuring a software iSCSI target
11.1.5.2. Adding an iSCSI target to virt-manager
11.1.5.3. Deleting a storage pool using virt-manager
11.1.5.4. Creating an iSCSI-based storage pool with virsh
11.1.5.5. Deleting a storage pool using virsh
11.1.6. NFS-based storage pools
11.1.6.1. Creating a NFS-based storage pool with virt-manager
11.1.6.2. Deleting a storage pool using virt-manager
Chapter 12. Volumes
12.1. Creating volumes
12.2. Cloning volumes
12.3. Adding storage devices to guests
12.3.1. Adding file based storage to a guest
12.3.2. Adding hard drives and other block devices to a guest
12.3.3. Managing storage controllers in a guest
12.4. Deleting and removing volumes
Chapter 13. The Virtual Host Metrics Daemon (vhostmd)
13.1. Installing vhostmd on the host
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13.2. Configuration of vhostmd
13.3. Starting and stopping the daemon
13.4. Verifying that vhostmd is working from the host
13.5. Configuring guests to see the metrics
13.6. Using vm-dump-metrics in Red Hat Enterprise Linux guests to verify operation
Chapter 14 . Managing guests with virsh
14.1. virsh command quick reference
14.2. Attaching and updating a device with virsh
14.3. Connecting to the hypervisor
14.4. Creating a virtual machine XML dump (configuration file)
14.4.1. Adding multifunction PCI devices to KVM guests
14.5. Suspending, resuming, saving and restoring a guest
14.6. Shutting down, rebooting and force-shutdown of a guest
14.7. Retrieving guest information
14.8. Retrieving node information
14.9. Storage pool information
14.10. Displaying per-guest information
14.11. Managing virtual networks
14.12. Migrating guests with virsh
14.13. Guest CPU model configuration
14.13.1. Introduction
14.13.2. Learning about the host CPU model
14.13.3. Determining a compatible CPU model to suit a pool of hosts
14.13.4. Configuring the guest CPU model
Chapter 15. Managing guests with the Virtual Machine Manager (virt-manager)
15.1. Starting virt-manager
15.2. T he Virtual Machine Manager main window
15.3. T he virtual hardware details window
15.4. Virtual Machine graphical console
15.5. Adding a remote connection
15.6. Displaying guest details
15.7. Performance monitoring
15.8. Displaying CPU usage for guests
15.9. Displaying CPU usage for hosts
15.10. Displaying Disk I/O
15.11. Displaying Network I/O
Chapter 16. Guest disk access with offline tools
16.1. Introduction
16.2. T erminology
16.3. Installation
16.4. T he guestfish shell
16.4.1. Viewing file systems with guestfish
16.4.1.1. Manual listing and viewing
16.4.1.2. Via guestfish inspection
16.4.1.3. Accessing a guest by name
16.4.2. Modifying files with guestfish
16.4.3. Other actions with guestfish
16.4.4. Shell scripting with guestfish
16.4.5. Augeas and libguestfs scripting
16.5. Other commands
16.6. virt-rescue: T he rescue shell
16.6.1. Introduction
16.6.2. Running virt-rescue
Red Hat Enterprise Linux 6 Virtualization Administration Guide
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16.7. virt-df: Monitoring disk usage
16.7.1. Introduction
16.7.2. Running virt-df
16.8. virt-resize: resizing guests offline
16.8.1. Introduction
16.8.2. Expanding a disk image
16.9. virt-inspector: inspecting guests
16.9.1. Introduction
16.9.2. Installation
16.9.3. Running virt-inspector
16.10. virt-win-reg: Reading and editing the Windows Registry
16.10.1. Introduction
16.10.2. Installation
16.10.3. Using virt-win-reg
16.11. Using the API from Programming Languages
16.11.1. Interaction with the API via a C program
16.12. T roubleshooting
16.13. Where to find further documentation
Chapter 17. Virtual Networking
17.1. Virtual network switches
17.2. Network Address T ranslation
17.3. Networking protocols
17.3.1. DNS and DHCP
17.3.2. Routed mode
17.3.3. Isolated mode
17.4. T he default configuration
17.5. Examples of common scenarios
17.5.1. Routed mode
17.5.2. NAT mode
17.5.3. Isolated mode
17.6. Managing a virtual network
17.7. Creating a virtual network
17.8. Attaching a virtual network to a guest
17.9. Directly attaching to physical interface
17.10. Applying network filtering
17.10.1. Introduction
17.10.2. Filtering chains
17.10.3. Filtering chain priorities
17.10.4. Usage of variables in filters
17.10.5. Automatic IP address detection and DHCP snooping
17.10.5.1. Introduction
17.10.5.2. DHCP snooping
17.10.6. Reserved Variables
17.10.7. Element and attribute overview
17.10.8. References to other filters
17.10.9. Filter rules
17.10.10. Supported protocols
17.10.10.1. MAC (Ethernet)
17.10.10.2. VLAN (802.1Q)
17.10.10.3. ST P (Spanning T ree Protocol)
17.10.10.4. ARP/RARP
17.10.10.5. IPv4
17.10.10.6. IPv6
17.10.10.7. T CP/UDP/SCT P
17.10.10.8. ICMP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17.10.10.9. IGMP, ESP, AH, UDPLIT E, 'ALL'
17.10.10.10. T CP/UDP/SCT P over IPV6
17.10.10.11. ICMPv6
17.10.10.12. IGMP, ESP, AH, UDPLIT E, 'ALL' over IPv6
17.10.11. Advanced Filter Configuration T opics
17.10.11.1. Connection tracking
17.10.11.2. Limiting Number of Connections
17.10.11.3. Command line tools
17.10.11.4. Pre-existing network filters
17.10.11.5. Writing your own filters
17.10.11.6. Sample custom filter
17.10.12. Limitations
Chapter 18. qemu-kvm Whitelist
18.1. Introduction
Product identification
Objectives
Background
Scope of the chapter
Used format
18.2. Basic options
Emulated machine
Processor type
Processor T opology
NUMA system
Memory size
Keyboard layout
Guest name
Guest UUID
18.3. Disk options
Generic drive
Boot option
Snapshot mode
18.4. Display options
Disable graphics
VGA card emulation
VNC display
Spice desktop
18.5. Network options
T AP network
18.6. Device options
General device
Global device setting
Character device
Enable USB
18.7. Linux/Multiboot boot
Kernel file
Ram disk
Command line parameter
18.8. Expert options
KVM virtualization
Disable kernel mode PIT reinjection
No shutdown
No reboot
Serial port, monitor, QMP
Monitor redirect
Red Hat Enterprise Linux 6 Virtualization Administration Guide
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Manual CPU start
RT C
Watchdog
Watchdog reaction
Guest memory backing
SMBIOS entry
18.9. Help and information options
Help
Version
Audio help
18.10. Miscellaneous options
Migration
No default configuration
Device configuration file
Loaded saved state
Chapter 19. Troubleshooting
19.1. Debugging and troubleshooting tools
19.2. kvm_stat
19.3. T roubleshooting with serial consoles
19.4. Virtualization log files
19.5. Loop device errors
19.6. Live Migration Errors
19.7. Enabling Intel VT -x and AMD-V virtualization hardware extensions in BIOS
19.8. KVM networking performance