Oracle VM Virtualbox User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Oracle VM Virtualbox User Manual Oracle VM VirtualBox R User Manual Version 4.2.6 c 2004-2012 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 10 1.1 Why is virtualization useful?............................. 11 1.2 Some terminology................................... 11 1.3 Features overview................................... 12 1.4 Supported host operating systems.......................... 14 1.5 Installing VirtualBox and extension packs...................... 15 1.6 Starting VirtualBox.................................. 16 1.7 Creating your first virtual machine......................... 17 1.8 Running your virtual machine............................ 20 1.8.1 Starting a new VM for the first time.................... 20 1.8.2 Capturing and releasing keyboard and mouse.............. 21 1.8.3 Typing special characters.......................... 22 1.8.4 Changing removable media......................... 23 1.8.5 Resizing the machine’s window...................... 23 1.8.6 Saving the state of the machine...................... 23 1.9 Using VM groups................................... 24 1.10 Snapshots....................................... 25 1.10.1 Taking, restoring and deleting snapshots................. 25 1.10.2 Snapshot contents.............................. 27 1.11 Virtual machine configuration............................ 28 1.12 Removing virtual machines.............................. 28 1.13 Cloning virtual machines............................... 28 1.14 Importing and exporting virtual machines..................... 29 1.15 Global Settings.................................... 31 1.16 Alternative front-ends................................. 31 2 Installation details 33 2.1 Installing on Windows hosts............................. 33 2.1.1 Prerequisites................................. 33 2.1.2 Performing the installation......................... 33 2.1.3 Uninstallation................................ 34 2.1.4 Unattended installation........................... 34 2.2 Installing on Mac OS X hosts............................. 35 2.2.1 Performing the installation......................... 35 2.2.2 Uninstallation................................ 35 2.2.3 Unattended installation........................... 35 2.3 Installing on Linux hosts............................... 35 2.3.1 Prerequisites................................. 35 2.3.2 The VirtualBox kernel module....................... 36 2.3.3 Performing the installation......................... 37 2.3.4 The vboxusers group............................ 40 2.3.5 Starting VirtualBox on Linux........................ 40 2.4 Installing on Solaris hosts.............................. 41 2.4.1 Performing the installation......................... 41 2.4.2 The vboxuser group............................. 41 2.4.3 Starting VirtualBox on Solaris....................... 42 2 Contents 2.4.4 Uninstallation................................ 42 2.4.5 Unattended installation........................... 42 2.4.6 Configuring a zone for running VirtualBox................ 42 3 Configuring virtual machines 43 3.1 Supported guest operating systems......................... 43 3.1.1 Mac OS X guests............................... 44 3.1.2 64-bit guests................................. 44 3.2 Emulated hardware.................................. 45 3.3 General settings.................................... 46 3.3.1 “Basic” tab.................................. 46 3.3.2 “Advanced” tab............................... 46 3.3.3 “Description” tab.............................. 46 3.4 System settings.................................... 47 3.4.1 “Motherboard” tab............................. 47 3.4.2 “Processor” tab............................... 48 3.4.3 “Acceleration” tab.............................. 49 3.5 Display settings.................................... 49 3.6 Storage settings.................................... 50 3.7 Audio settings..................................... 52 3.8 Network settings................................... 52 3.9 Serial ports...................................... 53 3.10 USB support...................................... 54 3.10.1 USB settings................................. 54 3.10.2 Implementation notes for Windows and Linux hosts........... 56 3.11 Shared folders..................................... 56 3.12 Alternative firmware (EFI).............................. 56 3.12.1 Video modes in EFI............................. 56 4 Guest Additions 58 4.1 Introduction...................................... 58 4.2 Installing and Maintaining Guest Additions..................... 59 4.2.1 Guest Additions for Windows........................ 59 4.2.2 Guest Additions for Linux.......................... 62 4.2.3 Guest Additions for Solaris......................... 66 4.2.4 Guest Additions for OS/2.......................... 67 4.3 Shared folders..................................... 67 4.3.1 Manual mounting.............................. 68 4.3.2 Automatic mounting............................ 69 4.4 Hardware-accelerated graphics........................... 69 4.4.1 Hardware 3D acceleration (OpenGL and Direct3D 8/9)......... 69 4.4.2 Hardware 2D video acceleration for Windows guests........... 71 4.5 Seamless windows.................................. 71 4.6 Guest properties.................................... 72 4.7 Guest control..................................... 74 4.8 Memory overcommitment.............................. 74 4.8.1 Memory ballooning............................. 74 4.8.2 Page Fusion................................. 75 5 Virtual storage 77 5.1 Hard disk controllers: IDE, SATA (AHCI), SCSI, SAS................ 77 5.2 Disk image files (VDI, VMDK, VHD, HDD)..................... 79 5.3 The Virtual Media Manager............................. 80 5.4 Special image write modes.............................. 82 3 Contents 5.5 Differencing images.................................. 83 5.6 Cloning disk images.................................. 85 5.7 Host I/O caching................................... 86 5.8 Limiting bandwidth for disk images......................... 86 5.9 CD/DVD support................................... 87 5.10 iSCSI servers...................................... 88 6 Virtual networking 89 6.1 Virtual networking hardware............................. 89 6.2 Introduction to networking modes.......................... 90 6.3 Network Address Translation (NAT)......................... 91 6.3.1 Configuring port forwarding with NAT.................. 91 6.3.2 PXE booting with NAT............................ 92 6.3.3 NAT limitations............................... 92 6.4 Bridged networking.................................. 93 6.5 Internal networking.................................. 94 6.6 Host-only networking................................. 95 6.7 UDP Tunnel networking............................... 96 6.8 VDE networking.................................... 96 6.9 Limiting bandwidth for network I/O......................... 97 6.10 Improving network performance........................... 98 7 Remote virtual machines 99 7.1 Remote display (VRDP support)........................... 99 7.1.1 Common third-party RDP viewers..................... 99 7.1.2 VBoxHeadless, the remote desktop server................. 100 7.1.3 Step by step: creating a virtual machine on a headless server...... 101 7.1.4 Remote USB................................. 102 7.1.5 RDP authentication............................. 103 7.1.6 RDP encryption............................... 104 7.1.7 Multiple connections to the VRDP server................. 105 7.1.8 Multiple remote monitors.......................... 105 7.1.9 VRDP video redirection........................... 106 7.1.10 VRDP customization............................. 106 7.2 Teleporting...................................... 107 8 VBoxManage 109 8.1 Introduction...................................... 109 8.2 Commands overview................................. 110 8.3 General options.................................... 117 8.4 VBoxManage list................................... 117 8.5 VBoxManage showvminfo.............................. 118 8.6 VBoxManage registervm / unregistervm...................... 119 8.7 VBoxManage createvm................................ 119 8.8 VBoxManage modifyvm............................... 120 8.8.1 General settings............................... 120 8.8.2 Networking settings............................. 122 8.8.3 Serial port, audio, clipboard, remote desktop and USB settings..... 124 8.8.4 Remote machine settings.......................... 125 8.8.5 Teleporting settings............................. 125 8.9 VBoxManage clonevm................................ 126 8.10 VBoxManage import................................. 127 8.11 VBoxManage export.................................. 128 8.12 VBoxManage startvm................................. 128 4 Contents 8.13 VBoxManage controlvm............................... 128 8.14 VBoxManage discardstate.............................. 130 8.15 VBoxManage adoptstate............................... 130 8.16 VBoxManage snapshot................................ 130 8.17 VBoxManage closemedium.............................. 131 8.18 VBoxManage storageattach.............................. 131 8.19 VBoxManage storagectl................................ 133 8.20 VBoxManage bandwidthctl.............................. 134 8.21 VBoxManage showhdinfo............................... 134 8.22 VBoxManage createhd................................ 135 8.23 VBoxManage modifyhd................................ 135 8.24 VBoxManage clonehd................................. 136 8.25 VBoxManage
Recommended publications
  • Virtual Machine Technologies and Their Application in the Delivery of ICT
    Virtual Machine Technologies and Their Application In The Delivery Of ICT William McEwan accq.ac.nz n Christchurch Polytechnic Institute of Technology Christchurch, New Zealand [email protected] ABSTRACT related areas - a virtual machine or network of virtual machines can be specially configured, allowing an Virtual Machine (VM) technology was first ordinary user supervisor rights, and it can be tested implemented and developed by IBM to destruction without any adverse effect on the corporation in the early 1960's as a underlying host system. mechanism for providing multi-user facilities This paper hopes to also illustrate how VM in a secure mainframe computing configurations can greatly reduce our dependency on environment. In recent years the power of special purpose, complex, and expensive laboratory personal computers has resulted in renewed setups. It also suggests the important additional role interest in the technology. This paper begins that VM and VNL is likely to play in offering hands-on by describing the development of VM. It practical experience to students in a distance e- discusses the different approaches by which learning environment. a VM can be implemented, and it briefly considers the advantages and disadvantages Keywords: Virtual Machines, operating systems, of each approach. VM technology has proven networks, e-learning, infrastructure, server hosting. to be extremely useful in facilitating the Annual NACCQ, Hamilton New Zealand July, 2002 www. Annual NACCQ, Hamilton New Zealand July, teaching of multiple operating systems. It th offers an alternative to the traditional 1. INTRODUCTION approaches of using complex combinations Virtual Machine (VM) technology is not new. It was of specially prepared and configured OS implemented on mainframe computing systems by the images installed via the network or installed IBM Corporation in the early 1960’s (Varian 1997 pp permanently on multiple partitions or on 3-25, Gribben 1989 p.2, Thornton 2000 p.3, Sugarman multiple physical hard drives.
    [Show full text]
  • OLD PRETENDER Lovrenc Gasparin, Fotolia
    COVER STORY Bochs Emulator Legacy emulator OLD PRETENDER Lovrenc Gasparin, Fotolia Gasparin, Lovrenc Bochs, the granddaddy of all emulators, is alive and kicking; thanks to regular vitamin jabs, the lively old pretender can even handle Windows XP. BY TIM SCHÜRMANN he PC emulator Bochs first saw the 2.2.6 version in the Universe reposi- box). This also applies if you want to the light of day in 1994. Bochs’ tory; you will additionally need to install run Bochs on a pre-Pentium CPU, such Tinventor, Kevin Lawton, distrib- the Bximage program. (Bximage is al- as a 486. uted the emulator under a commercial li- ready part of the Bochs RPM for open- After installation, the program will cense before selling to French Linux ven- SUSE.) If worst comes to worst, you can simulate a complete PC, including CPU, dor Mandriva (which was then known always build your own Bochs from the graphics, sound card, and network inter- as MandrakeSoft). Mandriva freed the source code (see the “Building Bochs” face. The virtual PC in a PC works so emulator from its commercial chains, re- leasing Bochs under the LGPL license. Building Bochs If you prefer to build your own Bochs, or an additional --enable-ne2000 parameter Installation if you have no alternative, you will first to configure. The extremely long list of Bochs has now found a new home at need to install the C++ compiler and de- parameters in the user manual [2] gives SourceForge.net [1] (Figure 1). You can veloper packages for the X11 system. you a list of available options.
    [Show full text]
  • Vembu Hyper-V Virtual Appliance Installation Guide - Offsitedr Vembu Hyper-V Virtual Appliance Installation Guide - Offsitedr
    Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR A Hyper-V virtual appliance is a template that creates virtual machines instantly on Hyper-V virtual environment without manual VM creation or separate installation of operating system or Vembu OffsiteDR server. The downloaded file will be in zip format. Unzipping the file will have following: · Virtual appliance template file (VHD) · User Guide on How to deploy Hyper-V Virtual Appliance · ReadMe file Supported Versions: Windows Server 2012 R2, Windows 10 and Windows Server 2016 Steps to Deploy Virtual appliance on Hypervisor: Note: · Copy the downloaded virtual appliance zip file in a Windows/Linux GUI based machine to proceed with deployment. · Provided Virtual Appliance setup have 8 Core CPU and 16GB RAM set by default. It is recommended to have an equivalent configuration or more in the underlying Hyper-V Host. · Open the Hyper-V Manager console. · Right click on the corresponding server under Hyper-V Manager. 2 / 13 Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR · Check whether Virtual Appliance folder contains the 3 folders shown in the screen shot below. · Right click over Hyper-V host → select Import Virtual machine. · Select the folder containing VHD and XML files. 3 / 13 Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR · Select the VM to import and click next. 4 / 13 Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR · Choose import type as appropriate. 5 / 13 Vembu Hyper-V Virtual Appliance Installation Guide - OffsiteDR · Select location of configuration files for the VM and proceed with Next.
    [Show full text]
  • Supporting Operating System Installation | 3
    cc01SupportingOperatingSystemInstallation.indd01SupportingOperatingSystemInstallation.indd PagePage 1 08/10/1408/10/14 4:334:33 PMPM martinmartin //208/WB01410/XXXXXXXXXXXXX/ch01/text_s208/WB01410/XXXXXXXXXXXXX/ch01/text_s Supporting Operating LESSON 1 System Installation 70-688 EXAM OBJECTIVE Objective 1.1 – Support operating system installation. This objective may include but is not limited to: Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multi-boot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE). LESSON HEADING EXAM OBJECTIVE Using a Troubleshooting Methodology Viewing System Information Using the Event Viewer Supporting Windows To Go Support Windows To Go Creating and Deploying a Windows To Go Workspace Drive Booting into a Windows To Go Workspace Managing Boot Settings Manage boot settings, including native virtual hard disk (VHD) and multi-boot Using BCDEdit and BCDBoot Configuring a Multi-Boot System Manage boot settings, including native virtual hard disk (VHD) and multi-boot Configuring a Native VHD Boot File Manage boot settings, including native virtual hard disk (VHD) and multi-boot Understanding VHD Formats Installing Windows 8.1 on a VHD with an Operating System Present Installing Windows 8.1 on a VHD Without an Operating SystemCOPYRIGHTED Present MATERIAL Managing Desktop Images Manage desktop images Capturing Images Modifying Images using DISM Customizing a Windows Installation by Using Windows PE Customize a Windows
    [Show full text]
  • Devicelock® DLP 8.3 User Manual
    DeviceLock® DLP 8.3 User Manual © 1996-2020 DeviceLock, Inc. All Rights Reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means for any purpose other than the purchaser’s personal use without the prior written permission of DeviceLock, Inc. Trademarks DeviceLock and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. DeviceLock DLP - User Manual Software version: 8.3 Updated: March 2020 Contents About This Manual . .8 Conventions . 8 DeviceLock Overview . .9 General Information . 9 Managed Access Control . 13 DeviceLock Service for Mac . 17 DeviceLock Content Security Server . 18 How Search Server Works . 18 ContentLock and NetworkLock . 20 ContentLock and NetworkLock Licensing . 24 Basic Security Rules . 25 Installing DeviceLock . .26 System Requirements . 26 Deploying DeviceLock Service for Windows . 30 Interactive Installation . 30 Unattended Installation . 35 Installation via Microsoft Systems Management Server . 36 Installation via DeviceLock Management Console . 36 Installation via DeviceLock Enterprise Manager . 37 Installation via Group Policy . 38 Installation via DeviceLock Enterprise Server . 44 Deploying DeviceLock Service for Mac . 45 Interactive Installation . 45 Command Line Utility . 47 Unattended Installation . 48 Installing Management Consoles . 49 Installing DeviceLock Enterprise Server . 52 Installation Steps . 52 Installing and Accessing DeviceLock WebConsole . 65 Prepare for Installation . 65 Install the DeviceLock WebConsole . 66 Access the DeviceLock WebConsole . 67 Installing DeviceLock Content Security Server . 68 Prepare to Install . 68 Start Installation . 70 Perform Configuration and Complete Installation . 71 DeviceLock Consoles and Tools .
    [Show full text]
  • Flexapp™ Techbrief: Using Vhds Vs. Vmdks Page 1
    TechBrief FlexApp™ Using VHDs vs. VMDKs Summary ProfileUnity’s FlexApp and ProfileDisk technologies offer the flexibility to choose between using VHDs or VMDKs. With these technologies applications, user profiles, and user data are stored inside a virtual hard disk (VHD) on the network or a VMware virtual machine disk (VMDK) on storage visible to the ESXi host. A VHD looks like a local file system but can be mounted from anywhere on the network that we want to host our applications. VMDKs also look like a local file system but are mounted from the storage visible to the ESXi host where the desktop is running. Using a virtual disk has a number of benefits including IOPS reductions, file system compression, and application portability. At Liquidware, a question we frequently get asked is, “Should I use a VHD or a VMDK?”. The answer is that it depends. Not all features in these technologies are supported on both platforms. Feature Comparison Chart Use this ProfileUnity feature comparison chart to help guide you in deciding which is the best storage option per feature for your environment. Feature VHD VMDK/FlexDisk ProfileDisk Supported Supported ProfileDisk RDSH Supported Not Supported (starting in v6.7.0) FlexApp: Computer-level Supported Supported (starting in v6.7.0) FlexApp: User-level Supported Supported FlexApp: User Group-level Supported Supported FlexApp: Attach Now Not Supported Supported FlexApp: Click-to-Layer (version 6.7.0 and higher) Supported Not Supported FlexApp: Click-to-Layer for Published Apps Supported Not Supported (version 6.7.0 and higher) FlexApp: Cached Mode Application Deployment Supported Not Supported FlexApp: Use of Other ProfileUnity UEM Filters Supported Not Supported FlexApp: Cloud Storage, AWS S3, Google GCS Supported Not Supported and Azure Blob Deployment Differences One of the most powerful features of ProfileUnity is the User Environment Management filters that can be leveraged during the assignment of FlexApp Layers.
    [Show full text]
  • Oracle Berkeley DB Installation and Build Guide Release 18.1
    Oracle Berkeley DB Installation and Build Guide Release 18.1 Library Version 18.1.32 Legal Notice Copyright © 2002 - 2019 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Berkeley DB, and Sleepycat are trademarks or registered trademarks of Oracle. All rights to these marks are reserved. No third- party use is permitted without the express prior written consent of Oracle. Other names may be trademarks of their respective owners. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Introduction to Virtualization Virtualization
    Introduction to Virtualization Prashant Shenoy Computer Science CS691D: Hot-OS Lecture 2, page 1 Virtualization • Virtualization: extend or replace an existing interface to mimic the behavior of another system. – Introduced in 1970s: run legacy software on newer mainframe hardware • Handle platform diversity by running apps in VMs – Portability and flexibility Computer Science CS691D: Hot-OS Lecture 2, page 2 Types of Interfaces • Different types of interfaces – Assembly instructions – System calls – APIs • Depending on what is replaced /mimiced, we obtain different forms of virtualization Computer Science CS691D: Hot-OS Lecture 2, page 3 Types of Virtualization • Emulation – VM emulates/simulates complete hardware – Unmodified guest OS for a different PC can be run • Bochs, VirtualPC for Mac, QEMU • Full/native Virtualization – VM simulates “enough” hardware to allow an unmodified guest OS to be run in isolation • Same hardware CPU – IBM VM family, VMWare Workstation, Parallels,… Computer Science CS691D: Hot-OS Lecture 2, page 4 Types of virtualization • Para-virtualization – VM does not simulate hardware – Use special API that a modified guest OS must use – Hypercalls trapped by the Hypervisor and serviced – Xen, VMWare ESX Server • OS-level virtualization – OS allows multiple secure virtual servers to be run – Guest OS is the same as the host OS, but appears isolated • apps see an isolated OS – Solaris Containers, BSD Jails, Linux Vserver • Application level virtualization – Application is gives its own copy of components that are not shared • (E.g., own registry files, global objects) - VE prevents conflicts – JVM Computer Science CS691D: Hot-OS Lecture 2, page 5 Examples • Application-level virtualization: “process virtual machine” • VMM /hypervisor Computer Science CS691D: Hot-OS Lecture 2, page 6 The Architecture of Virtual Machines J Smith and R.
    [Show full text]
  • Ovirt and Openstack Storage (Present and Future)
    oVirt and OpenStack Storage (present and future) Federico Simoncelli Principal Software Engineer, Red Hat January 2014 1 Federico Simoncelli – oVirt and OpenStack Storage (present and future) Agenda ● Introduction ● oVirt and OpenStack Overview ● Present ● oVirt and Glance Integration ● Importing and Exporting Glance Images ● Current Constraints and Limitations ● Future ● Glance Future Integration ● Keystone Authentication in oVirt ● oVirt and Cinder Integration 2 Federico Simoncelli – oVirt and OpenStack Storage (present and future) oVirt Overview ● oVirt is a virtualization management application ● manages hardware nodes, storage and network resources, in order to deploy and monitor virtual machines running in your data center ● Free open source software released under the terms of the Apache License 3 Federico Simoncelli – oVirt and OpenStack Storage (present and future) The oVirt Virtualization Architecture 4 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Overview ● Cloud computing project to provide an Infrastructure as a Service (IaaS) ● Controls large pools of compute, storage, and networking resources ● Free open source software released under the terms of the Apache License ● Project is managed by the OpenStack Foundation, a non-profit corporate entity established in September 2012 5 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Glance Service ● Provides services for discovering, registering, and retrieving virtual machine images ● RESTful API that allows querying
    [Show full text]
  • Virtualizing Servers with Xen
    Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Virtualizing servers with Xen Evaldo Gardenali VI International Conference of Unix at UNINET Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Outline Virtualization Xen Features Scalability Performance Quality of Service Implementation Future of Xen Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Overview Why? Support heterogeneous environments: Linux r 2.4 e 2.6, NetBSD r , Plan9 r FreeBSD r , OpenSolaris r Consolidate work Legacy Systems Gradual Upgrade Service Isolation Quality of Service Isolated testing and development Ease of administration Ease of relocation and migration Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Virtualization Techniques Single System Image: Ensim r , Vservers, CKRM, VirtuozzoTM, BSD r jail(), Solaris r Zones √ Groups processes in “resource containers” Hard to get isolation × Emulation: QEMU, Bochs √ Portable Extremely slow × Virtualization: VMware r , VirtualPC r √ Runs unmodified Operating Systems Virtualizing x86 is inefficient × User Mode Kernel: User Mode Linux, CoLinux Guest runs as a process on the host OS × Low performance (I/O, context switches) × Paravirtualization: Xen r , Denali √ Excellent performance Requires port to special architecture × Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Virtualization Techniques Single System Image: Ensim r , Vservers, CKRM, VirtuozzoTM, BSD r jail(), Solaris
    [Show full text]
  • Oracle Solaris 11 Cheat Sheet Dtrace
    Oracle Solaris 11 Administrator's Cheat Sheet for DTrace Oracle Solaris 11 Cheat Sheet DTrace What is DTrace? DTrace Command Components Oracle Solaris DTrace is a comprehensive, advanced tracing tool for troubleshooting A typical DTrace command has several components: systematic problems in real time. Administrators, integrators and developers can use DTrace to dynamically and safely observe live production systems for performance issues, A 4-tuple identifier provider:module:function:name, where module is a kernel including both applications and the operating system itself. DTrace allows you to explore • module or application library, and function and name are the routines that are to be your system to understand how it works, track down problems across many layers of software, and locate the cause of any aberrant behavior. Whether it’s at a high level global instrumented. If any of these are left black, it is equivalent to a wildcard match. For overview like memory consumption or CPU time, to much finer grained information like what example, to fire all entry routines in the syscall provider we would use the following: specific function calls are being made, DTrace gives the operational insights that have long syscall:::entry been missing in the data center. • A predicate, or relational expression, that determines whether any action should be Understanding DTrace providers and probes taken. For example, to check whether the process name matches bash we would use the following: /execname == “bash”/ Oracle Solaris 11 is littered with many different points of instrumentation – places of interest • An action for what should happen if the probe fires and the predicate is satisfied.
    [Show full text]