Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE Przewodnik Instalacji

Przeglądaj online lub pobierz Przewodnik Instalacji dla Serwery Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE. Red Hat ENTERPRISE LINUX 5 - VIRTUALIZATION GUIDE Installation guide [en] Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Red Hat Enterprise Linux 6

Dayle Parker Laura Novich Jacquelynn EastScott RadvanRed Hat Enterprise Linux 6Virtualization Getting Started GuideAn introduction to virtualization c

Strona 2

Chapter 1. IntroductionThe Virtualization Getting Started Guide introduces the basics of virtualization and assists with thenavigation of other virtua

Strona 3

Red Hat Enterprise Linux — Virtualization Getting Started Guide: This guide provides an introductionto virtualization concepts, advantages, and tools,

Strona 4

NoteAll of the guides for these products are available at the Red Hat Customer Portal:https://access.redhat.com/documentation/en-US/Red Hat Ent erpri

Strona 5 - Table of Contents

Chapter 2. What is virtualization and migration?This chapter discusses terms related to virtualization and migration.2.1. What is virt ualizat ion?Vi

Strona 6 - 1. Document Convent ions

An offline migration suspends the guest virtual machine, and then moves an image of thevirtual machine's memory to the destination host. The virt

Strona 7 - 1.2. Pull-quot e Convent ions

NoteFor more information on V2V, refer to the Red Hat Enterprise Linux 6 V2V Guide.⁠Chapt er 2 . What is virt ualiz at ion and migrat ion?11

Strona 8

Chapter 3. Advantages and misconceptions of virtualizationThere are many advantages to virtualization and perhaps an equal amount of misconceptionssur

Strona 9 - 2.2. We Need Feedback!

This is no longer the case; modern virtualization technology has greatly improved the speed ofvirtual machines. Benchmarks show that virtual machines

Strona 10 - Chapter 1. Introduction

SELin u xSELinux was developed by the US National Security Agency and others to provide MandatoryAccess Control (MAC) for Linux. Under control of SELi

Strona 11 - ⁠Chapt er 1 . Int roduct io n

deployment suited to Red Hat Enterprise Virtualization may include databases, tradingplatforms, or messaging systems that must run continuously withou

Strona 13 - 2.2. Migrat ion

Chapter 4. Introduction to Red Hat virtualization productsThis chapter introduces the various virtualization products available in Red Hat Enterprise

Strona 14

NoteFor more information on KSM, refer to the Red Hat Enterprise Linux 6 VirtualizationAdministration Guide.Q EMU G u est Ag en tThe QEMU Guest Agent

Strona 15

For host systems: https://access.redhat.com/site/articles/rhel-limitsFor the KVM hypervisor: https://access.redhat.com/site/articles/rhel-kvm-limitsFo

Strona 16 - 3.3. Performance

4.3. Virt ualized hardware devicesVirtualization on Red Hat Enterprise Linux 6 presents three distinct types of system devices to virtualmachines. The

Strona 17 - 3.5. Securit y

Red Hat Enterprise Linux 6.1 and above provides an emulated (Intel) HDA sound device, i ntel -hd a. This device is supported on the following guest op

Strona 18

KVM provides two emulated PCI IDE interfaces. An emulated IDE driver can beused to attach any combination of up to four virtualized IDE hard disks orv

Strona 19

Windows Server 2008Windows 7Windows Server 2012Windows 8 (32/64 bit)T h e p ara- virt u aliz ed clo ckGuests using the Time Stamp Counter (TSC) as a

Strona 20 - Important

USB p asst h ro u g hThe KVM hypervisor supports attaching USB devices on the host system to virtualmachines. USB device assignment allows guests to h

Strona 21

To allow safe migration of virtual machines between hosts with different sets of CPU features, q emu -kvm does not expose all features from the host C

Strona 22

virtio-scsi is the recommended para-virtualized storage device for guests using largenumbers of disks, or advanced storage features such as TRIM.virt

Strona 23

Red Hat Enterprise Linux 6 Virtualization Getting Started GuideAn introduction to virtualization conceptsDayle ParkerRed Hat Engineering Content Servi

Strona 24

Logical volumes can be used for disk images and managed using the system's LVM tools.LVM offers higher performance than file systems because of i

Strona 25

Chapter 5. Virtualization ToolsThis chapter provides an introduction to the many tools available to assist with virtualization.5.1. vi rshvirsh is a c

Strona 26

5.4. g uestfi shguestfish is a shell and command line tool for examining and modifying virtual machine disk images.This tool uses libguestfs and expos

Strona 27 - 4.4. Guest CPU models

vi rt-ed i tA command line tool used to edit files that exist on a specified virtual machine. This tool isinstalled as part of the libguestfs-tools pa

Strona 28 - 4.5. St orage

WarningUsing vi rt-rescue on running virtual machines can cause disk corruption in thevirtual machine. vi rt-rescue attempts to prevent its own use on

Strona 29 - 4 .5.4 . Host st orage

vi rt-to pA command line utility similar to to p, which shows statistics related to virtualized domains.This tool ships in its own package: virt-top.v

Strona 30

Revision HistoryRevisio n 1.0- 15 Fri O ct 10 2014 Dayle ParkerVersion for 6.6 GA release.Revisio n 1.0- 12 T u e O ct 07 2014 Sco t t Rad vanApp

Strona 31 - 5.3. vi rt-i nstal l

Added GlusterFS description for BZ #979271.Removed Hypervisor Deployment Guide from documentation list.Revisio n 0.3- 32 Mo n Sep t 2 2013 Dayle Pa

Strona 32 - 5.5. Ot her useful t ools

Revisio n 0.3- 8 T h u rs O ct 4 2012 Dayle ParkerAdded tech preview note about virtio-scsi in Ch.4 from SME review.Added QEMU Guest Agent descript

Strona 33

Revisio n 0.2- 6 4 Mo n Ap ril 2 2012 Lau ra No vichCorrections to Chapter 2 (BZ #800401).Revisio n 0.2- 6 1 Fri March 30 2012 Dayle ParkerMade co

Strona 34

Legal NoticeCo pyright © 20 11-20 14 Red Hat, Inc.This do cument is licensed by Red Hat under the Creative Co mmo ns Attribution-ShareAlike 3.0Unpo

Strona 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 36 - Revision History

Preface1. Document Convent ionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of in

Strona 37 - Revision Hist ory

C haracter T abl e. Double-click this highlighted character to place it in the T ext to co py field and then click the C o py button. Now switch back

Strona 38

before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out;

Strona 39

Red Hat also hosts a large number of electronic mailing lists for discussion of Red Hat software andtechnology. You can find a list of publicly availa

Komentarze do niniejszej Instrukcji

Brak uwag