Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 15 SP2

Total Page:16

File Type:pdf, Size:1020Kb

Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server 15 SP2 Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 15 SP2 Describes virtualization technology in general, and introduces libvirt—the unied interface to virtualization—and detailed information on specic hypervisors. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Manual xvi 1 Available Documentation xvi 2 Giving Feedback xviii 3 Documentation Conventions xix 4 Product Life Cycle and Support xx Support Statement for SUSE Linux Enterprise Server xxi • Technology Previews xxii I INTRODUCTION 1 1 Virtualization Technology 2 1.1 Overview 2 1.2 Virtualization Capabilities 3 1.3 Virtualization Benefits 3 1.4 Virtualization Modes 4 1.5 I/O Virtualization 4 2 Introduction to Xen Virtualization 7 2.1 Basic Components 7 2.2 Xen Virtualization Architecture 8 3 Introduction to KVM Virtualization 10 3.1 Basic Components 10 3.2 KVM Virtualization Architecture 10 4 Virtualization Tools 12 4.1 Virtualization Console Tools 12 iii Virtualization Guide 4.2 Virtualization GUI Tools 13 5 Installation of Virtualization Components 17 5.1 Installing KVM 17 5.2 Installing Xen 17 5.3 Installing Containers 18 5.4 Patterns 18 5.5 Installing UEFI Support 19 5.6 Enable Support for Nested Virtualization in KVM 20 6 Supported Hosts, Guests, and Features 22 6.1 Host Environments (Hypervisors) 22 6.2 Guest Environments 22 Availability of Paravirtualized Drivers 23 6.3 KVM Hardware Requirements 24 6.4 Feature Support 25 Host (Dom0) 25 • Paravirtualized Guest 26 • Fully Virtualized Guest 27 II MANAGING VIRTUAL MACHINES WITH libvirt 29 7 Starting and Stopping libvirtd 30 8 Guest Installation 32 8.1 GUI-Based Guest Installation 32 8.2 Installing from the Command Line with virt-install 34 8.3 Advanced Guest Installation Scenarios 37 Memory Ballooning with Windows Guests 37 • Including Add-on Products in the Installation 38 iv Virtualization Guide 9 Basic VM Guest Management 39 9.1 Listing VM Guests 39 Listing VM Guests with Virtual Machine Manager 39 • Listing VM Guests with virsh 40 9.2 Accessing the VM Guest via Console 40 Opening a Graphical Console 40 • Opening a Serial Console 42 9.3 Changing a VM Guest's State: Start, Stop, Pause 43 Changing a VM Guest's State with Virtual Machine Manager 44 • Changing a VM Guest's State with virsh 44 9.4 Saving and Restoring the State of a VM Guest 45 Saving/Restoring with Virtual Machine Manager 46 • Saving and Restoring with virsh 47 9.5 Creating and Managing Snapshots 47 Terminology 47 • Creating and Managing Snapshots with Virtual Machine Manager 48 • Creating and Managing Snapshots with virsh 50 9.6 Deleting a VM Guest 52 Deleting a VM Guest with Virtual Machine Manager 52 • Deleting a VM Guest with virsh 53 9.7 Migrating VM Guests 53 Migration Requirements 53 • Migrating with Virtual Machine Manager 55 • Migrating with virsh 56 • Step-by-Step Example 58 9.8 Monitoring 60 Monitoring with Virtual Machine Manager 60 • Monitoring with virt- top 61 • Monitoring with kvm_stat 62 10 Connecting and Authorizing 64 10.1 Authentication 64 libvirtd Authentication 65 • VNC Authentication 69 10.2 Connecting to a VM Host Server 73 “system” Access for Non-Privileged Users 74 • Managing Connections with Virtual Machine Manager 75 v Virtualization Guide 10.3 Configuring Remote Connections 76 Remote Tunnel over SSH (qemu+ssh or xen+ssh) 77 • Remote TLS/SSL Connection with x509 Certificate (qemu+tls or xen+tls) 77 11 Managing Storage 85 11.1 Managing Storage with Virtual Machine Manager 87 Adding a Storage Pool 88 • Managing Storage Pools 91 11.2 Managing Storage with virsh 93 Listing Pools and Volumes 93 • Starting, Stopping and Deleting Pools 95 • Adding Volumes to a Storage Pool 96 • Deleting Volumes from a Storage Pool 97 • Attaching Volumes to a VM Guest 97 • Detaching Volumes from a VM Guest 98 11.3 Locking Disk Files and Block Devices with virtlockd 99 Enable Locking 99 • Configure Locking 100 11.4 Online Resizing of Guest Block Devices 101 11.5 Sharing Directories between Host and Guests (File System Pass- Through) 102 11.6 Using RADOS Block Devices with libvirt 103 12 Managing Networks 104 12.1 Network Bridge 104 Managing Network Bridges with YaST 104 • Managing Network Bridges from the Command Line 105 • Using VLAN Interfaces 107 12.2 Virtual Networks 108 Managing Virtual Networks with Virtual Machine Manager 109 • Managing Virtual Networks with virsh 113 13 Configuring Virtual Machines with Virtual Machine Manager 120 13.1 Machine Setup 121 Overview 121 • Performance 122 • Processor 123 • Memory 124 • Boot Options 125 vi Virtualization Guide 13.2 Storage 126 13.3 Controllers 127 13.4 Networking 128 13.5 Input Devices 130 13.6 Video 131 13.7 USB Redirectors 133 13.8 Miscellaneous 134 13.9 Adding a CD/DVD-ROM Device with Virtual Machine Manager 134 13.10 Adding a Floppy Device with Virtual Machine Manager 135 13.11 Ejecting and Changing Floppy or CD/DVD-ROM Media with Virtual Machine Manager 136 13.12 Assigning a Host PCI Device to a VM Guest 137 Adding a PCI Device with Virtual Machine Manager 137 13.13 Assigning a Host USB Device to a VM Guest 139 Adding a USB Device with Virtual Machine Manager 139 14 Configuring Virtual Machines with virsh 141 14.1 Editing the VM Configuration 141 14.2 Changing the Machine Type 142 14.3 Configuring Hypervisor Features 143 14.4 Configuring CPU Allocation 144 14.5 Changing Boot Options 145 Changing Boot Order 145 • Using Direct Kernel Boot 146 14.6 Configuring Memory Allocation 146 14.7 Adding a PCI Device 147 PCI Pass-Through for IBM Z 150 14.8 Adding a USB Device 151 vii Virtualization Guide 14.9 Adding SR-IOV Devices 152 Requirements 152 • Loading and Configuring the SR-IOV Host Drivers 153 • Adding a VF Network Device to a VM Guest 156 • Dynamic Allocation of VFs from a Pool 159 14.10 Listing Attached Devices 160 14.11 Configuring Storage Devices 161 14.12 Configuring Controller Devices 162 14.13 Configuring Video Devices 164 Changing the Amount of Allocated VRAM 164 • Changing the State of 2D/3D Acceleration 164 14.14 Configuring Network Devices 165 Scaling Network Performance with Multiqueue virtio-net 165 14.15 Using Macvtap to Share VM Host Server Network Interfaces 165 14.16 Disabling a Memory Balloon Device 167 14.17 Configuring Multiple Monitors (Dual Head) 167 14.18 Crypto adapter pass-through to KVM guests on IBM Z 169 Introduction 169 • What is covered 169 • Requirements 169 • Dedicate a crypto adapter to a KVM host 169 • Further reading 172 15 Managing Virtual Machines with Vagrant 173 15.1 Introduction to Vagrant 173 Vagrant Concepts 173 • Vagrant Example 174 15.2 Vagrant Boxes for SUSE Linux Enterprise 174 15.3 Further Reading 175 III HYPERVISOR-INDEPENDENT FEATURES 176 16 Disk Cache Modes 177 16.1 Disk Interface Cache Modes 177 viii Virtualization Guide 16.2 Description of Cache Modes 177 16.3 Data Integrity Implications of Cache Modes 179 16.4 Performance Implications of Cache Modes 180 16.5 Effect of Cache Modes on Live Migration 180 17 VM Guest Clock Settings 181 17.1 KVM: Using kvm_clock 181 Other Timekeeping Methods 182 17.2 Xen Virtual Machine Clock Settings 182 18 libguestfs 183 18.1 VM Guest Manipulation Overview 183 VM Guest Manipulation Risk 183 • libguestfs Design 184 18.2 Package Installation 184 18.3 Guestfs Tools 185 Modifying Virtual Machines 185 • Supported File Systems and Disk Images 185 • virt-rescue 186 • virt-resize 186 • Other virt-* Tools 188 • guestfish 190 • Converting a Physical Machine into a KVM Guest 191 18.4 Troubleshooting 193 Btrfs-related Problems 193 • Environment 194 • libguestfs-test- tool 194 18.5 External References 194 19 QEMU Guest Agent 195 19.1 Running QEMU GA Commands 195 19.2 virsh Commands that Require QEMU GA 195 19.3 Enhancing libvirt Commands 196 19.4 For More Information 197 ix Virtualization Guide IV MANAGING VIRTUAL MACHINES WITH XEN 198 20 Setting Up a Virtual Machine Host 199 20.1 Best Practices and Suggestions 199 20.2 Managing Dom0 Memory 200 Setting Dom0 Memory Allocation 201 20.3 Network Card in Fully Virtualized Guests 201 20.4 Starting the Virtual Machine Host 202 20.5 PCI Pass-Through 204 Configuring the Hypervisor for PCI Pass-Through 204 • Assigning PCI Devices to VM Guest Systems 205 • VGA Pass- Through 206 • Troubleshooting 206 • For More Information 207 20.6 USB Pass-Through 207 Identify the USB Device 208 • Emulated USB Device 208 • Paravirtualized PVUSB 208 21 Virtual Networking 211 21.1 Network Devices for Guest Systems 211 21.2 Host-Based Routing in Xen 213 21.3 Creating a Masqueraded Network Setup 216 21.4 Special Configurations 218
Recommended publications
  • Effective Virtual CPU Configuration with QEMU and Libvirt
    Effective Virtual CPU Configuration with QEMU and libvirt Kashyap Chamarthy <[email protected]> Open Source Summit Edinburgh, 2018 1 / 38 Timeline of recent CPU flaws, 2018 (a) Jan 03 • Spectre v1: Bounds Check Bypass Jan 03 • Spectre v2: Branch Target Injection Jan 03 • Meltdown: Rogue Data Cache Load May 21 • Spectre-NG: Speculative Store Bypass Jun 21 • TLBleed: Side-channel attack over shared TLBs 2 / 38 Timeline of recent CPU flaws, 2018 (b) Jun 29 • NetSpectre: Side-channel attack over local network Jul 10 • Spectre-NG: Bounds Check Bypass Store Aug 14 • L1TF: "L1 Terminal Fault" ... • ? 3 / 38 Related talks in the ‘References’ section Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications What this talk is not about 4 / 38 Related talks in the ‘References’ section What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications 4 / 38 What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications Related talks in the ‘References’ section 4 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP QEMU QEMU VM1 VM2 Custom Disk1 Disk2 Appliance ioctl() KVM-based virtualization components Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP Custom Appliance KVM-based virtualization components QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) Custom Appliance KVM-based virtualization components libvirtd QMP QMP QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 libguestfs (guestfish) Custom Appliance KVM-based virtualization components OpenStack, et al.
    [Show full text]
  • Red Hat Enterprise Linux 7 7.1 Release Notes
    Red Hat Enterprise Linux 7 7.1 Release Notes Release Notes for Red Hat Enterprise Linux 7 Red Hat Customer Content Services Red Hat Enterprise Linux 7 7.1 Release Notes Release Notes for Red Hat Enterprise Linux 7 Red Hat Customer Content Services Legal Notice Copyright © 2015 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Red Hat Enterprise Linux 6 Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
    [Show full text]
  • Linux for Zseries: Device Drivers and Installation Commands (March 4, 2002) Summary of Changes
    Linux for zSeries Device Drivers and Installation Commands (March 4, 2002) Linux Kernel 2.4 LNUX-1103-07 Linux for zSeries Device Drivers and Installation Commands (March 4, 2002) Linux Kernel 2.4 LNUX-1103-07 Note Before using this document, be sure to read the information in “Notices” on page 207. Eighth Edition – (March 2002) This edition applies to the Linux for zSeries kernel 2.4 patch (made in September 2001) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Summary of changes .........v Chapter 5. Linux for zSeries Console || Edition 8 changes.............v device drivers............27 Edition 7 changes.............v Console features .............28 Edition 6 changes ............vi Console kernel parameter syntax .......28 Edition 5 changes ............vi Console kernel examples ..........28 Edition 4 changes ............vi Usingtheconsole............28 Edition 3 changes ............vii Console – Use of VInput ..........30 Edition 2 changes ............vii Console limitations ............31 About this book ...........ix Chapter 6. Channel attached tape How this book is organized .........ix device driver ............33 Who should read this book .........ix Tapedriverfeatures...........33 Assumptions..............ix Tape character device front-end........34 Tape block
    [Show full text]
  • Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Last Updated: 2017-10-20 Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Robert Krátký Red Hat Customer Content Services [email protected] Don Domingo Red Hat Customer Content Services Jacquelynn East Red Hat Customer Content Services Legal Notice Copyright © 2016 Red Hat, Inc. and others. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Virtualization Best Practices
    SUSE Linux Enterprise Server 15 SP1 Virtualization Best Practices SUSE Linux Enterprise Server 15 SP1 Publication Date: September 24, 2021 Contents 1 Virtualization Scenarios 2 2 Before You Apply Modifications 2 3 Recommendations 3 4 VM Host Server Configuration and Resource Allocation 3 5 VM Guest Images 25 6 VM Guest Configuration 36 7 VM Guest-Specific Configurations and Settings 42 8 Xen: Converting a Paravirtual (PV) Guest to a Fully Virtual (FV/HVM) Guest 45 9 External References 49 1 SLES 15 SP1 1 Virtualization Scenarios Virtualization oers a lot of capabilities to your environment. It can be used in multiple scenarios. To get more details about it, refer to the Book “Virtualization Guide” and in particular, to the following sections: Book “Virtualization Guide”, Chapter 1 “Virtualization Technology”, Section 1.2 “Virtualization Capabilities” Book “Virtualization Guide”, Chapter 1 “Virtualization Technology”, Section 1.3 “Virtualization Benefits” This best practice guide will provide advice for making the right choice in your environment. It will recommend or discourage the usage of options depending on your workload. Fixing conguration issues and performing tuning tasks will increase the performance of VM Guest's near to bare metal. 2 Before You Apply Modifications 2.1 Back Up First Changing the conguration of the VM Guest or the VM Host Server can lead to data loss or an unstable state. It is really important that you do backups of les, data, images, etc. before making any changes. Without backups you cannot restore the original state after a data loss or a misconguration. Do not perform tests or experiments on production systems.
    [Show full text]
  • Virtualization
    Virtualization Rich Jones & Mark McLoughlin 2009-06-27 @ 11:00 What? ● Guest virtual machines ● Run multiple OSes on a single host ● Support from modern hardware Why? ● Test rawhide ● Play with other distros ● Run windows ● Server consolidation ● Migration How? ● yum groupinstall Virtualization ● virt-manager Previously - Xen ● Standalone hypervisor ● Paravirtualization ● Dom0 not upstream Now - KVM ● kvm.ko ● VM is just a process ● Uses Intel VT or AMD SVM ● Paravirt too ● Simple, secure, fast Cool Features ● Save/restore ● Live migration ● PCI/USB device assignment ● Swapable guest memory ● Ballooning ● KSM libvirt ● A VM management API ● e.g. list VMs, start/stop VM ● XML format to describe VMs ● Hypervisor independent - KVM, Xen, LXC, VirtualBox, UML, ESX, ... libvirt – There's More ● Storage and networking management too – Storage pools and volumes – Virtual networks – Host network interface configuration ● Remote management ● Language bindings – C, Python, Perl, Ruby, OCaml, Java, C# Virtual Machine Manager ● Simple UI ● Easy to create a VM ● Monitoring ● Hotplug ● Remote management virt-install ● Kick off a guest install from the command line $> virt-install -n MyGuest -m 512 \ --disk pool=default,size=8 \ --network:default \ -l http://download.fedoraproject.org/.../x86_64/os Misc. Tools ● virt-clone/virt-image/virt-convert ● xenner – run Xen guests in KVM ● virt-top – 'top' for VMs ● virt-ps/virt-uname/virt-dmesg – poke VMs Get Involved ● list: [email protected] ● http://fedoraproject.org/wiki/Virtualization ● #virt on irc.oftc.net
    [Show full text]
  • An Updated Overview of the QEMU Storage Stack
    An Updated Overview of the QEMU Storage Stack Stefan Hajnoczi ± [email protected] Open Virtualization IBM Linux Technology Center 2011 Linux is a registered trademark of Linus Torvalds. The topic ● What is the QEMU storage stack? ● Configuring the storage stack ● Recent and future developments – “Cautionary statement regarding forward- looking statements” QEMU and its uses ● “QEMU is a generic and open source machine emulator and virtualizer” – http://www.qemu.org/ ● Emulation: – For cross-compilation, development environments – Android Emulator, shipping in an Android SDK near you ● Virtualization: – KVM and Xen use QEMU device emulation Storage in QEMU ● Devices and media: – Floppy, CD-ROM, USB stick, SD card, harddisk ● Host storage: – Flat files (img, iso) ● Also over NFS – CD-ROM host device (/dev/cdrom) – Block devices (/dev/sda3, LVM volumes, iSCSI LUNs) – Distributed storage (Sheepdog, Ceph) QEMU -drive option qemu -drive if=ide|virtio|scsi, file=path/to/img, cache=writethrough|writeback|none|unsafe ● Storage interface is set with if= ● Path to image file or device is set with path= ● Caching mode is set with cache= ● More on what this means later, but first the picture of the overall storage stack... The QEMU storage stack Application ·Application and guest kernel work similar to bare metal. File system & block layer ·Guest talks to QEMU via Driver emulated hardware. Hardware emulation ·QEMU performs I/O to an image file on behalf of the Image format (optional) guest. File system & block layer ·Host kernel treats guest I/O like any userspace Driver application. Guest QEMU Host Seeing double ● There may be two file systems.
    [Show full text]
  • Hitachi Contant Platform S Series Product Manager HCP - S Series V 3
    HITACHI Inspire the Next 2535 Augustine Drive Santa Clara, CA 95054 USA Contact Information : Hitachi Contant Platform S Series Product Manager HCP - S Series v 3 . 1 . 1 Hitachi Vantara LLC 2535 Augustine Dr. Santa Clara CA 95054 Component Version License Modified "Java Concurrency in Practice" book 1 Creative Commons Attribution 2.5 annotations ACPI 1.7 GNU General Public License v2.0 only ACPI Daemon 2.0.30 GNU General Public License v2.0 only Advanced Linux Sound Architecture 1.1.6 GNU General Public License v3.0 only (ALSA) ant-antlr 1.10.5 Apache License 2.0 ANTLR 2.7.7 ANTLR Software Rights Notice Apache Ant 1.10.5 Apache License 2.0 Apache Ant + JUnit 4 1.10.5 Apache License 2.0 Apache Commons CLI 1.4 Apache License 2.0 Apache Commons Codec 1.11 Apache License 2.0 Apache Commons Codec 1.14 Apache License 2.0 Apache Commons Collections 3.2.2 Apache License 2.0 Apache Commons Collections commons-commons-collections-4.4 Apache License 2.0 Apache Commons Compress 1.2 Apache License 2.0 Apache Commons Daemon 1.2.2 Apache License 2.0 Apache Commons DBCP 1.4 Apache License 2.0 Apache Commons FileUpload 1.3.3 Apache License 2.0 Apache Commons Lang 3.1 Apache License 2.0 Apache Commons Logging 1.2 Apache License 2.0 Apache Commons Net 3.6 Apache License 2.0 Apache Commons Pool 1.6 Apache License 2.0 Apache Groovy 2.4.8 Apache License 2.0 Apache HttpClient 4.5.3 Apache License 2.0 Apache HttpComponents Core 4.4.6 Apache License 2.0 Apache Ivy 2.4.0-patched Apache License 2.0 Apache log4j 2.11.1 Apache License 2.0 Apache Standard Taglib
    [Show full text]
  • Red Hat Enterprise Linux 7 7.9 Release Notes
    Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Last Updated: 2021-08-17 Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • A High-Performance Virtual Machine Filesystem Monitor in Cloud-Assisted Cognitive Iot
    A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT Dongyang Zhana, Lin Yea , Hongli Zhanga, Binxing Fanga,b, Huhua Lia, Yang Liua, Xiaojiang Duc, Mohsen Guizanid aSchool of Computer Science and Technology, Harbin Institute of Technology, Harbin, 150001, China bInstitute of Electronic and Information Engineering of UESTC in GuangdongDongguan Guangdong 523808, China cDepartment of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA dDepartment of Electrical and Computer Engineering, University of Idaho, Moscow, ID, USA Abstract Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities based on the computing and data storage capabilities of cloud virtual machines, which makes protecting virtual machine filesystem very important for the whole system security. Agentless periodic filesystem monitors are optimal solutions to protect cloud virtual machines because of the secure and low-overhead features. However, most of the periodic monitors usually scan all of the virtual machine filesystem or protected files in every scanning poll, so lots of secure files are scanned again and again even though they are not corrupted. In this paper, we propose a novel agentless periodic filesystem monitor framework for virtual machines with different image formats to improve the performance of agentless periodic monitors. Our core idea is to minimize the scope of the scanning files in both file integrity checking and virus detection. In our monitor, if a file is considered secure, it will not be scanned when it has not been modified. Since our monitor only scans the newly created and modified files, it can check less files than other filesystem monitors.
    [Show full text]
  • Mesh Lab Manual
    MESH LAB MANUAL Mesh Lab Manual (Linux) Version 0.3 May 2009 Written by David Johnson and Kevin Duff PAGE 1 OF 43 MESH LAB MANUAL Table of Contents 1 NOTATION USED IN THIS LAB MANUAL.............................................................4 2 GETTING STARTED................................................................................................5 2.1 ACCESS TO THE MESH SERVER.................................................................................5 2.2 ETIQUETTE AND SHARING THE MESH...........................................................................5 2.2.1 Checking Who Else is Logged Into The Server..........................................5 2.2.2 Sending an Instant Message to Other Users..............................................6 2.2.3 Modifying the Login Message......................................................................6 3 DESCRIPTION OF THE LAB SETUP.....................................................................7 4 ARCHITECTURE OF THE LABORATORY..........................................................10 4.1 THE FREE BSD SERVER (172.20.1.1)...................................................................11 4.2 THE LINUX SERVER (UBUNTU) (172.20.1.4)............................................................11 4.3 THE 3COM SWITCH (172.20.1.2).......................................................................12 4.4 THE POWER DISTRIBUTION UNIT (PDU) (172.20.1.3)...............................................12 5 HOW THE NODES BOOT THEIR OPERATING SYSTEM...................................13
    [Show full text]