Citrix Xenserver ® 7.2 Virtual Machine User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Citrix Xenserver ® 7.2 Virtual Machine User's Guide Citrix XenServer ® 7.2 Virtual Machine User's Guide Published October 2017 1.1 Edition Citrix XenServer ® 7.2 Virtual Machine User's Guide © 1999-2017 Citrix Systems, Inc. All Rights Reserved. Version: 7.2 Citrix, Inc. 851 West Cypress Creek Road Fort Lauderdale, FL 33309 United States of America Disclaimers This document is furnished "AS IS." Citrix, Inc. disclaims all warranties regarding the contents of this document, including, but not limited to, implied warranties of merchantability and fitness for any particular purpose. This document may contain technical or other inaccuracies or typographical errors. Citrix, Inc. reserves the right to revise the information in this document at any time without notice. This document and the software described in this document constitute confidential information of Citrix, Inc. and its licensors, and are furnished under a license from Citrix, Inc. Citrix Systems, Inc., the Citrix logo, Citrix XenServer and Citrix XenCenter, are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. Trademarks Citrix® XenServer ® XenCenter ® Contents 1. About this Document .................................................................................... 1 1.1. Overview ...................................................................................................................... 1 1.2. XenServer Documentation ............................................................................................ 1 2. Virtual Machines ............................................................................................ 2 2.1. Types of Virtual Machines ............................................................................................. 2 2.2. Creating VMs ............................................................................................................... 2 2.2.1. Using VM Templates .......................................................................................... 2 2.3. Other Methods of VM Creation .................................................................................... 3 2.3.1. Physical to Virtual Conversion (P2V) ................................................................... 3 2.3.2. Cloning an Existing VM ...................................................................................... 3 2.3.3. Importing an Exported VM ................................................................................. 3 2.4. XenServer Tools ............................................................................................................ 4 2.4.1. Finding out the virtualization state of a VM ........................................................ 4 3. Supported Guests and Allocating Resources ................................................. 6 3.1. Supported Guests, Virtual Memory, and Disk Size Limits ................................................. 6 3.2. Long-term Guest Support ............................................................................................. 9 3.3. XenServer Product Family Virtual Device Support ........................................................... 9 3.3.1. VM Block Devices .............................................................................................. 9 4. Creating Windows VMs ............................................................................... 10 4.1. Basic Procedure for Creating a Windows VM ............................................................... 10 4.2. Windows VM Templates ............................................................................................. 10 4.2.1. Attaching an ISO Image Library ......................................................................... 11 4.3. Using XenCenter to Create a VM ................................................................................. 11 4.3.1. Installing XenServer Tools ................................................................................. 13 4.3.1.1. Silent Installation .................................................................................. 14 4.4. Using the CLI to Create a Windows VM ....................................................................... 15 5. Creating Linux VMs ...................................................................................... 16 5.1. Creating a Linux VM by Installing from an Internet Repository ....................................... 17 iii 5.2. Creating a Linux VM by Installing from a Physical CD/DVD ............................................ 18 5.3. Creating a Linux VM by Installing From an ISO Image ................................................... 19 5.3.1. Network Installation Notes ............................................................................... 19 5.4. Advanced Operating System Boot Parameters .............................................................. 20 5.5. Installing the Linux Guest Agent .................................................................................. 21 5.6. Additional Installation Notes for Linux Distributions ..................................................... 21 5.6.1. Additional Debian Notes .................................................................................. 22 5.6.1.1. Apt Repositories .................................................................................... 22 5.7. Preparing to Clone a Linux VM .................................................................................... 22 5.7.1. Machine Name ................................................................................................ 22 5.7.2. IP address ........................................................................................................ 23 5.7.3. MAC address ................................................................................................... 23 6. VM Migration with XenMotion and Storage XenMotion ............................. 24 6.1. XenMotion and Storage XenMotion ............................................................................. 24 6.1.1. XenMotion ...................................................................................................... 24 6.1.2. Storage XenMotion .......................................................................................... 24 6.1.3. Compatibility Requirements ............................................................................. 24 6.1.4. Limitations and Caveats ................................................................................... 25 6.2. Migrating a VM using XenCenter ................................................................................. 25 6.3. Live VDI Migration ...................................................................................................... 25 6.3.1. Limitations and Caveats ................................................................................... 26 6.3.2. To Move Virtual Disks ...................................................................................... 26 7. Updating VMs .............................................................................................. 27 7.1. Updating Windows Operating Systems ........................................................................ 27 7.2. Reinstalling XenServer Tools ........................................................................................ 27 7.3. Updating XenServer Tools ........................................................................................... 28 7.3.1. Updating the I/O drivers .................................................................................. 28 7.3.2. Updating the Management Agent ..................................................................... 28 7.3.3. Managing Automatic Updates .......................................................................... 29 7.4. Updating Linux Kernels and Guest Utilities ................................................................... 31 7.5. Upgrading to Ubuntu 14.04, RHEL 7 and CentOS 7 Guests ............................................ 31 iv 8. Container Management ............................................................................... 32 8.1. What is Docker™ ....................................................................................................... 32 8.2. Container Management Supplemental Pack ................................................................. 32 8.3. Managing Docker Containers Using XenCenter ............................................................. 33 8.4. Managing Containers on Other Linux Guests ................................................................ 33 8.5. Accessing Docker Container Console and Logs ............................................................. 34 8.5.1. Automating the Authentication Process (optional) ............................................. 34 8.6. Managing Windows Server Containers ......................................................................... 34 8.7. Network Requirements and Security ............................................................................ 35 8.7.1. Network Partitioning and Firewalls ................................................................... 36 8.7.2. Authentication on Linux-based operating systems ............................................. 36 8.7.3. Authentication for Windows Server Containers .................................................. 36 9. vApps ...........................................................................................................
Recommended publications
  • Suse Linux Enterprise Server 12 - Administration Guide Pdf, Epub, Ebook
    SUSE LINUX ENTERPRISE SERVER 12 - ADMINISTRATION GUIDE PDF, EPUB, EBOOK Admin Guide Contributors | 630 pages | 28 Apr 2016 | Samurai Media Limited | 9789888406500 | English | none SUSE Linux Enterprise Server 12 - Administration Guide PDF Book To prevent the conflicts, before starting the migration, execute the following as a super user:. PA, IA In todays service oriented IT zero downtime becomes more and more a most wanted feature. If you want to change actions for single packages, right-click a package in the package view and choose an action. When debugging a problem, you sometimes need to temporarily install a lot of -debuginfo packages which give you more information about running processes. If you are only reading the release notes of the current release, you could miss important changes. However, this can be changed through macro configuration. In this case, the oldest zswap pages are written back to disk-based swap. YaST snapshots are labeled as zypp y2base in the Description column ; Zypper snapshots are labeled zypp zypper. Global variables, or environment variables, can be accessed in all shells. If it is 0 zero the command was successful, everything else marks an error which is specific to the command. The installation medium must be inserted in the HMC. Maintaining netgroup data. This option fetches changes in repositories, but keeps the disabled repositories in the same state—disabled. The rollback snapshots are therefore automatically deleted when the set number of snapshots is reached. The visible physical entity, as it is typically mounted to a motherboard or an equivalent. When using the self-signed certificate, you need to confirm its signature before the first connection.
    [Show full text]
  • A U T O M at E D I N S Ta L L At
    Proceedings of LISA '99: 13th Systems Administration Conference Seattle, Washington, USA, November 7–12, 1999 A U T O M AT E D I N S TA L L AT I O N O F L I N U X S Y S T E M S U S I N G YA S T Dirk Hohndel and Fabian Herschel THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 1999 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Automated Installation of Linux Systems Using YaST Dirk Hohndel and Fabian Herschel – SuSE Rhein/Main AG ABSTRACT The paper describes how to allow a customized automated installation of Linux. This is possible via CDRom, network or tape, using a special boot disk that describes the system that should be set up and either standard SuSE Linux CDs, customized install CDs, an appropriately configured installation server, or a tape backup of an existing machine. A control file on the boot disk and additional (optional) control files on the install medium specify which settings should be used and which packages should be installed. This includes settings like language, key table, network setup, hard disk partitioning, packages to install, etc. After giving a quick overview of the syntax and capabilities of this installation method, considerations about how to plan the automated installation at larger sites are presented.
    [Show full text]
  • Op E N So U R C E Yea R B O O K 2 0
    OPEN SOURCE YEARBOOK 2016 ..... ........ .... ... .. .... .. .. ... .. OPENSOURCE.COM Opensource.com publishes stories about creating, adopting, and sharing open source solutions. Visit Opensource.com to learn more about how the open source way is improving technologies, education, business, government, health, law, entertainment, humanitarian efforts, and more. Submit a story idea: https://opensource.com/story Email us: [email protected] Chat with us in Freenode IRC: #opensource.com . OPEN SOURCE YEARBOOK 2016 . OPENSOURCE.COM 3 ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ OPENSOURCE.COM...... ........ .. .. .. ... .... ........ WRITE FOR US ..... .. .. .. ... .... 7 big reasons to contribute to Opensource.com: Career benefits: “I probably would not have gotten my most recent job if it had not been for my articles on 1 Opensource.com.” Raise awareness: “The platform and publicity that is available through Opensource.com is extremely 2 valuable.” Grow your network: “I met a lot of interesting people after that, boosted my blog stats immediately, and 3 even got some business offers!” Contribute back to open source communities: “Writing for Opensource.com has allowed me to give 4 back to a community of users and developers from whom I have truly benefited for many years.” Receive free, professional editing services: “The team helps me, through feedback, on improving my 5 writing skills.” We’re loveable: “I love the Opensource.com team. I have known some of them for years and they are 6 good people.” 7 Writing for us is easy: “I couldn't have been more pleased with my writing experience.” Email us to learn more or to share your feedback about writing for us: https://opensource.com/story Visit our Participate page to more about joining in the Opensource.com community: https://opensource.com/participate Find our editorial team, moderators, authors, and readers on Freenode IRC at #opensource.com: https://opensource.com/irc .
    [Show full text]
  • Autoyast Guide Autoyast Guide SUSE Linux Enterprise Micro 5.0
    SUSE Linux Enterprise Micro 5.0 AutoYaST Guide AutoYaST Guide SUSE Linux Enterprise Micro 5.0 AutoYaST is a system for unattended mass deployment of SUSE Linux Enterprise Micro systems. It uses an AutoYaST prole that contains installation and conguration data. The book guides you through the basic steps of auto-installation: preparation, installation, and conguration. Publication Date: September 30, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents Preface viii 1 Available documentation viii 2 Improving the documentation viii 3 Documentation conventions ix 1 Introduction
    [Show full text]
  • Beginning System Administration Decal
    Review Installing Software Debian GNU/Linux Beginning System Administration DeCal Week 6 March 03, 2009 Week 6 Beginning System Administration DeCal Review Installing Software Debian GNU/Linux Review So Far... (hopefully) History of UNIX Design choices Terminal, shell, and interaction with UNIX Foundation of the Internet Using UNIX Users and Permissions Account management (add/del/disable users) File system layout Week 6 Beginning System Administration DeCal Review Installing Software Debian GNU/Linux Review So Far... (cont.) Software Downloading and extracting packages ( wget, tar, gzip) Configuring and compiling (./configure, make, make install) Configuration (.conf files, /etc) Week 6 Beginning System Administration DeCal Review Considerations Installing Software Package Managers Debian GNU/Linux Software Two options: 1 compile from source 2 download and install from binaries download binaries manually use a package management system How about both? When to choose which? Software release cycle Security and feature patches Week 6 Beginning System Administration DeCal Review Considerations Installing Software Package Managers Debian GNU/Linux What’s the single biggest advancement Linux has brought to the industry? It’s an interesting question, and one that in my opinion has a very simple answer: Package management-or, more specifically, the ability to install and upgrade software over the network in a seamlessly integrated fashion-along with the distributed development model package management enabled. Ian Murdock (founder of Debian) http://ianmurdock.com/2007/07/21/how-package-management-changed-everything/
    [Show full text]
  • Comparative Assessment of Cloud Compute Services Using Run-Time Meta-Data
    C: 40 C: 40 M: 2 M: 2 Y: 10 Y: 10 K: 0 K: 0 Comparative Assessment of Cloud Compute Services using Run-Time Meta-Data Michael Menzel C: 76 C: 76 Michael Menzel: Comparative Assessment of Cloud Compute Services using Run-Time Meta-Data Services using Run-Time of Cloud Compute Assessment Comparative Michael Menzel: M: 47 M: 47 Y: 30 ISBN 978-3-7375-5175-5 Y: 30 K: 5 K: 5 Comparative Assessment of Cloud Compute Services using Run-Time Meta-Data A Framework for Performance Measurements and Virtual Machine Image Introspections vorgelegt von Dipl. Wirt.-Inf. Michael Menzel geb. in Mainz von der Fakultät IV - Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Uwe Nestmann Gutachter: Prof. Dr. Stefan Tai Gutachter: Prof. Dr. Alexander Mädche Gutachter: Prof. Dr. Odej Kao Tag der wissenschaftlichen Aussprache: 21.04.2015 Berlin 2015 ii Credits As most projects in life, a dissertation stands on the shoulders of giants. Foremost, it is the result of collaborations, ongoing discussions, and inspirations from many ac- quaintances, companions, and friends. A particularly inspiring giant that supervised the present work is Prof. Stefan Tai whom I like to thank for his patient advises, engage- ment, and steady support of this project. Furthermore, I am deeply thankful I had the luck to spend time with the most intriguing colleagues1. The way all of them engage in discussions and strive for the best is remarkable. Companionships between like-minded researchers develop unaffected by distance or time zones.
    [Show full text]
  • Master's Thesis
    Graphics processing on HPC virtual applications Graphics performance of Windows applications running on Unix systems Master of Science Thesis Compurer Systems and Networks Roi Costas Fiel Department of Computer Science and Engineering Chalmers University of Technology Gothenburg, Sweden, September 2014 The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Graphics processing on HPC virtual applications Graphics performance of Windows applications running on Unix systems Roi Costas Fiel Examiner: Marina Papatriantafilou Department of Computer Science and Engineering Chalmers University of Technology SE4412 96 G¨oteborg Sweden Telephone + 46 (0)314772 1000 Abstract Simulation, graphic design and other applications with high graphic processing needs have been taking advantage of high performance computing systems in order to deal with complex computations and massive volumes of data. These systems are usually built on top of a single operating system and rely on virtualization in order to run appli- cations compiled for different ones.
    [Show full text]
  • Autoyast Guide Autoyast Guide Opensuse Leap 15.3
    openSUSE Leap 15.3 AutoYaST Guide AutoYaST Guide openSUSE Leap 15.3 AutoYaST is a system for unattended mass deployment of openSUSE Leap systems. It uses an AutoYaST prole that contains installation and conguration data. The book guides you through the basic steps of auto-installation: preparation, installation, and conguration. Publication Date: June 22, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents Preface ix 1 Available documentation ix 2 Improving the documentation ix 3 Documentation conventions x 1 Introduction to AutoYaST 1 1.1 Motivation 1 1.2 Overview
    [Show full text]
  • Opensuse Leap 15.3 Start-Up Start-Up Opensuse Leap 15.3
    openSUSE Leap 15.3 Start-Up Start-Up openSUSE Leap 15.3 Publication Date: June 22, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About this guide xi 1 Available documentation xi 2 Improving the documentation xii 3 Documentation conventions xiii 4 Source code xiv 5 Acknowledgments xiv I INSTALLATION 1 1 Installation Quick Start 2 1.1 Welcome to openSUSE Leap 2 Minimum system requirements 2 • Installing openSUSE Leap 2 2 Boot parameters 17 2.1 Using the default boot parameters 17 2.2 PC (AMD64/Intel 64/Arm AArch64) 17 The boot screen on machines equipped with traditional
    [Show full text]
  • Package Management Security
    Package Management Security Justin Cappos, Justin Samuel, Scott Baker, John H. Hartman University of Arizona Computer Science Department {justin, jsamuel, bakers, jhh}@cs.arizona.edu Abstract Package management is the task of determining which packages should be installed on a host and then downloading and installing those packages. This paper examines the popular package managers APT and YUM and presents nine feasible attacks on them. There are attacks that install malicious packages, deny users package updates, or cause the host to crash. This work identifies three rules of package management security: don’t trust the repository, the trusted entity with the most information should be the one who signs, and don’t install untrusted packages. The violation of these rules leads to the described vulnerabilities. Unfortunately, many of the flaws are architectural in nature, so repair requires more than patches to APT and YUM. While the rules of package management security argue that the design of existing package managers is insufficient, they do not prescribe how to provide security. This led to the development of three de- sign principles for building a secure package manager: selective trust delegation, customized repository views, and explicitly treating the repository as untrusted. These principles were used to construct a pack- age manager Stork which is not vulnerable to the attacks identified for YUM and APT. Stork has been in use for four years and has managed over half a million clients. 1 Introduction Package managers are a popular way to distribute software (bundled into archives called packages) for modern operating systems [4, 11, 37].
    [Show full text]
  • SUSE Linux Enterprise Server 11 SP4 Administration Guide Administration Guide SUSE Linux Enterprise Server 11 SP4
    SUSE Linux Enterprise Server 11 SP4 Administration Guide Administration Guide SUSE Linux Enterprise Server 11 SP4 Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xix 1 Available Documentation xx 2 Feedback xxii 3 Documentation Conventions xxii I SUPPORT AND COMMON TASKS 1 1 YaST Online Update 2 1.1 The Online Update Dialog 3 KDE Interface (Qt) 3 • GNOME Interface (GTK) 4 1.2 Installing Patches 6 1.3 Automatic Online Update 7 2 Gathering System Information for Support 9 2.1 Collecting System Information with Supportconfig
    [Show full text]
  • Administration Guide Administration Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 Administration Guide Administration Guide SUSE Linux Enterprise Server 15 SP1 Covers system administration tasks like maintaining, monitoring and customizing an initially installed system. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xxii 1 Available Documentation xxiii 2 Giving Feedback xxv 3 Documentation Conventions xxv 4 Product Life Cycle and Support xxvii Support Statement for SUSE Linux Enterprise Server xxviii • Technology Previews xxix I COMMON TASKS 1 1 Bash and Bash
    [Show full text]