Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 12 SP4

Total Page:16

File Type:pdf, Size:1020Kb

Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 12 SP4 Virtualization Guide Virtualization Guide SUSE Linux Enterprise Server 12 SP4 Describes virtualization technology in general, and introduces libvirt—the unied interface to virtualization—and detailed information on specic hypervisors. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Manual xvi 1 Available Documentation xvi 2 Giving Feedback xviii 3 Documentation Conventions xviii 4 Product Life Cycle and Support xx Support Statement for SUSE Linux Enterprise Server xxi • Technology Previews xxii I INTRODUCTION 1 1 Virtualization Technology 2 1.1 Overview 2 1.2 Virtualization Capabilities 3 1.3 Virtualization Benefits 3 1.4 Virtualization Modes 4 1.5 I/O Virtualization 4 2 Introduction to Xen Virtualization 7 2.1 Basic Components 7 2.2 Xen Virtualization Architecture 8 3 Introduction to KVM Virtualization 10 3.1 Basic Components 10 3.2 KVM Virtualization Architecture 10 iii Virtualization Guide 4 Introduction to Linux Containers 12 5 Virtualization Tools 13 5.1 Virtualization Console Tools 13 5.2 Virtualization GUI Tools 14 6 Installation of Virtualization Components 18 6.1 Installing KVM 18 6.2 Installing Xen 18 6.3 Installing Containers 19 6.4 Patterns 19 6.5 Installing UEFI Support 20 7 Supported Guests, Hosts and Features 21 7.1 Supported VM Guests 21 Availability of Paravirtualized Drivers 23 7.2 Supported VM Host Servers for SUSE Linux Enterprise Server 12 SP4 VM Guests 23 7.3 KVM Hardware Requirements 24 7.4 Feature Support 26 Host (Dom0) 26 • Paravirtualized Guest 27 • Fully Virtualized Guest 28 II MANAGING VIRTUAL MACHINES WITH libvirt 29 8 Starting and Stopping libvirtd 30 9 Guest Installation 32 9.1 GUI-Based Guest Installation 32 9.2 Installing from the Command Line with virt-install 34 iv Virtualization Guide 9.3 Advanced Guest Installation Scenarios 37 Memory Ballooning with Windows Guests 37 • Including Add-on Products in the Installation 38 10 Basic VM Guest Management 39 10.1 Listing VM Guests 39 Listing VM Guests with Virtual Machine Manager 39 • Listing VM Guests with virsh 40 10.2 Accessing the VM Guest via Console 40 Opening a Graphical Console 40 • Opening a Serial Console 42 10.3 Changing a VM Guest's State: Start, Stop, Pause 43 Changing a VM Guest's State with Virtual Machine Manager 44 • Changing a VM Guest's State with virsh 44 10.4 Saving and Restoring the State of a VM Guest 45 Saving/Restoring with Virtual Machine Manager 46 • Saving and Restoring with virsh 47 10.5 Creating and Managing Snapshots 47 Terminology 47 • Creating and Managing Snapshots with Virtual Machine Manager 48 • Creating and Managing Snapshots with virsh 50 10.6 Deleting a VM Guest 53 Deleting a VM Guest with Virtual Machine Manager 53 • Deleting a VM Guest with virsh 53 10.7 Migrating VM Guests 53 Migration Requirements 54 • Migrating with Virtual Machine Manager 55 • Migrating with virsh 57 • Step-by-Step Example 58 10.8 Monitoring 61 Monitoring with Virtual Machine Manager 61 • Monitoring with virt- top 62 • Monitoring with kvm_stat 63 11 Connecting and Authorizing 65 11.1 Authentication 65 libvirtd Authentication 66 • VNC Authentication 70 v Virtualization Guide 11.2 Connecting to a VM Host Server 74 “system” Access for Non-Privileged Users 75 • Managing Connections with Virtual Machine Manager 76 11.3 Configuring Remote Connections 77 Remote Tunnel over SSH (qemu+ssh or xen+ssh) 78 • Remote TLS/SSL Connection with x509 Certificate (qemu+tls or xen+tls) 78 12 Managing Storage 86 12.1 Managing Storage with Virtual Machine Manager 88 Adding a Storage Pool 89 • Managing Storage Pools 92 12.2 Managing Storage with virsh 94 Listing Pools and Volumes 94 • Starting, Stopping and Deleting Pools 96 • Adding Volumes to a Storage Pool 97 • Deleting Volumes from a Storage Pool 98 • Attaching Volumes to a VM Guest 98 • Detaching Volumes from a VM Guest 99 12.3 Locking Disk Files and Block Devices with virtlockd 100 Enable Locking 100 • Configure Locking 101 12.4 Online Resizing of Guest Block Devices 102 12.5 Sharing Directories between Host and Guests (File System Pass- Through) 103 12.6 Using RADOS Block Devices with libvirt 104 13 Managing Networks 105 13.1 Virtual Networks 105 Managing Virtual Networks with Virtual Machine Manager 105 • Managing Virtual Networks with virsh 110 13.2 Bridged Networking 115 Managing Network Bridges with YaST 116 • Managing Network Bridges with brctl 117 • Using VLAN Interfaces 118 vi Virtualization Guide 14 Configuring Virtual Machines 120 14.1 Machine Setup 121 Overview 121 • Performance 122 • Processor 123 • Memory 124 • Boot Options 125 14.2 Storage 126 14.3 Controllers 127 14.4 Networking 128 14.5 Enabling Seamless and Synchronized Mouse Pointer Movement 130 14.6 Adding a CD/DVD-ROM Device with Virtual Machine Manager 130 14.7 Adding a Floppy Device with Virtual Machine Manager 131 14.8 Ejecting and Changing Floppy or CD/DVD-ROM Media with Virtual Machine Manager 132 14.9 Editing VM Configuration with virsh 133 14.10 Changing the Machine Type with virsh 134 14.11 Assigning a Host PCI Device to a VM Guest 135 Adding a PCI Device with Virtual Machine Manager 135 • Adding a PCI Device with virsh 136 14.12 Assigning a Host USB Device to a VM Guest 139 Adding a USB Device with Virtual Machine Manager 139 • Adding a USB Device with virsh 140 14.13 Adding SR-IOV Devices 141 Requirements 142 • Loading and Configuring the SR-IOV Host Drivers 143 • Adding a VF Network Device to an Existing VM Guest 146 • Dynamic Allocation of VFs from a Pool 148 14.14 Using Macvtap to Share VM Host Server Network Interfaces 150 14.15 Managing Guest Memory Allocation (Xen only) 151 14.16 Disabling a Memory Balloon Device 152 14.17 Configuring Multiple Monitors (Dual Head) 153 vii Virtualization Guide III HYPERVISOR-INDEPENDENT FEATURES 155 15 Disk Cache Modes 156 15.1 Disk Interface Cache Modes 156 15.2 Description of Cache Modes 156 15.3 Data Integrity Implications of Cache Modes 158 15.4 Performance Implications of Cache Modes 159 15.5 Effect of Cache Modes on Live Migration 159 16 VM Guest Clock Settings 160 16.1 KVM: Using kvm_clock 160 Other Timekeeping Methods 161 16.2 Xen Virtual Machine Clock Settings 161 17 libguestfs 162 17.1 VM Guest Manipulation Overview 162 VM Guest Manipulation Risk 162 • libguestfs Design 163 17.2 Package Installation 163 17.3 Guestfs Tools 164 Modifying Virtual Machines 164 • Supported File Systems and Disk Images 164 • virt-rescue 165 • virt-resize 165 • Other virt-* Tools 167 • guestfish 169 • Converting a Physical Machine into a KVM Guest 170 17.4 Troubleshooting 172 Btrfs-related Problems 172 • Environment 173 • libguestfs-test- tool 173 17.5 External References 173 IV MANAGING VIRTUAL MACHINES WITH XEN 174 18 Setting Up a Virtual Machine Host 175 18.1 Best Practices and Suggestions 175 viii Virtualization Guide 18.2 Managing Dom0 Memory 176 Setting a Maximum Amount of Memory 177 18.3 Network Card in Fully Virtualized Guests 177 18.4 Starting the Virtual Machine Host 178 18.5 PCI Pass-Through 179 Configuring the Hypervisor for PCI Pass-Through 180 • Assigning PCI Devices to VM Guest Systems 181 • VGA Pass- Through 182 • Troubleshooting 182 • For More Information 183 18.6 USB Pass-Through 183 Identify the USB Device 183 • Emulated USB Device 184 • Paravirtualized PVUSB 184 19 Virtual Networking 186 19.1 Network Devices for Guest Systems 186 19.2 Host-Based Routing in Xen 188 19.3 Creating a Masqueraded Network Setup 191 19.4 Special Configurations 193 Bandwidth Throttling in Virtual Networks 193 • Monitoring the Network Traffic 194 20 Managing a Virtualization Environment 195 20.1 XL—Xen Management Tool 195 Guest Domain Configuration File 196 20.2 Automatic Start of Guest Domains 197 20.3 Event Actions 197 20.4 Time Stamp Counter 198 20.5 Saving Virtual Machines 199 20.6 Restoring Virtual Machines 199 20.7 Virtual Machine States 200 ix Virtualization Guide 21 Block Devices in Xen 201 21.1 Mapping Physical Storage to Virtual Disks 201 21.2 Mapping Network Storage to Virtual Disk 202 21.3 File-Backed Virtual Disks and Loopback Devices 202 21.4 Resizing Block Devices 203 21.5 Scripts for Managing Advanced Storage Scenarios 204 22 Virtualization: Configuration Options and Settings 205 22.1 Virtual CD Readers 205 Virtual CD Readers on Paravirtual Machines 205 • Virtual CD Readers on Fully Virtual Machines 205 • Adding Virtual CD Readers 206 • Removing Virtual CD Readers 207 22.2 Remote Access Methods 207 22.3 VNC Viewer 207 Assigning VNC Viewer Port Numbers to Virtual Machines 208 • Using SDL instead of a VNC Viewer 209 22.4 Virtual Keyboards
Recommended publications
  • Effective Virtual CPU Configuration with QEMU and Libvirt
    Effective Virtual CPU Configuration with QEMU and libvirt Kashyap Chamarthy <[email protected]> Open Source Summit Edinburgh, 2018 1 / 38 Timeline of recent CPU flaws, 2018 (a) Jan 03 • Spectre v1: Bounds Check Bypass Jan 03 • Spectre v2: Branch Target Injection Jan 03 • Meltdown: Rogue Data Cache Load May 21 • Spectre-NG: Speculative Store Bypass Jun 21 • TLBleed: Side-channel attack over shared TLBs 2 / 38 Timeline of recent CPU flaws, 2018 (b) Jun 29 • NetSpectre: Side-channel attack over local network Jul 10 • Spectre-NG: Bounds Check Bypass Store Aug 14 • L1TF: "L1 Terminal Fault" ... • ? 3 / 38 Related talks in the ‘References’ section Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications What this talk is not about 4 / 38 Related talks in the ‘References’ section What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications 4 / 38 What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications Related talks in the ‘References’ section 4 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP QEMU QEMU VM1 VM2 Custom Disk1 Disk2 Appliance ioctl() KVM-based virtualization components Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP Custom Appliance KVM-based virtualization components QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) Custom Appliance KVM-based virtualization components libvirtd QMP QMP QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 libguestfs (guestfish) Custom Appliance KVM-based virtualization components OpenStack, et al.
    [Show full text]
  • Industrial Control Via Application Containers: Migrating from Bare-Metal to IAAS
    Industrial Control via Application Containers: Migrating from Bare-Metal to IAAS Florian Hofer, Student Member, IEEE Martin A. Sehr Antonio Iannopollo, Member, IEEE Faculty of Computer Science Corporate Technology EECS Department Free University of Bolzano-Bozen Siemens Corporation University of California Bolzano, Italy Berkeley, CA 94704, USA Berkeley, CA 94720, USA fl[email protected] [email protected] [email protected] Ines Ugalde Alberto Sangiovanni-Vincentelli, Fellow, IEEE Barbara Russo Corporate Technology EECS Department Faculty of Computer Science Siemens Corporation University of California Free University of Bolzano-Bozen Berkeley, CA 94704, USA Berkeley, CA 94720, USA Bolzano, Italy [email protected] [email protected] [email protected] Abstract—We explore the challenges and opportunities of control design full authority over the environment in which shifting industrial control software from dedicated hardware to its software will run, it is not straightforward to determine bare-metal servers or cloud computing platforms using off the under what conditions the software can be executed on cloud shelf technologies. In particular, we demonstrate that executing time-critical applications on cloud platforms is viable based on computing platforms due to resource virtualization. Yet, we a series of dedicated latency tests targeting relevant real-time believe that the principles of Industry 4.0 present a unique configurations. opportunity to explore complementing traditional automation Index Terms—Industrial Control Systems, Real-Time, IAAS, components with a novel control architecture [3]. Containers, Determinism We believe that modern virtualization techniques such as application containerization [3]–[5] are essential for adequate I. INTRODUCTION utilization of cloud computing resources in industrial con- Emerging technologies such as the Internet of Things and trol systems.
    [Show full text]
  • Virtualization Getting Started Guide
    Red Hat Enterprise Linux 7 Virtualization Getting Started Guide Introduction to virtualization technologies available with RHEL Last Updated: 2020-02-24 Red Hat Enterprise Linux 7 Virtualization Getting Started Guide Introduction to virtualization technologies available with RHEL Jiri Herrmann Red Hat Customer Content Services [email protected] Yehuda Zimmerman Red Hat Customer Content Services [email protected] Dayle Parker Red Hat Customer Content Services Laura Novich Red Hat Customer Content Services Jacquelynn East Red Hat Customer Content Services Scott Radvan Red Hat Customer Content Services Legal Notice Copyright © 2019 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • Fortianalyzer VM Install Guide This Document, Which Describes Installing Fortianalyzer VM in Your Virtual Environment
    FortiAnalyzer VM - Install Guide VERSION 5.4 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTIGATE COOKBOOK http://cookbook.fortinet.com FORTINET TRAINING SERVICES http://www.fortinet.com/training FORTIGUARD CENTER http://www.fortiguard.com END USER LICENSE AGREEMENT http://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: [email protected] May 18, 2017 FortiAnalyzer VM 5.4 Install Guide 05-540-309958-20170518 TABLE OF CONTENTS Change Log 5 Introduction 6 FortiAnalyzer documentation 6 License and System Requirements 7 Licensing 7 Evaluation license 7 Minimum system requirements 8 Registration and Deployment 9 Register with Customer Service & Support 9 Deployment package 11 Deployment package contents 12 Deploying the appliance 13 Citrix XenServer deployment example 14 Create the virtual machine 14 Configure hardware settings 15 Start the virtual machine 17 Hyper-V deployment example 18 Create the virtual machine 18 Configure hardware settings 19 Start the virtual machine 23 KVM deployment example 24 Create the virtual machine 24 Configure hardware settings 26 Start the virtual machine 27 Open Xen deployment example 28 Create and configure the virtual machine 28 VMware deployment example 31 VMware vSphere 31 Deploy the OVF file 31 Configure hardware settings 34 Power on the virtual machine 35 Azure deployment example 37 Deploy the virtual machine 37 AWS deployment example 39 AWS Marketplace 1-Click Launch 39 AWS EC2 console 41 Initial Configuration 46 GUI access 46 Enable GUI access 46 Connect to the GUI 47 Upload the license file 48 Configure your FortiAnalyzer VM 48 Index 50 Change Log Change Log Date Change Description 2016-03-17 Initial release.
    [Show full text]
  • KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2018 KVM Based Virtualization and Remote Management Srinath Reddy Pasunuru St. Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Pasunuru, Srinath Reddy, "KVM Based Virtualization and Remote Management" (2018). Culminating Projects in Information Assurance. 53. https://repository.stcloudstate.edu/msia_etds/53 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. 1 KVM Based Virtualization and Remote Management by Srinath Reddy Pasunuru A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance May, 2018 Starred Paper Committee Susantha Herath, Chairperson Ezzat Kirmani Sneh Kalia 2 Abstract In the recent past, cloud computing is the most significant shifts and Kernel Virtual Machine (KVM) is the most commonly deployed hypervisor which are used in the IaaS layer of the cloud computing systems. The Hypervisor is the one which provides the complete virtualization environment which will intend to virtualize as much as hardware and systems which will include the CPUs, Memory, network interfaces and so on. Because of the virtualization technologies such as the KVM and others such as ESXi, there has been a significant decrease in the usage if the resources and decrease in the costs involved.
    [Show full text]
  • Policy and Procedures
    Policy and Procedures PEER FORUM I: DISK IMAGING December 7-8, 2017 at The Museum of Modern Art The following notes came out of Peer Forum I: Disk Imaging, a discussion as part of the Media Conservation Initiative ​ at MoMA. These notes represent the views of the speakers and participants who attended this meeting. The following notes came out of Peer Forum I: Disk Imaging, a discussion as part of the Media Conservation Initiative ​ at MoMA. These notes represent the views of the speakers and participants who attended this meeting. Contributors Reinhard Bek, Conservator of Contemporary Art, Bek & Frohnert LLC ​ Amy Brost, Assistant Media Conservator, The Museum of Modern Art ​ Euan Cochrane (Speaker), Digital Preservation Manager, Yale University Library ​ ​ Eddy Colloton, Assistant Conservator specializing in Electronic Media, Denver Art Museum ​ Deena Engel (Moderator), Clinical Professor, Director of the Program in Digital Humanities and Social ​ ​ ​ Science; Department of Computer Science, Courant Institute of Mathematical Sciences, New York University Dragan Espenschied (Speaker), Preservation Director, Rhizome ​ ​ Patricia Falcão, Time-Based Media Conservator, Tate ​ Jonathan Farbowitz, Fellow in the Conservation of Computer-Based Art, The Solomon R. Guggenheim ​ Museum Briana Feston-Brunet, Variable Media Conservator, Hirshhorn Museum & Sculpture Garden ​ Dan Finn, Media Conservator, Smithsonian American Art Museum ​ Ben Fino-Radin, Founder, Small Data Industries ​ Flaminia Fortunato, Andrew W. Mellon Fellow in Media Conservation,
    [Show full text]
  • ZERTO VIRTUAL REPLICATION - PREREQUISITES & REQUIREMENTS for MICROSOFT HYPER-V ENVIRONMENTS ZVR-REH-5.5U3 Rev01 Dec2017
    ZERTO VIRTUAL REPLICATION - PREREQUISITES & REQUIREMENTS FOR MICROSOFT HYPER-V ENVIRONMENTS ZVR-REH-5.5U3 Rev01 Dec2017 Zerto Virtual Replication is installed in a site with virtual machines to be protected as well as in the site where these virtual machines will be recovered. This document describes Zerto Virtual Replication - Prerequisites and Requirements for Microsoft Hyper-V Environments. For the requirements of VMware, Microsoft Azure or AWS protected sites, go to myZerto > Technical Documentation portal. ■ The Zerto Virtual Replication installation includes: ■ A Zerto Virtual Manager (ZVM): This is a Windows service, and manages replication at the site level. ■ A Virtual Replication Appliance (VRA): This is a virtual machine installed on each Hyper-V host to move the data to be replicated from the protected to the recovery site. ■ A Virtual Backup Appliance (VBA): This is a Windows service and manages offsite backups within Zerto Virtual Replication on each site. The VBA service runs on the same machine as the Zerto Virtual Manager service. ■ Zerto Virtual Replication can be installed at multiple sites and each site can be paired to any other site. ■ Each site is managed with the Zerto User Interface. ■ Zerto Virtual Replication also supports both the protected and recovery sites being managed by one SCVMM, for small branch offices. For example, from one datacenter to another datacenter, both managed by the same SCVMM. See the following sections: ■ “For Each Zerto Virtual Replication Hyper-V Site”, on page 1 ■ “Considerations and Guidelines”, on page 2 ■ “For Virtual Replication Appliances on the Hyper-V Host”, on page 3 ■ “Routable Networks”, on page 3 ■ “Minimum Bandwidth”, on page 3 ■ “Requirements for the Zerto Virtual Manager Web Client”, on page 3 ■ “Recommended Best Practices for the Zerto Virtual Replication Hyper-V Site”, on page 4 ■ “Open Firewall Ports for Hyper-V Environments”, on page 5 For Each Zerto Virtual Replication Hyper-V Site ■ Microsoft System Center 2012 R2, or 2016 with VMM (SCVMM) and at least one Hyper-V host.
    [Show full text]
  • Cisco Vwaas on Microsoft Hyper-V
    Cisco vWAAS on Microsoft Hyper-V This chapter describes how to use Cisco vWAAS on Microsoft Hyper-V, and contains the following sections: • About Cisco vWAAS on Microsoft Hyper-V, on page 1 • Supported Host Platforms, Software Versions, and Disk Type, on page 2 • System Requirements for Cisco vWAAS on Microsoft Hyper-V, on page 2 • Deployment Options for Cisco vWAAS on Microsoft Hyper-V, on page 3 • OVA Package Formats for vWAAS on Microsoft Hyper-V, on page 4 • Installing Cisco vWAAS on Microsoft Hyper-V, on page 6 • Activating and Registering vWAAS on Hyper-V, on page 8 • Traffic Interception Methods for Cisco vWAAS on Microsoft Hyper-V, on page 9 • Operating Guidelines for Cisco vWAAS on Microsoft Hyper-V, on page 11 • Configuring GPT Disk Format for vWAAS-50000 on Hyper-V with Akamai Connect, on page 14 About Cisco vWAAS on Microsoft Hyper-V Microsoft Hyper-V, available for Cisco vWAAS in WAAS Version 6.1.x and later, is a native hypervisor for x86_64 systems to enable platform virtualization. Cisco vWAAS on Microsoft Hyper-V extends Cisco networking benefits to Microsoft Windows Server Hyper-V deployments. It improves utilization, consolidates server workloads, and reduces costs. To achieve this, Cisco vWAAS on Hyper-V uses hardware virtualization to enable multiple operating systems to run on a single host, and allows the operating systems to share the same underlying physical hardware. Cisco vWAAS on Microsoft Hyper-V supports all the WAN-optimization functionalities that are supported by physical Cisco WAAS devices. Physical memory for Cisco vWAAS on Hyper-V is provided by a Cisco UCS server.
    [Show full text]
  • Xen on X86, 15 Years Later
    Xen on x86, 15 years later Recent development, future direction QEMU Deprivileging PVShim Panopticon Large guests (288 vcpus) NVDIMM PVH Guests PVCalls VM Introspection / Memaccess PV IOMMU ACPI Memory Hotplug PVH dom0 Posted Interrupts KConfig Sub-page protection Hypervisor Multiplexing Talk approach • Highlight some key features • Recently finished • In progress • Cool Idea: Should be possible, nobody committed to working on it yet • Highlight how these work together to create interesting theme • PVH (with PVH dom0) • KConfig • … to disable PV • PVshim • Windows in PVH PVH: Finally here • Full PVH DomU support in Xen 4.10, Linux 4.15 • First backwards-compatibility hack • Experimental PVH Dom0 support in Xen 4.11 PVH: What is it? • Next-generation paravirtualization mode • Takes advantage of hardware virtualization support • No need for emulated BIOS or emulated devices • Lower performance overhead than PV • Lower memory overhead than HVM • More secure than either PV or HVM mode • PVH (with PVH dom0) • KConfig • … to disable PV • PVshim • Windows in PVH KConfig • KConfig for Xen allows… • Users to produce smaller / more secure binaries • Makes it easier to merge experimental functionality • KConfig option to disable PV entirely • PVH • KConfig • … to disable PV • PVshim • Windows in PVH PVShim • Some older kernels can only run in PV mode • Expect to run in ring 1, ask a hypervisor PV-only kernel (ring 1) to perform privileged actions “Shim” Hypervisor (ring 0) • “Shim”: A build of Xen designed to allow an unmodified PV guest to run in PVH mode
    [Show full text]
  • Ovirt Architecture
    oVirt Architecture Itamar Heim Presented here by Dan Kenigsberg [email protected] oVirt Overview 1 Agenda ● oVirt Components ● Engine ● Clients ● Host ● Engine Agent - VDSM ● Guest ● Storage Concepts ● Data Warehouse & Reports ● User flows oVirt Overview 2 Architecture From 30,000 Feet Servers Engine Client oVirt Overview 3 The Real World Web Clients Python SDK DB Python CLI Engine R LDAP E Server S T Guest agent Spice Guest client Shared Storage VDSM Host Local Storage oVirt Overview 4 oVirt Engine VM & Template Life Cycle Load HA create, schedule, snapshot Balancing Storage Configuration & Monitoring Network Configuration & Monitoring Host Host Host Host Register/Install Monitoring Maintenance Fencing Authentication, Authorization Inventory Audit oVirt Overview 5 oVirt Engine Postgres DB Active Directory Engine RHDS R E S IDM T oVirt Overview 6 The Real World Web Clients Python SDK DB Python CLI Engine R LDAP E Server S T Guest agent Spice Guest client Shared Storage VDSM Host Local Storage oVirt Overview 7 The Clients Admin Portal User Portal R Python SDK Engine E S T Python CLI oVirt Overview 8 Admin Portal oVirt Overview 9 User Portal oVirt Overview 10 Power User Portal oVirt Overview 11 REST API oVirt Overview 12 SDK oVirt Overview 13 CLI oVirt Overview 14 The Real World Web Clients Python SDK DB Python CLI Engine R LDAP E Server S T Guest agent Spice Guest client Shared Storage VDSM Host Local Storage oVirt Overview 15 The Host QEMU/KVM Fedora Engine MOM libvirt oVirt Node VDSM KSM Configuration Monitoring : Network, Storage, Host,
    [Show full text]
  • Langley Aerospace Test Highlights 1990
    Langley Aerospace 4" Test Highlights I _ r-4 r_ i-j S_ L_ .Z: i:" 7 >- t,/ ,. 1990 Langley Research Center NASA Technical Memorandum 104090 ORIGINAL PAGE AND Wt-fTTE _:"-_TO_PAPH Langley Aerospace Test Highlights 1990 National Aeronautics and Space Administration Langley Research Center Langley Research Center NASA Technical Memorandum 104090 Hampton, Virginia 23665-5225 k ¸ Foreword The role of the NASA Langley Research Center is to perform basic and applied research necessary for the advancement of aeronautics and spaceflight, to generate new and advanced concepts for the accomplishment of related national goals, and to provide research advice, technological support, and assistance to other NASA installations, other government agencies, and industry. This report highlights some of the significant tests that were performed during calendar year 1990 in the NASA Langley Research Center test facilities, a number of which are unique in the world. The report illustrates both the broad range of the research and technology activities at the NASA Langley Research Center and the contributions of this work toward maintaining United States leadership in aeronautics and space research. Other highlights of Langley research and technology for 1990 are described in Research and Technology 1990-- Lan,gley Research Center. Further information concerning both reports is available from the Office of the Chief Scientist, Mail Stop l OS-A, NASA Langley Research Center, Hampton, Virginia 23665 (804-864-6062). Richard H. Petersen Director °o° PRECEDING PAGE BLANK NOT FILMED 111 Availability Information For additional information on any highlight, contact one of the individuals identified with the highlight. This individual is either a member or a leader of the research group.
    [Show full text]
  • Vnfs in a CNF Environment
    VNFs in a CNF environment Monika Antoniak, Piotr Skamruk CodiLime Agenda ● Who are we? ● Business use case - use existing VNFs in a containerized set-up ● Technical solution to the problem ● Q&A Who we are? Who we are ● CodiLime has been providing networking engineering services since 2011 ● As part of our R&D efforts and based on our expertise with CNFs and VNFs, we have decided to explore this topic further ● Today we are presenting the working example Business use case Business case What if… ● You love the lightness of containers and use them on a daily basis ● You value the flexibility and resilience of the overall solution ● You want a simple way to deploy things ● You enjoy using kubernetes to manage your resources ● ...and you use a business critical network function as a blackbox VM What can you do to get all of that? A step back: VNFs and CNFs VNF (Virtual Network Function): a well- CNF (Containerized Network Function): a known way to realize network functions in new way of providing required network virtualized or cloud environments functionality with the help of containers Software is provided as a VM image that Software is distributed as a container cannot be changed into a container image, image and can be managed using or is based on an operating system other container-management tools (like docker than Linux images in kubernetes env) VNF examples: vFW, vBNG, vEPC CNF examples: vCPE/cCPE, LDAP, DHCP Back to business Goal: a converged setup for running containerized and VM-based network functions ● using a single user interface
    [Show full text]