System Administration of Red Hat Enterprise Virtualization Environments using the Administration Portal
Edition 2
Legal Notice
Abstract
- Introduction
- I. The Red Hat Enterprise Virtualization Interface
- II. Managing System Components
- III. Managing Virtualization Infrastructure
- 6. Managing Virtual Resources
- 6.1. About Virtual Machines
- 6.2. Creating New Virtual Machines
- 6.3. Completing the Configuration of the Virtual Machine
- 6.4. Installing Operating Systems onto Blank Virtual Machines
- 6.5. Managing Permissions to Virtual Machines
- 6.6. Logging in to Virtual Machines
- 6.7. Managing Virtual Machines
- 6.8. Using Virtual Machine Snapshots
- 6.9. Exporting and Importing Virtual Resources
- 6.10. Backing Up Virtual Resources
- 7. Templates
- 8. Pools
- IV. Monitoring and Reporting
- 9. Monitoring Red Hat Enterprise Virtualization
- 10. Red Hat Enterprise Virtualization Reports
- 11. History Database Reports
- V. Managing Advanced Functionality
- 12. Live Migration
- 13. High Availability
- 14. Managing Multilevel Administration
- 15. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager.
- 16. Extending VDSM with Hooks
- A. Utilities
- B. Configuring Red Hat Enterprise Linux 5.4 or Higher Virtual Machines to Use SPICE
- C. Changing Passwords on the Red Hat Enterprise Virtualization Manager
- D. Reports Schema
- D.1. Configuration History Views
- D.1.1. Latest datacenter configuration view
- D.1.2. Latest datacenter configuration view
- D.1.3. Latest storage domain configuration view
- D.1.4. Latest cluster configuration view
- D.1.5. Latest host configuration view
- D.1.6. Latest host interface configuration view
- D.1.7. Latest virtual machine configuration view
- D.1.8. Latest virtual machine interface configuration view
- D.1.9. Latest disks-to-virtual-machine-map view
- D.1.10. Latest virtual machine disk configuration view
- D.2. Statistics History Views
- D.2.1. Datacenter daily history view
- D.2.2. Storage domain daily history view
- D.2.3. Host hourly and daily history views
- D.2.4. Host interface hourly and daily history views
- D.2.5. Virtual machine hourly and daily history views
- D.2.6. Virtual machine interface hourly and daily history views
- D.2.7. Vitual machine disk hourly and samples history views
- D.3. Tag History and ENUM Views
- E. Search Parameters
- F. SAP Monitoring
- G. KVM Virtual Machine Timing Management
- H. Additional References
- I. Revision History
- Red Hat Enterprise Virtualization — Administration Guide (the book you are reading) describes how to setup, configure and manage Red Hat Enterprise Virtualization. It assumes that you have successfully installed the Red Hat Enterprise Virtualization Manager and hosts.
- Red Hat Enterprise Virtualization — Evaluation Guide enables prospective customers to evaluate the features of Red Hat Enterprise Virtualization. Use this guide if you have an evaluation license.
- Red Hat Enterprise Virtualization — Installation Guide describes the installation prerequisites and procedures. Read this if you need to install Red Hat Enterprise Virtualization. The installation of hosts, Manager and storage are covered in this guide. You will need to refer to the Red Hat Enterprise Virtualization Administration Guide to configure the system before you can start using the platform.
- Red Hat Enterprise Virtualization — Manager Release Notes contain release specific information for Red Hat Enterprise Virtualization Managers.
- Red Hat Enterprise Virtualization — Power User Portal Guide describes how power users can create and manage virtual machines from the Red Hat Enterprise Virtualization User Portal.
- Red Hat Enterprise Virtualization — Quick Start Guide provides quick and simple instructions for first time users to set up a basic Red Hat Enterprise Virtualization environment.
- Red Hat Enterprise Virtualization — REST API Guide describes how to use the REST API to set up and manage virtualization tasks. Use this guide if you wish to develop systems which integrate with Red Hat Enterprise Virtualization, using an open and platform independent API.
- Red Hat Enterprise Virtualization — Technical Reference Guide describes the technical architecture of Red Hat Enterprise Virtualization and its interactions with existing infrastructure.
- Red Hat Enterprise Virtualization — User Portal Guide describes how users of the Red Hat Enterprise Virtualization system can access and use virtual desktops from the User Portal.
- Red Hat Enterprise Linux — Hypervisor Deployment Guide describes how to deploy and install the Hypervisor. Read this guide if you need advanced information about installing and deploying Hypervisors. The basic installation of Hypervisor hosts is also described in the Red Hat Enterprise Virtualization Installation Guide.
- Red Hat Enterprise Linux — V2V Guide describes importing virtual machines from KVM, Xen and VMware ESX to Red Hat Enterprise Virtualization and KVM managed by libvirt.
Mono-spaced Bold
To see the contents of the filemy_next_bestselling_novel
in your current working directory, enter thecat my_next_bestselling_novel
command at the shell prompt and press Enter to execute the command.
Press Enter to execute the command.Press Ctrl+Alt+F2 to switch to a virtual terminal.
mono-spaced bold
. For example:
File-related classes includefilesystem
for file systems,file
for files, anddir
for directories. Each class has its own associated set of permissions.
Choose Mouse Preferences. In the Buttons tab, select the Left-handed mouse check box and click to switch the primary mouse button from the left to the right (making the mouse suitable for use in the left hand).→ → from the main menu bar to launchTo insert a special character into a gedit file, choose → → from the main menu bar. Next, choose → from the Character Map menu bar, type the name of the character in the Search field and click . The character you sought will be highlighted in the Character Table. Double-click this highlighted character to place it in the Text to copy field and then click the button. Now switch back to your document and choose → from the gedit menu bar.
Mono-spaced Bold Italic
or Proportional Bold Italic
To connect to a remote machine using ssh, typessh
at a shell prompt. If the remote machine isusername
@domain.name
example.com
and your username on that machine is john, typessh john@example.com
.Themount -o remount
command remounts the named file system. For example, to remount thefile-system
/home
file system, the command ismount -o remount /home
.To see the version of a currently installed package, use therpm -q
command. It will return a result as follows:package
.
package-version-release
Publican is a DocBook publishing system.
mono-spaced roman
and presented thus:
books Desktop documentation drafts mss photos stuff svn books_tests Desktop1 downloads images notes scripts svgs
mono-spaced roman
but add syntax highlighting as follows:
static int kvm_vm_ioctl_deassign_device(struct kvm *kvm,
struct kvm_assigned_pci_dev *assigned_dev)
{
int r = 0;
struct kvm_assigned_dev_kernel *match;
mutex_lock(&kvm->lock);
match = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head,
assigned_dev->assigned_dev_id);
if (!match) {
printk(KERN_INFO "%s: device hasn't been assigned before, "
"so cannot be deassigned\n", __func__);
r = -EINVAL;
goto out;
}
kvm_deassign_device(kvm, match);
kvm_free_assigned_device(kvm, match);
out:
mutex_unlock(&kvm->lock);
return r;
}
Note
Important
Warning
kgrainge@redhat.com
). When submitting a bug report, be sure to mention the manual's identifier: Guides-Admin.
- High availability to quickly configure virtual machines for fault tolerance.
- Live migration to move virtual machines between physical hosts without interruption.
- System scheduler to create policies to dynamically balance compute resources.
- Power saver to create policies to conserve power and cooling costs.
- Image manager to create, manage and provision virtual machines.
- Storage virtualization to enable consistent access of common storage from any server.
- Multi-level administration to enable administration of physical infrastructure as well as administration of virtual objects.
- Ability to convert existing virtual machines on foreign hypervisors to Red Hat Enterprise Virtualization platform. This is completely described in the V2V Guide.
- A range of reports either from the reports module based on JasperReports, or from the data warehouse. The reports enable administrators to monitor and analyze information on virtual machines, hosts and storage usage and performance.
- Red Hat Enterprise Virtualization Hypervisor - based on Kernel Virtual Machine (KVM), is a thin virtualization layer deployed across the server's infrastructure. Because it is a core part of the Linux kernel, KVM is a highly efficient means of providing virtualization.
- Agents and tools include VDSM which runs in the hypervisor or host. These provide local management for virtual machines, networks and storage.
- Red Hat Enterprise Virtualization platform management infrastructure allows users to view and manage all the system components, machines and images from a single, powerful interface. The management system GUI provides a comprehensive range of features, including powerful search capabilities, resource management, live migrations, and provisioning.
- Hosts - A host is a physical server (a physical machine) that runs either Red Hat Enterprise Virtualization Hypervisor or Red Hat Enterprise Linux 5.5 and above, and hosts one or more virtual machines. Hosts are grouped into clusters. Virtual machines can be migrated from one host to another within a cluster.
- Clusters - A cluster is a set of physical hosts that are treated as a resource pool for a set of virtual machines. Hosts in a cluster share the same network infrastructure and the same storage. They form a migration domain within which virtual machines can be moved from host to host.
- Data Center - A data center is a logical entity that defines the set of resources used in a specific environment. It is a collection of a number of clusters of virtual machines, storage and networks.The data center is the highest level container for all physical and logical resources within a managed virtual environment.A data center relies on adequate and accessible physical storage. The storage pool provides an abstracted view of the physical storage assigned to a data center, that enables planners and administrators to easily monitor and manage storage requirements.
- Storage Pool - The storage pool is a logical entity that contains a standalone image repository of a certain type, either iSCSI, or Fiber Channel, or NFS. Each storage pool can contain several storage domains, for virtual machine disk images and for ISO images and for the import and export of virtual machine images.
- Virtual Machines - A virtual machine is a virtual desktop or virtual server containing an operating system and a set of applications. Multiple identical desktops can be created in a Pool. Virtual machines can be accessed and used by end users, and created, managed or deleted by power users.
- Desktop Pools - A desktop pool is a group of identical virtual desktops that are available on demand by each one of the group members (not concurrently). Desktop pools can be set up for different purposes. For example, one desktop pool may be for the Marketing department, another for Research and Development, and so on. Users get available desktops of the required type from the appropriate pool.
- Templates - A template is a model virtual machine with a unique configuration and settings. A virtual machine that is based on a particular template acquires the configurations and settings of the template. Templates are used to conveniently and efficiently create a set of identical virtual machines. Using templates is the quickest way of creating large number of virtual machines in a single step.
- Snapshots - A snapshot is a view of a virtual machine's operating system and all its applications at a given point in time. It can be used to save the settings of a virtual machine before an upgrade, or before new applications are installed. In case of problems, the parameters from the snapshot can be used to restore the virtual machine to the state before the upgrade or installation.
- User Types - Red Hat Enterprise Virtualization supports multiple levels of administrators and users with distinct levels of permissions. System administrators can manage and administrate objects of the physical infrastructure, such as data centers, hosts and storage. Red Hat Enterprise Virtualization Power Users are administrators who manage the end-users of the virtual machines, as well as act as administrators of the virtual machines. End users are the users who have access to a specified desktop, or an available virtual machine from a designated desktop pool.
- Events and Monitors - Alerts, warnings, and other notices about activities within the system help the administrator to monitor the performance and running of various resources. Monitoring details can be displayed in both graphic and textual fashion.
- Reports - A range of reports either from the reports module based on JasperReports, or from the data warehouse. Preconfigured or ad hoc reports can be generated from the reports module. Users can also generate reports using any query tool that supports SQL from a data warehouse that collects monitoring data for hosts, virtual machines and storage.
- Configuring a new logical data center is the most important task of the system administrator. Designing a new data center requires an understanding of capacity planning and definition of requirements. Typically this is determined by the solution architect, who provides the requirement to the system architect. Preparing to set up the virtualized environment is a significant part of the set up, and is usually part of the system administrator's role.
- Maintaining the data center, including performing updates and monitoring usage and performance to keep the data center responsive to changing needs and loads.
- Managing physical and virtual resources such as hosts and virtual machines. This includes upgrading or adding hosts, importing domains, and converting virtual machines created on foreign hypervisors, and the maintenance of pools of desktops.
- Monitoring the overall system resources for potential problems such as extreme load on one of the hosts, insufficient memory or disk space, and taking any necessary actions (such as migrating virtual machines to other hosts to lessen the load, freeing resources, for example, by shutting down machines).
- Responding to the new requirements of virtual machines (for example, upgrading the operating system for a set of virtual desktops or allocating more memory to a specific virtual server).
- Managing customized object properties (Tags).
- Managing searches saved as public bookmarks.
- Managing user setup and access and setting user and administrator permission levels. This includes assigning or customizing roles to suit the needs of the enterprise.
- Troubleshooting for specific users or virtual machines or overall system functionality.
- Generating general and specific reports.
Table of Contents
User Interface Elements
Header
The Header Bar contains the name of the current logged in user, the button, the button, and the button. The button provides access to version information. The button allows you to configure user roles. The provides a shortcut to the book you are reading now. Search Bar
The Search bar allows you to quickly search for resources such as hosts and virtual machines. You can build queries to find the resources that you need. Queries can be as simple as a list of all the hosts in the system, or much more complex. As you type each part of the search query, you will be offered choices to assist you in building the search. The star icon can be used to save the search as a bookmark. Resource Tabs
All Resources, such as Hosts and Clusters, can be managed using the appropriate tab. Additionally, the Events and Monitor tabs allow you to manage and view events across the entire system. Clicking a tab displays the results of the most recent search query on the selected object. For example, if you recently searched for all virtual machines starting with "M", clicking the virtual machines tab displays a list of all virtual machines starting with "M". The Administration Portal uses the following tabs: Data Centers, Clusters, Hosts, Storage, Virtual Machines, Pools, Templates, Users, Events, and Monitor. Results list
Perform a task on an individual item, multiple items, or all the items in the results list, by selecting the item(s) and then clicking the relevant action button. If multiple selection is not possible, the button is disabled. Details of a selected item display in the details pane. Details Pane
The Details pane displays detailed information about a selected item in the Results Grid. If multiple items are selected, the Details pane displays information on the first selected item only. Bookmarks Pane
Bookmarks are used to save frequently-used or complicated searches for repeated use. Bookmarks can be added, edited, or removed. Alerts/Events Pane
The Alerts pane lists all events with a severity of Error or Warning. The system records all events, which are listed as audits in the Alerts section. Like Events, Alerts can also be viewed in the lowermost panel of both the Monitor and Events tab, by re-sizing the panel and clicking the Alert tab. This tabbed panel also appears in other tabs, such as the Hosts tab.
Administration Portal Minimum Supported Browser Resolution
result-type: {criteria} [sortby sort_spec]
Table 1.1. Example Search Queries
Example | Result |
---|---|
Hosts: Vms.status = up | Displays a list of all hosts running virtual machines that are up. |
Vms: domain = qa.company.com | Displays a list of all virtual machines running on the specified domain. |
Vms: users.name = Mary | Displays a list of all virtual machines belonging to users with the username Mary. |
Events: severity > normal sortby time | Displays the list of all Events whose severity is higher than Normal, sorted by time. |
Hosts: Vms.status = down
Table 1.2. Example Search Queries Using Auto-Completion
Input | List Items Displayed | Action |
---|---|---|
h
|
Hosts (1 option only)
|
Select
Hosts or;
Type
Hosts
|
Hosts:
|
All host properties
|
Type v
|
Hosts: v
|
host properties starting with a v
|
Select Vms or type Vms
|
Hosts: Vms
| All virtual machine properties |
Type s
|
Hosts: Vms.s
|
All virtual machine properties beginning with s
|
Select status or type status
|
Hosts: Vms.status
|
=
=!
|
Select or type =
|
Hosts: Vms.status =
| All status values |
Select or type down
|
- Vms for a list of virtual machines
- Host for a list of hosts
- Pools for a list of pools
- Template for a list of templates
- Event for a list of events
- Users for a list of users
- Cluster for a list of clusters
- Datacenter for a list of data centers
- Storage for a list of storage domains
{criteria}
is as follows:
<prop> <operator> <value>
<obj-type> <prop> <operator> <value>
Table 1.3. Example Search Criteria
Part | Description | Values | Example | Note |
---|---|---|---|---|
prop |
The property of the searched-for resource. Can also be the property of a resource type (see obj-type ), or tag (custom tag).
| See the information for each of the search types in Section 1.2.1.3.1, “Wildcards and Multiple Criteria” | Status | -- |
obj-type | A resource type that can be associated with the searched-for resource. | See the explanation of each of the search types in Section 1.2.1.3.1, “Wildcards and Multiple Criteria” | Users | -- |
operator | Comparison operators. |
=
!= (not equal)
>
<
>=
<=
| -- | Value options depend on obj-type. |
Value | What the expression is being compared to. |
String
Integer
Ranking
Date (formatted according to Regional Settings)
|
Jones
256
normal
|
|
<value>
part of the syntax for strings. For example, to find all users beginning with m, enter m*
.
AND
and OR
. For example:
Vms: users.name = m* AND Vms.status = Up
Vms: users.name = m* AND Vms.tag = "paris-loc"
AND
or OR
, AND
is implied. AND
precedes OR
, and OR
precedes implied AND
.
sortby
. Sort direction (asc
for ascending, desc
for descending) can be included.
events: severity > normal sortby time desc
To save a query string as a Bookmark:
- In the Search Bar, enter the desired search query (see Section 1.2.1, “Search Syntax”).
- Click the star-shapedbutton to the right of the Search Bar.The New Bookmark dialog box displays. The query displays in the Search String field. You can edit it if required.
- In Name, specify a descriptive name for the search query.
- Clickto save the query as a bookmark.
- The search query is saved and displays in the Bookmarks pane.
To edit a bookmark:
- Select the Bookmark pane by clicking on the Bookmarks tab on the far left side of the screen.
- Select a bookmark from the Bookmark pane.
- The results list displays the items according to the criteria. Click the Bookmark pane.button on theThe Edit Bookmark dialog box displays. The query displays in the Search String field. Edit the search string to your requirements.
- Change the Name and Search String as necessary.
- Clickto save the edited bookmark.
To delete a bookmark:
- Select one or more bookmark from the Bookmarks pane.
- The results list displays the items according to the criteria. Click the Bookmark pane.button at the top of theThe Remove Bookmark dialog box displays, prompting you to confirm your decision to remove the bookmark.
- Clickto remove the selected bookmarks.
- In tree mode or flat mode, click the Resource tab for which you wish to create a tag, for example, Hosts.
- Click the Tags tab. Select the node under which you wish to create the tag. For example, to create it at the highest level, click the root node. The New button is enabled.
- Click New at the top of the Tags pane. The New Tag dialog box displays.
- Enter the Name and Description of the new tag.
- Click Tags tab.. The new tag is created and displays on the
- Click the Tags tab. Select the tag that you wish to modify. The buttons on the Tags tab are enabled.
- Click Edit on the Tags pane. The Edit Tag dialog box displays.
- You can change the Name and Description of the tag.
- Click Tags tab.. The changes in the tag display on the
- Click the Tags tab. The list of tags will display.
- Select the Tag(s) to be deleted. The Remove Tag(s) dialog box displays.
- The tag, or list of tags are displayed in the dialog box. Check that you are sure about the removal. The message warns you that removing the tag will also remove all descendants of the tag.
- Click Tags tab. The tag is also removed from all the objects that it was attached to.. The new tag is removed and no longer displays on the
- Search for the object(s) that you wish to tag/untag so that they are among the objects displayed in the results list.
- Select one or more objects on the results list.
- Click the Assign Tags button on the tool bar or right-click menu option.
- A dialog box provides a list of Tags. Select the check box to assign a tag to the object. Or, deselect the check box to detach the tag from the object.
- Click. The specified tag is now added/removed as a custom property of the selected object(s).
- Follow the search instructions in Section 1.2, “Search” , and enter a search query using “tag” as the property and the desired value or set of values as criteria for the search.The objects tagged with the tag criteria that you specified are listed in the results list.
Table of Contents
Table 2.1. Data Center Properties
Field/Tab
|
Description/Action
|
---|---|
Name
|
The name of the data center. This must be a unique name with any combination of uppercase or lowercase letters, numbers, hyphens and underscores. Maximum length is 40.
|
Description
| The description of the data center. While this is not a mandatory field, it is recommended. |
Type
| Any one of, NFS, iSCSI, FCP or Local Storage. This cannot be changed after creation without significant disruption and high possibility of data loss. The type of data domain dictates the type of the data center. All storage in a data center must be of one type only. For example, if iSCSI is selected as the type, only iSCSI data domains can be attached to the data center. |
Compatibility Level
| The version of the Red Hat Enterprise Virtualization, either 2.2 or 3.0. When you upgrade to a new version, it is necessary to upgrade the hosts, and then the clusters, and finally the data center. After upgrading the Manager, the hosts, clusters and data centers may still be in the earlier version. Ensure that you have upgraded all the hosts, then the clusters, before you upgrade the Compatibility Level of the data center. |
To create a data center from the Data Centers tab :
- Click New > New Data Center.Enter the properties in the New Data Center dialog box and click OK.
- The Guide Me dialog box displays the configuration tasks that must be completed before the data center can be activated. See Section 1.1.2, “Using the Guide Me facility”. Click to close the dialog box.
- The new data center displays in appropriate search results or lists of data centers, with a status of Uninitialized. An uninitialized data center requires further configuration, for example, storage domains must be attached to it. Either click the button on the Guide Me dialog box or select the new data center in the list, and click the Storage tab in the Details pane. You can define existing storage for the data center, or attach existing storage domains to the data center.
To configure a new data center using the Guide Me dialog box:
- Select the required data center from the Tree panel, and click the Guide Me button on the Data Centers tab.
- The Guide Me dialog box displays the configuration tasks that must be completed before the data center can be activated. To set up a data center, a number of tasks must be completed in sequence. You can perform this manually, by using the various tabs and dialog boxes, or you can use the Guide Me dialog boxes, which provide sequential, context-sensitive steps that lead to a complete and accurate configuration. The Guide Me dialog box prompts you to complete the required tasks; because it is context sensitive it only displays the actions that are appropriate to the resource that is being configured. If you are configuring a new data center, the dialog box prompts you to configure clusters, hosts, and storage. In addition, you can attach an ISO library as an option.
- Click each of the buttons in order, and follow the prompts and dialog boxs to set up all the required objects for the data center. Configuring clusters, hosts and storage are described in detail later in this document.
- Clickto close the dialog box.
Table 2.2. Data Centers Storage Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Domain Name
|
The name of the storage domain.
|
Domain Type
| Either ISO, data or export domain. While ISO domains can be shared across data centers, data domains cannot be shared. An export domain can only be attached to only one data center at a time. |
Status
| Either Active or Inactive. |
Free Space, Used Space and Total Space
| The amount of hard drive space on the storage domain that is available or used, or the total amount of hard drive space. |
Table 2.3. Data Center Logical Network Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Name
| The name of the network belonging to the data center. |
Description
| The description of the network belonging to the data center. |
Table 2.4. Data Center Clusters Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Name
| The name of the clusters belonging to the data center. |
Compatibility
| Compatibility Version- Either 2.2 or 3.0. When you upgrade to a new version, it is necessary to upgrade the hosts, and then the clusters. After upgrading the Manager, the hosts, clusters and data centers may still be in the earlier version. Ensure that you have upgraded all the hosts, before you upgrade the Compatibility Level of the cluster. |
Description
| The description of the cluster. |
Table 2.5. Data Center Permissions Tab Properties
Field/Tab
|
Description/Action
|
---|---|
User
| The user name of an existing user in Directory Services. |
Role
| The role of the user. The role is a combination of user, permission level, and object. Roles can be default or customized roles. |
Inherited Permissions
| The hierarchical permissions available to the user. |
To edit a data center from the Tree panel:
- Select the required data center and click the Edit button on the Data Centers tab.
- Change the properties in the Edit Data Center dialog box and click Save.
Important
Note
To remove a data center:
- Click the Data Centers tab.
- If the required data center is not visible, perform a search (see Section 1.2, “Search”).
- Select the data center to be removed. Ensure that there are no running hosts in any cluster. You can use the Remove.button or right-click on the data center and select
- Click thebutton.A message prompts you to confirm removal.
- Click Data Centers tab.. The data center is deleted and is no longer displayed on the
Warning
To reinitialize a data center:
- Click the Data Centers tab.
- If the required data center is not visible, perform a search (see Section 1.2, “Search”).
- Select the data center to be reinitialized. Ensure that there are no running hosts in any cluster. Right-click on the data center and select Reinitialize Data Center.
- A warning message displays and prompts you to confirm initialization. You are also prompted to select a new storage domain for the data center.
- Select thecheckbox.The storage domain is initialized and all objects removed from it. This includes all virtual machine images, templates and snapshots. You can now set up the data center again, attaching the initialized, or a new storage domain.
Warning
- Creation and removal of specific clusters.
- Addition and removal of hosts, virtual machines, pools.
- Permission to attach users to virtual machines within a single data center.
To assign a system administrator role to a data center:
- Click the Data Center tab. A list of data centers displays. If the required data center is not visible, perform a search (see Section 1.2, “Search”).Select the required data center, and click the Permissions tab displays a list of users and their current roles and permissions, if any.tab on the Details pane. The
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select .
- Click Permissions tab, with an icon and the assigned Role.. The name of the user displays in the
Note
To remove a system administrator role:
- Click the Data Center tab. A list of data centers displays. If the required data center is not visible, perform a search (see Section 1.2, “Search”).
- Select the required data center and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Select the check box of the appropriate user.
- Click. The user is removed from the Permissions tab. As this is hierarchical, the user will also be removed from the clusters, hosts and other objects.
Table 2.6. Cluster Properties
Field/Tab
|
Description/Action
|
---|---|
Data Center
|
The name of the data center. This must be a unique name with any combination of uppercase or lowercase letters, numbers, hyphens and underscores. Maximum length is 40.
|
Name
|
The name of the cluster. This must be a unique name with any combination of uppercase or lowercase letters, numbers, hyphens and underscores. Maximum length is 40.
|
Description
| The description of the cluster. While this is not a mandatory field, it is recommended. |
Type
| Any one of, Intel or AMD. This cannot be changed after creation without significant disruption and high possibility of data loss. The type of data domain dictates the type of the data center. |
Compatibility Level
| The version of the Red Hat Enterprise Virtualization, either 2.2 or 3.0. |
Important
- On the Tree pane, click the System tab. A list of data centers displays. Select the required Data Center from this list.sign next to the
- Open clusters by either expanding the required Data Center tab in the Tree pane and clicking on Clusters or select Clusters from the Details pane.
- Click the New Cluster dialog box displays.button. The
- On the General tab, perform the following:
General Tab
- The Data Center field should be pre-selected and disabled because you are already in the required Data Center.
- Enter the cluster Name and Description. The name cannot include spaces.
- Select the CPU Name for hosts in this cluster. All hosts must run the same type of CPU. The CPU Name list displays all the CPU types supported by Red Hat Enterprise Virtualization. Finally on the General tab, select the Compatibility Level of the data center, from either 2.2 or 3.0.
- The second option in New Cluster window is Memory Optimization.
Memory Optimization
- Use the Memory Optimization tab to define how much of the host's memory can be used in excess of the permitted memory for a virtual machine in the cluster. For example, all virtual machines will not be using the full amount of allocated memory all the time. Memory sharing allows virtual machines that require additional memory at a certain time to use memory that is not being used at that time by other virtual machines. This feature allows you to fine tune how you wish to optimize the memory page sharing and large pages implementation on the hosts in the cluster. Memory Optimization enables you to optimize for density and performance.
- The third option in New Cluster window is Resilience Policy.
Resilience Policy
- Select the Resilience Policy tab to define if high availability is to be implemented for the virtual machines in the cluster. If a host shuts down unexpectedly or is put into maintenance, the virtual machines running on the host can be re-run on another host in the same cluster. This field allows you to configure the migration settings for virtual machines.
- Select from Migrate Virtual Machines, (migrates all machines); Migrate only Highly Available Virtual Machines or Do Not Migrate Virtual Machines.
- Click Clusters tab.to create the cluster. The new host cluster is added to the data center and displays on theThe New Cluster - Guide Me dialog box displays. For more information on this feature, see Section 1.1.2, “Using the Guide Me facility”.
- The Guide Me dialog box prompts you to add hosts to the new cluster. Click the button, the New Host dialog box displays.Enter the details of the host to assign to the cluster. Click New Host dialog box and return to the Clusters tab. The Hosts tab on the Details pane displays the newly added hosts. Adding hosts is described in Chapter 4, Red Hat Enterprise Virtualization Hosts.to close the
Table 2.7. Cluster General Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Policy
|
The Edit Policy dialog box allows an administrator to set load balancing policy for a cluster to define the number of virtual machines that will be started on each host in the cluster. Set the Policy value to None to have no load or power sharing between hosts. This is the default mode.
|
Maximum Service Level
|
Use Even Distribution to evenly distribute the processing load across all hosts in the cluster. The host's CPU load is measured and used to apply the policy. Use the blue slider to specify the Maximum Service Level a host is permitted to have. A host that has reached the maximum service level defined will not have further virtual machines started on it. You can also specify the time interval in minutes that a host is permitted to run at the maximum service level before virtual machines are migrated off it. Selecting an even distribution load balancing policy causes virtual machines to be started on alternate hosts in the cluster to ensure that the CPU load on each host in the cluster is even.
|
Minimum Service Level
|
Use Power Saving to automatically reduce power consumption on under-utilized hosts. The green slider to specifies the Minimum Service Level a host is permitted to have. When a host has reached the minimum service level defined, virtual machines are migrated to other hosts. An administrator can then power down the hosts with low usage levels to conserve power. You can also specify the time interval (in minutes) that a host is permitted to run at the minimum service level before the migrations of any remaining virtual machines are triggered.
|
Table 2.8. Cluster Hosts Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Name
|
The name of the host.
|
Host/IP
|
The Host/IP address.
|
Status
|
The status of the host.
|
Load
|
The number of virtual machines in each host.
|
Table 2.9. Cluster Virtual Machines Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Name
| The name of the virtual machine belonging to a host. |
Status
| The status of all the virtual machine running on different hosts. |
Host
| The name of the host that a virtual machine is running on. |
Uptime
| The amount of time that a virtual machine has been up. |
Table 2.10. Cluster Logical Networks Tab Properties
Field/Tab
|
Description/Action
|
---|---|
Name
| The name of the logical networks in a cluster. |
Status
| The status of the logical networks. |
Role
| The hierarchical permissions available to the logical network. |
Description
| The description of the logical networks. |
Table 2.11. Cluster Permissions Tab Properties
Field/Tab
|
Description/Action
|
---|---|
User
| The user name of an existing user in the directory services. |
Role
| The role of the user. The role comprises of user, permission level and object. Roles can be default or customized roles. |
Inherited Permissions
| The hierarchical permissions available to the user. |
To set load and power management policies for hosts in a cluster:
- On the Tree pane click on the System tab. A list of Data Centers displays. Select the required Data Center from this list.sign next to the
- Open clusters by either expanding the required Data Center tab in the Tree pane and clicking on Clusters or select Clusters from the Results pane.
- A list of clusters displays. Select the required cluster. The Details pane for the cluster displays.
- On the Details pane, click the Edit Policy dialog box displays, typically with the None option selected.tab. Click the button. The
- Define the Load and Power Mode for hosts in the cluster. Select one of the following:
- None; to have no load or power sharing between hosts. This is the default mode.
- Even Distribution; to evenly distribute the processing load across all hosts in the cluster. The host's CPU load is measured and used to apply the policy. Use the blue slider to specify the Maximum Service Level a host is permitted to have. For example, a host that has reached the maximum service level defined will not have further virtual machines started on it. You can also specify the time interval in minutes that a host is permitted to run at the maximum service level before virtual machines are migrated off it.
- Power Sharing; to distribute the amount of power consumed across all running hosts. Use the green slider to specify the Minimum Service Level a host is permitted to have. For example, a host that has reached the minimum service level defined virtual machines will be migrated to other hosts, enabling the hosts with low usage levels to be switched off to conserve power. You can also specify the time interval (in minutes) that a host is permitted to run at the minimum service level before a power down is triggered.
- Clickto define the policy for the cluster.
To edit a cluster:
- Click the Clusters tab.A list of server clusters displays. Select the cluster that you want to edit.
- Click thebutton.The Edit Cluster dialog box displays. The Edit Cluster dialog box is identical to the New Cluster dialog box. Modify the fields as described in Creating a New Host Cluster
- Click.The changes to the server cluster details are displayed in the list.
To view hosts in a cluster:
- Click the Clusters tab. A list of server clusters displays. Select the appropriate cluster. The Details pane displays.
- Click thetab. A list of hosts displays.
To view virtual machines in a cluster:
- Click the Clusters tab.A list of clusters displays. Select the appropriate cluster. The Details pane displays.
- Click thetab.A list of virtual machines displays. This includes both virtual servers and virtual desktops.
Warning
To remove a cluster:
- Click the Cluster tab.
- If the required cluster is not visible, perform a search (see Section 1.2, “Search”).
- Select the cluster to be removed. Ensure that there are no running hosts.
- Click thebutton.A message prompts you to confirm removal. The dialog box lists all the clusters that are selected for removal.
- Click.The cluster is deleted and disappears from the Clusters tab.
Note
- Creation and removal of specific clusters.
- Addition and removal of hosts, virtual machines, pools.
- Permission to attach users to virtual machines within a single cluster.
To assign a system administrator role to a cluster:
- Click the Clusters tab.A list of clusters displays. If the required cluster is not visible, perform a search (see Section 1.2, “Search”).
- Select the cluster that you want to edit, and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and Inherited permissions, if any. This can include the Data Center Administrator.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search textbox, and click . A list of possible matches display in the results list.to add an existing user. The
- Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select .
- Click.The name of the user displays in the Permissions tab, with an icon and the assigned Role.
Note
To remove a system administrator role:
- Click the Clusters tab. A list of clusters displays. If the required cluster is not visible, perform a search (see Section 1.2, “Search”).
- Select the required cluster and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Select the check box of the appropriate user.
- Click. The user is removed from the Permissions tab. As this is hierarchical, the user will also be removed from the hosts and other objects.
- Guest data network
- Storage network access
- Management network
- Display network (for SPICE or VNC)
Warning
Table 2.12. Logical Network Properties
Field/Tab
|
Description/Action
|
---|---|
Name
| The name of the network belonging to the data center. |
Description
| The description of the network. |
STP Support, VLAN Tagging
| STP support and VLAN tagging are optional attributes. |
To create a new logical network in a data center or cluster
- Navigate to the Tree pane and click the required data center or cluster. On the Details pane, select the Logical Networks tab. This displays the existing logical networks. At the minimum, the default
rhevm
network is listed. - Click New (or Add Network on the Clusters Detail pane). The New Logical Network dialog box displays. Enter the Name and Description, and select the Assign Networks to Cluster(s) check box to add the storage network to a selected cluster in the data center.
- Click OK to create the new logical network. The new logical network is created and displays on the Logical Networks tab with a Non Operational status. The next step is to add the logical network to each host in cluster, to match the NIC on the host to the network. After this is done, the network will become operational.
To assign or detach a logical networks in a cluster
- Navigate to the Tree pane and click the required cluster. On the Details pane, select the Logical Networks tab. This displays the existing logical networks. At the minimum, the default
rhevm
network is listed. - Click the Assign/Detach button. The Assign/Detach Networks dialog box displays a list of the available networks. Select the logical network or networks and click OK. The assigned logical network displays on the Logical Networks tab.
To add or edit a logical network to hosts in a cluster
- From the Tree pane, select the required cluster. The Hosts tab displays a list of available hosts.
- For each of your installed hosts, place the host into Maintenance mode and on the Details pane, select the Network Interfaces tab.
- A list of network interfaces available for this host displays. One of them will already have the management network (rhevm) configured.
- Select the network interface to attach the newly added network and click the Edit Network Interface dialog box displays.button. TheEnter the new (or additional) Network Name. Select one of None, DHCP, Static radio buttons.For Static enter the IP and Subnet Mask and Default Gateway.
- Select the Check Connectivity check box to run a network check, provided the host is in Maintenance mode.
- Select the Save network configuration check box and click .
To use a logical network as a display network for SPICE:
- Click the Clusters tab. The list of clusters displays. Select the appropriate cluster. Click the Logical Networks tab in the Details pane.
- Select the network to be used as the display network for SPICE. For more information on the SPICE protocol, see Section 1.1.3, “About SPICE”.
- Click the Display in the pane. The selected network will be used for SPICE/vnc traffic.button, and click . The role of the network appears as
- Navigate to the Tree pane and click the required data center or cluster. On the Details pane of the selected data center or cluster, select the Logical Networks tab.
- Click New (or Add Network on the Clusters Detail pane). The New Logical Network dialog box displays. Enter the Name and Description. Select the Enable VLAN tagging check box, and enter the desired VLAN tag to add to traffic on this logical network in the provided text field. Select the Assign Networks to Cluster(s) check box to add the storage network to a selected cluster in the data center.
- Click OK to create the new logical network. The new logical network is created and displays on the Logical Networks tab with a Non Operational status.
- Select the Hosts tab, and one of the hosts in the cluster to which your VLAN tagged logical network was assigned. Click the Network Interfaces tab in the details pane. Select a network interface that does not carry the rhevm logical network, and click the button. The Edit Network Interface displays.
- Select the newly created VLAN tagged Network Name from the drop down menu. Select one of None, DHCP, Static radio buttons.For Static enter the IP and Subnet Mask and Default Gateway.
- Select the Check Connectivity check box to run a network check, provided the host is in Maintenance mode.
- Select the Save network configuration check box and click .
- The Network Interfaces tab of the details pane now shows VLAN information for the edited network interface. In the Vlan column newly created VLAN devices are shown, with names based on the network interface name and VLAN tag. For example, if you have edited
eth1
to carry traffic for VLAN 43, there will be a device calledeth1.43
in the same row as theeth1
device. - Next, add the logical network to each host in the cluster by editing a NIC on each host in the cluster. After this is done, the network will become operational.
Warning
To manage logical networks in a cluster
- Click the Clusters tab. The list of clusters displays.
- Select the appropriate cluster. Click the Logical Networks tab in the Details pane. A list of available networks displays. You can now add, assign, detach networks, or set one network as the display network. These operations are described earlier in this section.
To edit a logical network
- Ensure that all hosts in the data center are in Maintenance mode and navigate to the Tree pane and click the required data center. On the Details pane, select the Logical Networks tab.
- Click Edit. The Edit Logical Network dialog box displays. Edit the Name and Description, and select the Assign Networks to Cluster(s) check box to add the Storage network to a selected cluster in the data center.
- Click OK to save the changes.
To assign a network administrator role in a cluster
- Click the Cluster tab.A list of clusters displays. If the required cluster is not visible, perform a search (see Section 1.2, “Search”).
- Select the cluster that you want to edit, and click thetab from the Details pane.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list. Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select .to add an existing user. The
- Click.The name of the user displays in the Permissions tab, with an icon and the assigned Role.
Note
To remove a network administrator role:
- Click the Clusters tab. A list of clusters displays. If the required cluster is not visible, perform a search (see Section 1.2, “Search”).
- Select the required cluster and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Select the check box of the appropriate user.
- Click. The user is removed from the Permissions tab. As this is hierarchical, the user will also be removed from the clusters, hosts and other objects.
- Data domains hold the disk images of all the virtual machines running in the system, operating system images and data disks. In addition, snapshots of the virtual machines are also stored in the data domain. The data cannot be shared across data centers, and the data domain must be of the same type as the data center. For example, a data center of a iSCSI type, must have an iSCSI data domain. A data domain cannot be shared between data centers. A local storage domain can only be a data domain.
- ISO domains store ISO files (or logical CDs) used to install and boot operating systems and applications for the virtual machines. Because an ISO domain is a logical entity replacing a library of physical CDs or DVDs, an ISO domain removes the data center's need for physical media. An ISO domain can be shared across different data centers.
- An export domain is a temporary storage repository that is used to copy/move images between data centers and Red Hat Enterprise Virtualization Manager installations. In addition, the export domain can be used to backup virtual machines. An export domain can be moved between data centers, however, it can only be active in one data center at a time.
Important — Export Domain Storage Type
Support for export storage domains backed by storage on anything other than NFS is being deprecated. Existing export storage domains imported from Red Hat Enterprise Virtualization 2.2 environments remain supported. New export storage domains must be created on NFS storage.
- Add or edit storage domains.
- Activate, deactivate, or detach a storage domain from a data center.
- Maintain and delete storage domains
Note
- Click thetab. The Storage list and toolbar displays.
- Enter the Name of the storage domain, for example, accounting-server-images. A descriptive name is recommended.
- Select the appropriate Data Center. Select a Data Center from the drop-down list that displays all the Data Centers available and their storage types.
- Select the appropriate Domain Function / Storage Type. Select one:
- Data / NFS
- ISO
- Export
The Domain Function / Storage Type determines the availability of the Format field. Refer Table 6.3, “Permitted Storage Combinations” for more information on Format. - Select a host in Use host. To attach a domain, an active host must be selected.
Important
All communication to the storage domain is via the selected host and not from the Red Hat Enterprise Virtualization Manager. At least one host must be active and have access to the storage before the storage can be configured. - Enter the Export path of the storage. The export path can be either a static IP address or a resolvable hostname. For example, 192.168.0.10:/Images/ISO or storage.demo.redhat.com:/exports/iso.
- Click.
- The storage domain displays on the Storage tab.
To import an existing ISO or Export storage domain:
- Click the Figure 3.1, “The Storage Tab”.tab. The Storage list and toolbar display. Refer
- Select the appropriate Domain Function / Storage Type. Select one:
- Data / NFS
- ISO
- Export
The Domain Function / Storage Type determines the availability of the Format field. Refer Table 6.3, “Permitted Storage Combinations” for more information on Format. - Select a host in Use host. To attach a domain, an active host must be selected.
Important
All communication to the storage domain is via the selected host and not from the Red Hat Enterprise Virtualization Manager. At least one host must be active and have access to the storage before the storage can be configured. - Enter the Export path of the storage. The export path can be either a static IP address or a resolvable hostname. For example,or
192.168.0.10:/Images/ISO
.storage.demo.redhat.com:/exports/iso
- Click.
- The storage domain is imported and displays on the Storage tab. The next step is to attach it to a data center. This is described later in this chapter, Section 3.1.2.2, “Attaching Storage Domains to a Data Center”.
Important
Install nfs-utils
NFS functionality is provided by the nfs-utils package. Before file shares can be created, check that the package is installed by querying the RPM database for the system:$
rpm -qi nfs-utils
If the nfs-utils package is installed then the package information will be displayed. If no output is displayed then the package is not currently installed. Install it usingyum
while logged in as theroot
user:#
yum install nfs-utils
Configure Boot Scripts
To ensure that NFS shares are always available when the system is operational both thenfs
andrpcbind
services must start at boot time. Use thechkconfig
command while logged in asroot
to modify the boot scripts.#
chkconfig --add rpcbind
#chkconfig --add nfs
#chkconfig rpcbind on
#chkconfig nfs on
Once the boot script configuration has been done, start the services for the first time.#
service rpcbind start
#service nfs start
Create Directory
Create the directory you wish to share using NFS.#
mkdir
/exports/iso
Replace/exports/iso
with the name, and path of the directory you wish to use.Export Directory
To be accessible over the network using NFS the directory must be exported. NFS exports are controlled using the/etc/exports
configuration file. Each export path appears on a separate line followed by a tab character and any additional NFS options. Exports to be attached to the Red Hat Enterprise Virtualization Manager must have the read, and write, options set.To grant read, and write access to/exports/iso
using NFS for example you add the following line to the/etc/exports
file./exports/iso
*(rw)Again, replace/exports/iso
with the name, and path of the directory you wish to use.Reload NFS Configuration
For the changes to the/etc/exports
file to take effect the service must be told to reload the configuration. To force the service to reload the configuration run the following command asroot
:#
service nfs reload
Set Permissions
The NFS export directory must be configured for read write access and must be owned by vdsm:kvm. If these users do not exist on your external NFS server use the following command, assuming that
is the directory to be used as an NFS share./exports/iso
#
chown -R 36:36
/exports/iso
The permissions on the directory must be set to allow read and write access to both the owner and the group. The owner should also have execute access to the directory. The permissions are set using thechmod
command. The following command arguments set the required permissions on the
directory./exports/iso
#
chmod 0755
/exports/iso
- Click thetab. The Storage list and toolbar display.
- Click New Domain.
- Configure the following options:
Name: Enter a suitably descriptive name. Data Center: Select the required Data Center from the drop-down list. Domain Function/ Storage Type: In the drop down menu, select Data → NFS. The storage domain types which are not compatible with the Default data center are grayed out. After you select your domain type, the Export Path field appears. Export path: Enter the IP address or a resolvable hostname of the chosen host. The export path should be in the format of 192.168.0.10:/Images/ISO or domain.example.com:/Images/ISO
Use Host: Select any of the hosts from the drop down menu. Only hosts which belong in the pre-selected data center will display in this list. Active Host Required
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - Click OK.
Storage Domain
for a Volume Group
. A Volume Group
is a set of pre-defined Logical Unit Numbers (LUNs). Red Hat Enterprise Virtualization supports creation of a Storage Domain
from a pre-existent Volume Group
or a set of LUNs. Neither Volume Group
s nor LUNs are able to be attached to more than one Storage Domain
at a time.
- On the tree pane, select the Tree tab. On System, click the icon to display the available data centers.
- Select the Data Center to which the domain is to be added. The storage type of the data center selected determines the type of storage domains that can be added to it. To add an iSCSI data, or export, storage domain you must select an iSCSI data center. iSCSI storage domains can not be used for ISO storage domains.
- Click the New Domain button.
- Click New Storage. The New Storage dialog box displays.
- From the Domain Function / Storage Type drop-down menu, select the appropriate storage type for the storage domain. The storage domain types that are not compatible with the chosen data center are not available.
- Select an active host in the Use host field. To attach a domain, the name of an active host must be selected from the list of existing hosts. Only hosts that are attached to the selected Data Center are listed.
Active Host Required
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - The Red Hat Enterprise Virtualization Manager is able to map either iSCSI targets to LUNs, or LUNs to iSCSI targets. The New Domain dialog automatically displays known targets with unused LUNs when iSCSI is selected as the storage type. If the target that you are adding storage from is not listed then you can use target discovery to find it, otherwise proceed to the next step.
iSCSI Target Discovery
- Click Discover Targets to enable target discovery options. The New Domain dialog automatically displays targets with unused LUNs when iSCSI is selected as the storage type. If the target that you are adding is not listed, click Discover Targets to enable target discovery options.
- Enter the fully qualified domain name or IP address of the iSCSI host in the Address field.
- Enter the port to connect to the host on when browsing for targets in the Port field. The default is
3260
. - If the Challenge Handshake Authentication Protocol (CHAP) is being used to secure the storage, select the User Authentication check box. Enter the CHAP user name and password.
- Click thebutton.
- Click the + button next to the desired target. This will expand the entry and display all unused LUNs attached to the target.
- Select the check box for each LUN that you are using to create the storage domain.
- Clickto create the storage domain.
Storage Domain
for a Volume Group
. A Volume Group
is a set of pre-defined Logical Unit Numbers (LUNs). Red Hat Enterprise Virtualization supports creation of a Storage Domain
from a pre-defined Volume Group
or a set of LUNs. Neither Volume Group
s nor LUNs are able to be attached to more than one Storage Domain
at a time.
Procedure 3.1. To Add FCP Storage:
- Click thetab. The Storage list and toolbar display.
- Click New Domain.
- Configure the following options:
- Name: Enter a suitably descriptive name.
- Data Center: Select the required Data Center from the drop-down list.
- Domain Function/ Storage Type: Select .
- Use Host: Select the IP address of either the hypervisor or Red Hat Enterprise Linux host.
Active Host Required
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - The list of existing LUNs display. On the selected LUN, select the Add LUN check box to use it as the FCP data domain.
- Click OK.
- On a Red Hat Enterprise Virtualization Hypervisor host, set up the path for the local storage as /data/images. This is the only path permitted for a Red Hat Enterprise Virtualization Hypervisor.
- On a Red Hat Enterprise Linux host, set up the path for local storage in the /data directory. Any path is permitted on a Red Hat Enterprise Linux host. Follow these instructions to add local storage:
- Click thetab. The Storage list and toolbar display.
- Click New Domain. The New Domain dialog box displays.
- Enter the Name of the domain. A suitably descriptive name is recommended.
- Select the Data option as the Domain Type for the data center.
- Select the Storage Type for the domain. Select Local from:
- NFS
- iSCSI
- FCP
- Local
- Select the local host in the Use host field. This must be the host on which the local storage is set up.
- Enter the Path of the storage. For example,
data/images
ordata/localimages
. - Click.
- The local storage domain displays on the Storage tab. This may take a few moments.
To Add Multipathed iSCSI Storage:
- Click thetab. The Storage list and toolbar display.
- Click New Domain. The New Domain dialog box displays.
- Enter the Name of the storage domain.
- Enter the Domain function of the storage domain, as Data, ISO or Export.
- Select iSCSI as the Storage Type. The dialog box displays a set of fields appropriate to the iSCSI type.
- Select a host in the Use host field. To attach a domain, the name of any active host must be selected from the list.
Active Host Required
All communication to the storage domain is via the active host and not from the Red Hat Enterprise Virtualization Manager. At least one host must exist in the system before the storage can be configured. - Select either Build New Domain or Use Preconfigured Volume Group. In this step you can either attach a set of LUNs (create a volume group) or attach an already existing Volume Group as your storage domain. This example shows you how to build a new domain using a set of LUNs.
- If necessary, to search for LUNs, click thebutton.
- The Connect to Targets dialog box displays, enabling you to define a target on which to search for LUNs. Enter the requisite information in the fields.
- Enter the IP Address of the iSCSI target.
- Enter the Port to connect to, or leave it as the default port.
- If required, enter the details for User Authentication.
- Click thebutton to find the targets.
- The targets display in the list of Discovered Targets.
- Click to either Login to All targets, or Add targets manually. If adding manually, select the LUNs (Logical Unit Numbers) from the list, and click the to login.
- Click Connect to Targets dialog box closes and the LUNs display in the New Domain dialog box.. The
- A list of LUNs display in the list of Discovered LUNs. Note that the Multipathing column will display a number to indicate the number of paths available to each LUN on the target. Click the check box of the LUNs to select for addition.
- Click the Add button to use the LUNs as a storage domain.
- The LUNs selected in the previous step display in the Selected LUNs grid. The set of LUNs in this list will be assigned to the new storage domain. Use the button to remove LUNs from the Selected LUNs if necessary.
- Clickto attach the selected LUNs to the iSCSI storage domain.
To attach a data domain:
- Click the Data Centers tab. Select the data center to which the storage is to be attached. If the required data center is not displayed, perform a search (see Section 1.2, “Search”).
- The Details pane of the selected data center displays. Select the Storage tab.
- Click thebutton to add the storage location where the data and disk images are stored.
- The Attach Storage Domain dialog box displays.
- Select the domain from the Storage Domain list. The names of any existing storage domains, of the type appropriate for the data center display in the list. For example, if the default data center has a storage type of NFS, only existing NFS storage domains display in the list, because only NFS storage domain types can be attached to this particular data center.
- Click Storage tab of the Details pane.. The new storage domain displays on the
rhevm-iso-uploader
. You must be logged in as the root
user to run it successfully. You must provide the administration credentials for the Red Hat Enterprise Virtualization environment on the command line. Full usage information, including a list of all valid options for the command, is available by running the rhevm-iso-uploader -h
command.
Usage:rhevm-iso-uploader
[options]
list
rhevm-iso-uploader
[options]
upload
[file].[file]...[file]
list
, and upload
.
- The
list
parameter lists the available ISO storage domains. These storage domains are the valid targets for ISO uploads. By default the list is obtained from the Red Hat Enterprise Virtualization Manager installation on the local machine. - The
upload
parameter uploads the selected ISO file(s) to the specified ISO storage domain. By default the transfer is performed using NFS however SSH is also available.
list
or upload
parameter is provided. Where upload
is selected then the name of at least one local file to upload must also be provided.
rhevm-iso-uploader
command has a large number of options.
General Options
--version
- Displays the version number of the command in use, and exits immediately.
-h
,--help
- Displays command usage information, and exits immediately.
--quiet
- Sets quiet mode, reducing console output to a minimum. This is off by default.
--log-file=
PATH
- Sets
PATH
as the log file the command should use for its own log output. --conf-file=
PATH
- Sets
PATH
as the configuration file the command should use. -v
,--verbose
- Sets verbose mode, providing more console output. This is off by default.
-f
,--force
- Where the source file being uploaded has the same file name as an existing file at the destination, force the existing file to be overwritten automatically. This is off by default.
Red Hat Enterprise Virtualization Manager Options
-u
,USER
--user=
USER
- Sets the user as
USER
. This must be a user that exists in directory services, and is known to the Red Hat Enterprise Virtualization Manager. The user must be specified in the formatuser
@domain
, whereuser
replaced by the username, anddomain
is replaced by the directory services domain in use. -r
,FQDN
--rhevm=
FQDN
- Sets the Red Hat Enterprise Virtualization Manager to connect to as
FQDN
.FQDN
must be replaced by the fully qualified domain name of the manager. By default it is assumed that the ISO uploader is being run on the same machine as the manager. Therefore the default value for this parameter islocalhost
.
ISO Storage Domain Options
-i
,--iso-domain=
ISODOMAIN
- Sets the storage domain named
ISODOMAIN
as the destination for uploads. -n
,--nfs-server=
NFSSERVER
- Sets the NFS path of
NFSSERVER
as the destination for uploads. This option is an alternative to--iso-domain
, the two must not be used at the same time.Example 3.1. Specifying an NFS Server
#
rhevm-iso-uploader --nfs-server=
storage.demo.redhat.com:/iso/path
uploadRHEL6.0.iso
Connection Options
--ssh-user=
USER
- Sets
USER
as the SSH username to use for the upload. --ssh-port=
PORT
- Sets
PORT
as the port to use when connecting to SSH. -k
,KEYFILE
--key-file=
KEYFILE
- Sets
KEYFILE
as the public key to use for SSH authentication. If no key is set the program will prompt you to enter the password of the user specified instead.
Example 3.2. Basic ISO Uploader Usage
#rhevm-iso-uploader list
Please provide the REST API username for RHEV-M (CTRL+D to abort):admin@directory.demo.redhat.com
Please provide the REST API password for RHEV-M (CTRL+D to abort): ISO Storage Domain List: ISODomain #rhevm-iso-uploader --iso-domain=
Please provide the REST API username for RHEV-M (CTRL+D to abort):ISODomain
uploadRHEL6.iso
admin@directory.demo.redhat.com
Please provide the REST API password for RHEV-M (CTRL+D to abort):
Note
To attach an export domain:
- Click the Data Centers tab.Select the data center to which the export domain is to be attached.
- The Details pane displays. Select the Storage tab.
- Click thebutton to add the storage location where the images are stored.
- The Attach Export Domain dialog box displays, if there are export domains available.
- Select the export domain from the list.
- Click the Locked, followed by Inactive.. The new export domain displays on the tab of the pane, with a status of
- Select the new export domain on the Activate button.tab of the pane, and click the
- The export domain will be activated in a few moments and display an Active status.
Warning
To assign a system administrator role to a storage domain:
- Click the Storage tab.A list of storage domains displays. If the required storage domain is not visible, perform a search (see Section 1.2, “Search”).
- Select the storage domain that you want to edit, and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any. The System Administrator of the Red Hat Enterprise Virtualization platform, the Data Center Administrator and the Template Administrator, if existing, will display with inherited permissions.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Click.The name of the user displays in the Permissions tab, with an icon and the assigned Role.
Note
To remove a system administrator role:
- Click the Data Center tab. A list of storage domains displays. If the required storage domain is not visible, perform a search (see Section 1.2, “Search”).
- Select the required storage domain and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any. The System Administrator of the Red Hat Enterprise Virtualization platform, the Data Center Administrator and the Template Administrator, if existing, will display with inherited permissions. You cannot remove permissions from these users.
- Select the check box of the appropriate user.
- Click. The user is removed from the Permissions tab.
Warning
- Click thetab. The Storage page displays the list of existing storage domains, and the Storage toolbar displays.If the required storage is not displayed, perform a search (see Section 1.2, “Search”).
- Shut down and move all the virtual machines running on the data domain. See Section 6.7.5, “Moving Virtual Machines within a Data Center”.
- Select the ISO storage domain, if any, to place in maintenance mode.
- On the Details pane, click the Data Center tab. Click the button. The ISO storage domain is deactivated, and displays as Inactive in the Storage pane.
- Select the data domain to be moved into maintenance mode. If you attempt to move a data storage domain into maintenance mode while the ISO domain is still active, a message appears prompting you to deactivate other data domains.
- On the Details pane, click the Data Center tab. Click the button. The data storage domain is deactivated, and appears as Inactive in the Storage pane.
Note
Warning
To Edit Storage Domains:
- Click thetab. The Storage page displays the list of existing storage domains, and the Storage toolbar displays.
- Select the required storage domain. Ensure that it is in Maintenance mode.If the required storage is not displayed, perform a search (see Section 1.2, “Search”).
- Click Edit Storage Domain dialog box displays. Depending on the status of the domain, some or all fields in the dialog box are enabled. The Edit Storage Domain dialog box contains the same fields as the New Storage dialog box. See Figure 3.2, “Adding New Storage”.on the Storage toolbar. The
- Change the required fields and click.
- You can now activate the storage and check the validity of the configuration. See Section 3.1.2.2, “Attaching Storage Domains to a Data Center”
Note
- Click thetab. The Storage page displays the list of existing storage domains, and the Storage toolbar displays.
- Select an inactive data storage domain.If the required storage is not displayed, perform a search (see Section 1.2, “Search”).
- On the Details pane, click the Data Center tab.Clickbutton on the toolbar. The domain is activated, and displays as Active in the Storage pane.
Important
If you attempt to activate the ISO domain before activating the data domain, an error message displays, and the domain is not activated.
Note
Warning
- Click thetab. The Storage page displays the list of existing storage, and the Details pane displays.
- Select the storage domain to be detached. Ensure that no virtual machines are running on the domain.
- Move the storage domain into Maintenance mode. See Section 3.1.5.1, “Maintaining Storage Domains”.
- On the Details pane, click the Data Centers tab.
- Clickbutton on the Storage toolbar.
- The detached storage domain displays in the list of storage domains with a status of Detached.
Note
Warning
To remove a storage domain:
- Click thetab. The Storage page displays the list of existing storage domains, and the Storage toolbar displays.
- Select the storage domain to be removed. Ensure that no virtual machines are running on the domain.
- Move the domain into Maintenance mode to deactivate it. See Section 3.1.5.1.1, “Moving Storage Domains to Maintenance Mode”.
- Clickon the Storage Tool bar.
- Click. The storage domain is permanently removed from the system.
- Click thetab. The deleted storage domain no longer displays in the list of storage domains.
Note
- Red Hat Enterprise Linux 6.1 or later AMD64/Intel 64 version
Note
Support is still ongoing for Red Hat Enterprise Linux 5.4 and 5.5 that already belong to existing Clusters. However, the Red Hat Enterprise Virtualization Guest Agent is now included in the virtio serial channel, whereas before it was in a separate channel. As a result, the Guest Agent installed on Windows guests on Red Hat Enterprise Linux hosts that are upgraded from version 5 to 6 lose connection to the Manager.
- Must belong to only one cluster in the system. For more information on clusters, refer Section 2.2, “Clusters”.
- Must have CPUs that support the AMD-V™ or Intel VT® hardware virtualization extensions.
- Must have CPUs that support all functionality exposed by the virtual CPU type selected upon cluster creation.
- Can have a maximum of 128 physical CPUs.
- Can have a maximum of 1 TB RAM.
- Can have an assigned system administrator with system permissions.
Table 4.1. Hosts Properties
Field/Tab
|
Description/Action
|
---|---|
Data Center
| The selected data center. |
Host Cluster
| The selected host cluster. All hosts in a cluster must be of the same architecture. |
Name
| The host name. Provide a descriptive name. |
Address
| The IP address, or resolvable hostname of the host (provided during installation). |
Root Password
| The password of the designated host; used during installation of the host. |
Power Management Address
| The address of the remote access card (RAC) on the host. The password of the designated host; used during installation of the host. |
Power Management User Name
| A valid User Name for the OOB management. |
Note
Important
- The host hardware is Red Hat Enterprise Linux certified. Refer to https://hardware.redhat.com/ to confirm that the server has Red Hat certification.
Important
The Red Hat Enterprise Virtualization platform only supports 64-bit processors with the Intel VT or AMD-V extensions. Only the AMD64/Intel 64 version of Red Hat Enterprise Linux 6.1 and higher is compatible for use with Red Hat Enterprise Virtualization platform. - If you are using VLAN, the network VLAN should be configured for access to the Red Hat Enterprise Virtualization Manager.
- If a host is to be highly available, and have power management, out-of-band management must be set up and configured correctly. In most instances, this requires the presence of a remote access card (RAC) in the host.
- The BIOS in the host has Intel VT or AMD-V activated.
- Red Hat Enterprise Virtualization Hypervisor or Red Hat Enterprise Linux Host has been installed with either of the supported operating systems. For detailed information on installation, including how to install multiple hosts, install from networks, or other advanced features, refer to the appropriate installation documents. Refer Appendix H, Additional References.
- The host has a resolvable hostname or static IP address.
- A data partition with a minimum size of 25 GB is recommended to provide temporary storage.
- In the Hosts tab, select the newly-configured host. This host will display a status of "Pending Approval".
- Click thebutton.
Procedure 4.1. Directions:
Install Red Hat Enterprise Linux
Ensure that Red Hat Enterprise Linux is correctly installed and configured on the physical host. Refer to the Red Hat Enterprise Linux Installation Guide for more information. Only the Base package group is required. All other packages can be removed or not selected.Important — Provide Access to Authentication Files
If you are using proprietary directory services or standard directory services with no access to authentication files for user management, thevdsm
package will fail to create the required system user. The authentication files required by theuseradd
command must be accessible to the installer. Red Hat Directory Server (RHDS) recommends a security policy with a mixture of local files and LDAP. Following this recommendation will resolve this issue.Note — DNS Configuration
It is recommended that all Red Hat Enterprise Linux hosts have a fully resolvable network address. This includes having valid forward and reverse lookups for each host's address available in DNS.Configure
VLANs
If you are using VLAN, ensure thatVLANs
are configured for access to the Red Hat Enterprise Virtualization Manager.Check Red Hat Network Subscriptions
Ensure the host is correctly subscribed to theRed Hat Enterprise Virt Management Agent (v 6 x86_64)
channel in Red Hat Network, also referred to asrhel-x86_64-rhev-mgmt-agent-6
, on Red Hat Network. If you do not have the appropriate subscription entitlements, contact Red Hat Customer Service.- If the machine has not already been registered with Red Hat Network, run the
rhn_register
command asroot
to register it. To complete registration successfully you will need to supply your Red Hat Network username and password. Follow the onscreen prompts to complete registration of the system.# rhn_register
- You must now add a subscription to the
Red Hat Enterprise Virt Management Agent (v 6 x86_64)
channel to the machine. To add the channel subscription to the system from the Red Hat Network web interface:- Log on to Red Hat Network (http://rhn.redhat.com).
- Click Systems at the top of the page.
- Select the system to which you are adding channels from the list presented on the screen, by clicking the name of the system.
- Click Alter Channel Subscriptions in the Subscribed Channels section of the screen.
- Select the
Red Hat Enterprise Virt Management Agent (v 6 x86_64)
channel from the list presented on the screen, then click the Change Subscription button to finalize the change.
Open firewall ports
Red Hat Enterprise Virtualization platform uses a number of network ports for management and other virtualization features.The following steps configureiptables
to open the required ports. These steps replace any existing firewall configuration with that required for Red Hat Enterprise Virtualization Manager. If you have existing firewall rules with which this configuration must be merged then you must manually edit the rules defined in theiptables
configuration file,/etc/sysconfig/iptables
.- Remove and existing firewall rules.
# iptables --flush
- Add the ports required by Red Hat Enterprise Virtualization Manager to the
iptables
rules.# iptables --append INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # iptables --append INPUT -p icmp -j ACCEPT # iptables --append INPUT -i lo -j ACCEPT # iptables --append INPUT -p tcp --dport 22 -j ACCEPT # iptables --append INPUT -p tcp --dport 16514 -j ACCEPT # iptables --append INPUT -p tcp --dport 54321 -j ACCEPT # iptables --append INPUT -p tcp -m multiport --dports 5634:6166 -j ACCEPT # iptables --append INPUT -p tcp -m multiport --dports 49152:49216 -j ACCEPT # iptables --append INPUT -j REJECT --reject-with icmp-host-prohibited # iptables --append FORWARD -m physdev ! --physdev-is-bridged -j REJECT --reject-with icmp-host-prohibited
Note
The providediptables
commands add firewall rules to accept network traffic on a number of ports. These include:- port
22
for SSH, - ports
5634
to6166
for guest console connections, - port
16514
for libvirt virtual machine migration traffic, - ports
49152
to49216
for VDSM virtual machine migration traffic, and - port
54321
for the Red Hat Enterprise Virtualization Manager.
- Save the modified rules.
# service iptables save
- Ensure that the
iptables
service is configured to start on boot and has been restarted, or started for the first time if it wasn't already running.# chkconfig iptables on # service iptables restart
Configure
sudo
accessThe Red Hat Enterprise Virtualization Manager makes use of sudo to perform operations asroot
on the host. The default configuration stored in/etc/sudoers
contains values to allow this. If this file has been modified since Red Hat Enterprise Linux installation these values may have been removed. Asroot
run visudo to ensure that the/etc/sudoers
contains the default configuration values. Where it does not they must be added.# Allow root to run any commands anywhere root ALL=(ALL) ALL
Enable SSH access for root
The Red Hat Enterprise Virtualization management daemon accesses host machines via SSH. To do this it logs in asroot
with an encrypted key for authentication. To ensure that SSH is configured androot
is able to use it to access the system follow these additional steps.Warning
The first time the Red Hat Enterprise Virtualization Manager is connected to the host it will install an authentication key. In the process it will overwrite any existing keys which exist in/root/.ssh/authorized_keys
.- These steps assume that the openssh-server package is installed on the system. Where the package is not present use yum to install it.
# yum install openssh-server
- Use
chkconfig
to verify which run-levels SSH is enabled at.# chkconfig --list sshd sshd 0:off 1:off 2:on 3:on 4:on 5:on 6:off
It is expected that the SSH daemon shows ason
for run-levels3
,4
, and5
. This is the default configuration.If the configuration on the host differs usechkconfig
to enable it for the required run-levels. The/etc/init.d/sshd
script can then be used to ensure the service is currently started.# chkconfig --level 345 sshd on # /etc/init.d/sshd start
To verify this operation as successful runchkconfig --list sshd
again and check the output. It should now show the daemon ason
at run-level3
,4
, and5
. - In Red Hat Enterprise Linux the default SSH daemon configuration allows remote login by the
root
user. This is also a requirement for the Red Hat Enterprise Virtualization Manager to successfully access the machine. In some cases administrator's may have disabled this ability.To check whether or not this is the case search the/etc/ssh/sshd_config
for the valuePermitRootLogin
. This must be done while logged in asroot
.# grep PermitRootLogin /etc/ssh/sshd_config PermitRootLogin no
WherePermitRootLogin
is set tono
the value must be changed toyes
. To do this edit the configuration file.# vi /etc/ssh/sshd_config
Once the updated configuration file has been saved the SSH daemon must be told to reload it.# /etc/init.d/sshd reload Reloading sshd: [ OK ]
Theroot
user should now be able to access the system via SSH.
- Virtualization capability checks.
- Installation of requisite packages.
- Creation of bridge.
- Reboot of the host.
- Click the Hosts tab. The Hosts tab displays a list of all hosts in the system.
- Click the New button. The New Host dialog box displays.Enter the following details in thetab:
Data Center
: Select the appropriate data center from the drop-down menu that you want to assign to the new host.Note
A default data center is displayed; change the default only if you are sure that another data center can be used.Host Cluster
: The cluster to which the host belongs (select from the drop-down list).Name
: A descriptive name for the host.Address
: The IP address, or resolvable hostname of the host (provided during installation).Root password
: the password of the designated host; used during installation of the host.
- Click thetab.
Enable Power Management
: Select this check box to turn out-of-band (OOB) power management on. If selected, the information for the following fields must also be provided:- The Address of the host. This is usually the address of the remote access card (RAC) on the host.
- A valid User Name for the OOB management.
- A valid, robust Password for the OOB management.
- The Type of the OOB management device. Select the appropriate device from the drop down list.
Table 4.2. Types of OOB management devices
alom Sun ALOM apc APC bladecenter IBM Bladecenter Remote Supervisor Adapter drac5 Dell Remote Access Controller for Dell computers eps Entry-Level Power Supply Specification ilo HP Integrated Lights Out standard ipmilan Intelligent Platform Management Interface rsa IBM Remote Supervisor Adaptor rsb Fujitsu-Siemens RSB management interface wti WTI PowerSwitch Cisco_ucs Cisco Systems - Depending on the Type selected, any or all of the following fields display on the Power Management tab.
- Click Secure to use SSH to connect to OOB management.
- The Port to connect to OOB management.
- Enter the Slot if a Blade server is being configured.
- Enter any Options that are needed for the SSH command.
- Click the Alerts panel. The Alerts panel displays on the bottom right corner of the screen. If there are existing alerts, the alert text changes color to brighter red.button to test the operation of the OOB management solution. Alerts, if any, appear on the
Note
The Alerts panel can be resized by using the button, or dragging the border upwards/downwards.Important
Red Hat Enterprise Virtualization recommends the configuration of power management on the hosts. Power management enables the system to fence a troublesome host using an additional interface.Important
If the host is required to be Highly Available, power management must be enabled and configured. Setting up power management for hosts is described in detail later in this guide. Refer Section 13.3.1, “Setting the Parameters for Fencing”. - Click.The new host displays in the list of hosts with a status of "Installing". Once installation is complete, the status of the newly added host is Pending Approval. The host must be activated for the status to change to Up.
Note
- In the Hosts tab, select the host to be activated.
- Click thebutton.
Note
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Preparing for Maintenance, followed by Maintenance. The icon changes to indicate that the host is in maintenance mode.button to migrate all virtual machines to alternative hosts, and place the host into maintenance. The field of the host changes to
- Click the Network Interfaces tab on the Details pane. The Network Interfaces tab displays the list of NICs on the host, their address and other specifications. Select the NIC that you want to edit.
- Click the Edit Network Interface dialog box displays.button. The
- To attach the NIC to a different logical network, select a different Network from the list of available logical networks.
- Select the network setting of None, DHCP, or Static. For Static setting, provide the IP, Subnet and Default Gateway information for the host.
- Select the Check Connectivity check box if necessary.
- Click.
- Activate the host. See Section 4.1.2.1.5, “Activating a Host”.
Important
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Preparing for Maintenance, followed by Maintenance. The icon changes to indicate that the host is in maintenance mode.button to migrate all virtual machines to alternative hosts, and place the host into maintenance. The field of the host changes to
- Click the Network Interfaces tab on the Details pane. The Network Interfaces tab on the Details pane that displays the list of NICs on the host, their address and other specifications. Select the appropriate management NIC that you want to edit.
- Click the Edit Management Network dialog box displays.button. The
- To attach the RHEVM management network to a different NIC, select a different interface from thedrop-down list of available NICs.
- Select the network setting fromor . For setting, provide the IP, Subnet and Default Gateway information for the host.
- Select the Check Connectivity check box if necessary.
- Select thecheck box to make the changes persistent, since changes done to the Networking configuration are temporary until explicitly saved.
- Click.
- Activate the host. See Section 4.1.2.1.5, “Activating a Host”.
Note
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Status field of the host changes to Preparing for Maintenance, followed by Maintenance. The icon changes to indicate that the host is in maintenance mode.button to migrate all virtual machines to alternative hosts, and place the host into maintenance. The
- Click the Network Interfaces tab on the Details pane that displays the list of NICs on the host, their address and other specifications.
- Select the multiple NICs that are to be bonded together.
Important
You cannot bond between NICs if the status for all is “UP” (The status arrow in the beginning is Green). To use the Bond feature, at least one NIC should be down (The status arrow in the beginning is Red). - Click the Bond Network Interface dialog box displays.button. The
- To create a bonded interface select a Bond Name from the list.
- Select the network setting from None, DHCP or Static. For Static setting, provide the IP, Subnet Mask and Default Gateway information for the host.
- Select the Check Connectivity check box if necessary.
- Select thecheck box to make the changes persistent, since changes done to the Networking configuration are temporary until explicitly saved.
- Click.
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Status field of the host changes to Preparing for Maintenance, followed by Maintenance. The icon changes to indicate that the host is in maintenance mode.button to migrate all virtual machines to alternative hosts, and place the host into maintenance. The
- Click the Network Interfaces tab on the Details pane that displays the list of NICs on the host, their address, and other specifications.
- button. The
- The dialog box lists the NICs selected for detachment.
- Clickto confirm the detachment.
- Activate the host. See Section 4.1.2.1.5, “Activating a Host”.
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Status field of the host changes to Preparing for Maintenance, followed by Maintenance. The icon changes to indicate that the host is in maintenance mode.button to migrate all virtual machines to alternative hosts, and place the host into maintenance. The
- Click thetab on the Details pane that displays the list of NICs on the host, their address, and other specifications.
- Click thebutton.
- The host network configuration is saved and the following message is displayed on the task bar: “Network Changes were saved on host
<Hostname>
."
- Click the Hosts tab. If the host you want to view is not displayed, perform a search (see Section 1.2, “Search”).A list of hosts displays. Select the appropriate host. The Details pane displays. The Details pane displays general information, network interface information and virtual machine information.
- Click thetab. The General tab displays the following information:
- Version Information for OS, Kernel, KVM, VDSM, and SPICE.
- Host type for example iSCSI Initiator Name.
- Active VMs.
- Status of Memory Page Sharing (Active/Inactive) and Automatic Large Pages(On/Off).
- CPU information like number of CPUs attached, CPU name and type, total Physical Memory allocated to the selected host, Swap Size, and Shared Memory proportion.
- In addition, if an updated version of the host is available, an Alert appears.
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click thetab on the Details pane. A list of virtual machines running on the host displays. This includes both virtual servers and virtual desktops. Virtual machines can be scheduled to run on the approved host. The list also displays cluster, network and display information.
- You can, and a virtual machine from this tab.
- Click thetab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Network Interfaces tab is discussed in detail in Section 4.1.2.2, “Managing Host Network Interfaces”.tab on the Details pane. A list of virtual machines running on the host displays. This allows you to define the attachment of the logical network in the Administration Portal to the physical network interface cards (or NICs) of the host. The
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click thetab on the Details pane. Hooks can be implemented to execute scripts when key events are triggered. When called, a hook executes the scripts in
/usr/libexec/vdsm/hooks/hook-name/
in alphabetical order. The Host Hooks tab displays information about Event, Script, and Property name and value. More information about VDSM Hooks can be found in Appendix B.
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Details pane. The tab displays a list of users, their roles, and their inherited permissions.tab on the
- Click the Hosts tab. A list of hosts displays. Select the appropriate host. The Details pane displays.
- Click the Events tab displays information about any important events that a system administrator should know about, such as problems with storage or notifications that have been sent to users for unexpected events, such as when virtual machines are unexpectedly shut down.tab on the Details pane. The
Warning
- Click the Hosts tab. A list of hosts displays. If the host you want to edit is not displayed, perform a search (see Section 1.2, “Search”).
- Select the appropriate host. The Details pane displays information about the host.
- button to migrate all virtual machines to alternative hosts, and place the host into maintenance. The
- The Status field of the host changes to Preparing for Maintenance, followed by Maintenance. The icon changes to indicate that the host is in maintenance.
- Perform any required tasks. When the host is ready to be reactivated, click thebutton to bring the host back up.The Status field of the host changes to Up.
Note
yum update
like any Red Hat Enterprise Linux system.
Warning
- Click the Hosts tab. A list of hosts is displayed. If the host you want to edit is not displayed, perform a search (see Section 1.2, “Search”).
- Select the host that you want to edit. Click the Edit Host dialog box opens.button. The
- Edit the details as required (see Section 4.1.2.1.3, “Adding Red Hat Enterprise Linux Hosts”). Click to save the changes.The details of the host are updated in the Hosts tab, and the status changes appropriately.
To tag a host:
- Click the Hosts tab.A list of hosts is displayed. If the host you want to edit is not displayed, perform a search (see Section 1.2, “Search”).
- Select the appropriate host, and click thebutton.The Assign Tags dialog box opens. It displays a list of available tags.
- Select the required tags.
- Click.
- Click the Hosts tab. If a host that you want to delete is not displayed, perform a search (see Section 1.2, “Search”). Select the host to be deleted.
- Place the host into Maintenance mode (see Section 4.1.4.1.1, “Moving a Host into Maintenance Mode”).
- Click thebutton. A confirmation message displays.
- Click Hosts tab.. The host is removed from Red Hat Enterprise Virtualization platform and deleted from the
To assign a system administrator role for a host:
- Click the Hosts tab.A list of hosts displays. If the required host is not visible, perform a search (see Section 1.2, “Search”).
- Select the host that you want to edit, and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select .
- Click.The name of the user displays in the Permissions tab, with an icon and the assigned Role.
Note
To remove a system administrator role:
- Click the Hosts tab. A list of hosts displays. If the required host is not visible, perform a search (see Section 1.2, “Search”).
- Select the required host and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any. The Super User, Data Center Administrator and Cluster Administrator, if any, will display in the Inherited Permissions tab. However, none of these higher level roles can be removed.
- Select the check box of the appropriate user.
- Click. The user is removed from the Permissions tab.
Note
- The user performing the action
- The type of action being performed
- The object on which the action is being performed
user
must have the appropriate permission
for the object
being acted upon. Each type of action corresponds to a permission
. There are many different permissions in the system, so for simplicity they are grouped together in roles
.
Important — Actions can impact multiple objects
administrator
roles and user
roles. The privileges provided by these roles are shown in this section.
Note
Role Types
- Administrator Role: Allows access to the Administration Portal for managing virtual resources. An administrator role does not confer any permissions for the User Portal.
- User Role: Allows access to the User Portal for managing and accessing virtual machines. A user role does not confer any permissions for the Administration Portal.
administrator
role on a cluster, they could manage all virtual machines in the cluster using the Administration Portal. They could not access any of these virtual machines in the user portal; this would require a user
role.
Table 5.1. Red Hat Enterprise Virtualization User Roles
Role | Privileges | Notes |
---|---|---|
UserRole | User privileges | View resource state and details. View all the resource tabs. Can perform basic operations on the virtual machine and connect to the virtual machine. This role also has permissions to use a virtual machine in a pool. |
PowerUserRole | Allowed to create and manage virtual machines and templates | Can change the CD and add, remove, and set access privileges for all the users and groups, for all physical and virtual resources in the data center. |
UserVmManager | Access to Virtual Machines and Pools. | Level of privileges allow the user to administer virtual machines, including configuring network and storage, manipulating snapshots and migrating virtual machines. System administrator of a virtual machine. |
UserTemplateBasedVm | Limited privileges to only use Templates | Level of privilege to create a virtual machine by means of a template. |
Table 5.2. Red Hat Enterprise Virtualization System Administrator Roles
Role | Privileges | Notes |
---|---|---|
HostAdmin | Host Administrator | Can attach, remove, configure and manage a specific host. |
NetworkAdmin | Network Administrator | Can configure and manage the network of a particular data center, cluster or host. A network administrator of a data center or cluster will have inherited network permissions for virtual pools within the cluster as well. |
VMPoolAdmin | System Administrator role of a virtual pool. | Can create, delete, and configure a virtual pool, and perform basic operations on a virtual machine. |
TemplateAdmin | Can perform all operations on templates. | Has privileges to create, delete and configure storage domains as well as network details in addition to moving templates between domains. |
SuperUser | Full permissions across all objects and levels | Can manage all objects across all data centers. |
ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all physical and virtual resources in a specific cluster, including hosts, templates and virtual machines. |
DataCenterAdmin | Data Center Administrator | Can use, create, delete, manage all physical and virtual resources within a specific data center, including clusters, hosts, templates and virtual machines. |
ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all physical and virtual resources in a specific cluster, including hosts, templates and virtual machines. |
StorageAdmin | Storage Administrator | Can create, delete, configure and manage a specific storage domain. |
Table 5.3. Permissions Actions on Objects
Object | Action |
---|---|
System - Configure RHEV-M | Manipulate Users, Manipulate Permissions, Manipulate Roles, Generic Configuration |
Data Center - Configure Data Center | Create, Delete, Edit Data Center Properties, Edit Network |
Storage - Configure Storage Domain | Create, Delete, Edit Storage Domain Properties, Manipulate Status |
Cluster - Configure Cluster | Create, Delete, Edit Cluster Properties, Edit Network |
Host - Configure Host | Create, Delete, Edit Host Properties, Manipulate Status, Edit Network |
Template - Basic Operations | Edit Template Properties, Edit Network |
Template - Provisioning Operations | Create, Delete, Import/Export, Copy Templates |
VM - Basic Operations | Basic Operations, Change CD, Remote Log In |
VM - Provisioning Operations | Edit Properties, Create, Delete, Import/Export Virtual Machines, Edit Network, Edit Storage, Edit Snapshots |
VM - Administration Operations | Move VM, Migrate |
VM Pool - Basic Operations | Basic Operations |
VM Pool - Provisioning Operations | Create, Delete, Edit Properties |
Note
Adding Users
- Click the Users tab. The list of authorized users for Red Hat Enterprise Virtualization platform displays.
- Click Add Users and Groups dialog box displays.. The
- The default Search domain displays. If there are more than one search domains, select the appropriate search domain. Enter a name or part of a name in the search text field, and click . Alternatively, click to view a list of all users and groups.
- Select the group, user or users check boxes. The added user displays on the Users tab.
Example 5.1. Assigning a user permissions to use a particular virtual machine
To view general user information:
- Click the Users tab. The list of authorized users for Red Hat Enterprise Virtualization platform displays.
- Select the user, or perform a search if the user is not visible on the results list.
- The Details pane displays for the selected user, usually with the General tab displaying general information, such as the domain name, email and status of the user.
- The other tabs allow you to view groups, permissions, and events for the user.For example, to view the groups to which the user belongs, click the Directory Groups tab.
Important — Actions can impact multiple objects
To set up event notifications:
- Click the Users tab. The list of authorized users for Red Hat Enterprise Virtualization platform displays.
- Select the user who requires notification, or perform a search if the user is not visible on the results list.Click the Event Notifier tab. The Event Notifier tab displays a list of events for which the user will be notified, if any.
- Click the Add Event Notification dialog box displays a list of events, for Hosts, Storage, Virtual Machines and General Management events. You can select all, or pick individual events from the list. Click the button to see complete lists of events.button. The
- Click Event Notifier tab for the user.. The selected events display on the
To cancel event notification:
- In the Users tab, select the user or the user group.
- Select the Event Notifier tab. The details pane displays the events for which the user will receive notifications.
- Click the Add Event Notification dialog box displays a list of events, for Hosts, Storage, Virtual Machines and General Management events. To remove an event notification, deselect events from the list. Click the Expand All button to see the complete lists of events.button. The
- Click Event Notifier tab for the user.. The deselected events are removed from the display on the
Note
To remove a user:
- Select the user to be removed.
- Click the Virtual Machines tab in the Details pane. If the user is running any virtual machines, remove the virtual machines from the user by clicking the button on the Virtual Machines tab. See Section 6.5, “Managing Permissions to Virtual Machines”.
- Click thebutton. A message displays prompting you to confirm the removal. Click .
- The user is removed from Red Hat Enterprise Virtualization
Note
Table of Contents
- 6. Managing Virtual Resources
- 6.1. About Virtual Machines
- 6.2. Creating New Virtual Machines
- 6.3. Completing the Configuration of the Virtual Machine
- 6.4. Installing Operating Systems onto Blank Virtual Machines
- 6.5. Managing Permissions to Virtual Machines
- 6.6. Logging in to Virtual Machines
- 6.7. Managing Virtual Machines
- 6.8. Using Virtual Machine Snapshots
- 6.9. Exporting and Importing Virtual Resources
- 6.10. Backing Up Virtual Resources
- 7. Templates
- 8. Pools
- 6.1. About Virtual Machines
- 6.2. Creating New Virtual Machines
- 6.3. Completing the Configuration of the Virtual Machine
- 6.4. Installing Operating Systems onto Blank Virtual Machines
- 6.5. Managing Permissions to Virtual Machines
- 6.6. Logging in to Virtual Machines
- 6.7. Managing Virtual Machines
- 6.8. Using Virtual Machine Snapshots
- 6.9. Exporting and Importing Virtual Resources
- 6.10. Backing Up Virtual Resources
- Creating virtual machines manually or from templates.
- Starting, suspending and migrating virtual machines.
- Backing up and restoring virtual machines by taking a snapshot.
- Importing or exporting virtual machines.
- Converting virtual machines from foreign hypervisors.
- Assigning virtual machines to users.
Supported Guests
- Red Hat Enterprise Linux 3 (32 bit and 64 bit)
- Red Hat Enterprise Linux 4 (32 bit and 64 bit)
- Red Hat Enterprise Linux 5 (32 bit and 64 bit)
- Red Hat Enterprise Linux 6 (32 bit and 64 bit)
- Windows XP Service Pack 3 and newer (32 bit only)
- Windows 7 (32 bit and 64 bit)
- Windows Server 2003 Service Pack 2 and newer (32 bit and 64 bit)
- Windows Server 2008 (32 bit and 64 bit)
- Windows Server 2008 R2 (64 bit only)
Table 6.1. Para-virtualized driver support
Guest operating system | Para-virtualized drivers |
---|---|
Red Hat Enterprise Linux 4.8 and newer (32 bit and 64 bit) | Block and network drivers |
Red Hat Enterprise Linux 5.4 and newer (32 bit and 64 bit) | Block and network drivers |
Red Hat Enterprise Linux 6.0 and newer (32 bit and 64 bit) | Block and network drivers |
Windows XP | Block and network drivers |
Windows 7 (32 bit and 64 bit) | Block and network drivers |
Windows Server 2003 R2 (32 bit and 64 bit) | Block and network drivers |
Windows Server 2008 (32 bit and 64 bit) | Block and network drivers |
Important
Table 6.2. Supported virtual machine parameters
Parameter | Number | Note |
---|---|---|
Virtualized CPUs | 16 | per virtual machine |
Virtualized RAM | 256GB | For a 64 bit virtual machine |
Virtualized RAM | 4GB | per 32 bit virtual machine. Note, the virtual machine may not register the entire 4GB. The amount of RAM that the virtual machine recognizes is limited by its operating system. |
Virtualized storage devices | 8 | per virtual machine |
Virtualized network interface controllers | 8 | per virtual machine |
Virtualized PCI devices | 32 | per virtual machine |
- Sparse or PreallocatedA preallocated virtual disk has reserved storage of the same size as the virtual disk itself. This results in better performance because no storage allocation is required during runtime.On SAN (iSCSI, FCP) this is achieved by creating a block device with the same size as the virtual disk. On NFS this is achieved by filling the backing hard disk image file with zeros. Preallocating storage on an NFS storage domain presumes that the backing storage is not Qcow2 formatted and zeroes will not be de-duplicated in the hard disk image file. (If these assumptions are incorrect, do not select Preallocated for NFS virtual disks).For sparse virtual disks backing storage is not reserved and is allocated as needed during runtime. This allows for storage over commitment under the assumption that most disks are not fully utilized and storage capacity can be utilized better. This requires the backing storage to monitor write requests and can cause some performance issues. On NFS backing storage is achieved simply by using files. On SAN this is achieved by creating a block device smaller than the virtual disk's defined size and communicating with the hypervisor to monitor necessary allocations. This does not require support from the underlying storage devices.
- RawFor raw virtual disks the backing storage device (file/block device) is presented as is to the virtual machine with no additional layering in between. This gives better performance but has several limitations.
Table 6.3. Permitted Storage Combinations
Storage | Format | Type | Note |
---|---|---|---|
NFS or iSCSI/FCP | Raw or Qcow2 | Sparse or Preallocated | |
NFS | Raw | Preallocated | A file with an initial size which equals the amount of storage defined for the virtual disk, and has no formatting. |
NFS | Raw | Sparse | A file with an initial size which is close to zero, and has no formatting. |
NFS | Qcow2 | Sparse | A file with an initial size which is close to zero, and has RAW formatting. Subsequent layers will be Qcow2 formatted. |
SAN | Raw | Preallocated | A block device with an initial size which equals the amount of storage defined for the virtual disk, and has no formatting. |
SAN | Qcow2 | Preallocated | A block device with an initial size which equals the amount of storage defined for the virtual disk, and has qcow2 formatting. |
SAN | Qcow2 | Sparse | A block device with an initial size which is much smaller than the size defined for the VDisk (currently 1GB), and has Qcow2 formatting for which space is allocated as needed (currently in 1GB increments). |
- From an existing template.
- From the blank template. This is the same as creating a virtual machine from scratch.
- As a clone from an existing template.
Note
To create a new virtual machine from an existing template:
- Click the Virtual Machines tab. The Virtual Machines tab displays a list of existing virtual machines.
- Click the New Desktop button.The New Desktop Virtual Machine dialog box displays.
- Select the Data Center and Host Cluster on which the desktop is to run. All templates that exist in the selected cluster display in the Based on Template list. Select an existing template.
- Enter a suitable Name and appropriate Description, and accept the default values inherited from the template in the rest of the fields. You can change them if needed. See Table 6.4, “New Virtual Machine Dialog Box Fields” for field descriptions.
- If you select a Windows Operating System, an additional Windows Sys Prep group displays on the New Virtual Machine dialog box.
- Click Stateless if the virtual machine is to run in stateless mode. A stateless desktop is always created from the base template, and deleted on shutdown. This type of virtual machine is very useful when creating virtual machines that need to be used for a short time, or by temporary staff
- Click OK to create the virtual machine. The virtual machine displays in the Virtual Machines list.
Note
To create a new virtual machine from a blank template:
- Click thetab.Thetab displays the existing virtual machines.The icon to the right of the virtual machine name indicates whether it is a virtual server, a desktop or a part of a desktop pool. See Figure 6.2, “Virtual Machine List”.
- Click thebutton.The New Desktop Virtual Machine dialog box displays with the General tab. You only need to fill in the Name and Operating System fields. You can accept the default settings for other fields, or change them if required. If mandatory information is not entered, on clicking , the unfilled mandatory fields display with a colored border.
- Enter information in the General fields of the New Virtual Machine dialog box:
Table 6.4. New Virtual Machine Dialog Box Fields
FieldDescriptionNotesData Center
Select an existing Data Center from the list.The Default data center displays by default. Host Cluster
The name of the host cluster to which the virtual machine is attached. It can be hosted on any physical machine in the cluster depending on the policy rules. This is the migration domain for the virtual machine. The Default cluster displays by default. Name
The name of new virtual machine. Ensure it is a unique name. A virtual machine name must not contain any spaces, and must contain at least one character a-z. The maximum length of a virtual machine name is 15 characters. Follow the operating system's rules for virtual machine names. Description
A meaningful description of the new virtual machine. Template
Select Blank (the default) to create a virtual machine from scratch.Select an existing template to create a virtual machine from an existing model. See Section 6.2.1, “Creating Virtual Machines from Existing Templates”Memory Size (MB)
The amount of memory assigned to the virtual machine. Consider the processing and storage needs of the applications that are intended to run on the virtual machine. The maximum allowable memory for a virtual machine is 256GB, allowing even the most memory-intensive enterprise workloads to be virtualized. The total amount of memory allocated to Virtual Machines is able to exceed the amount of physical memory available to the host where memory over-commit is enabled. Total Cores
The processing power allocated to the virtual machine, as CPU Cores, from 1 to 16 on the slider bar. It is recommended that you do not assign too high a number to a single Virtual Machine, or more cores in total than actually exist on the physical host. CPU Sockets
The number of CPU sockets for the virtual machine from 1 to 16 on the slider bar. It is recommended that you do not assign too high a number to a single Virtual Machine, or more CPUs in total than actually exist on the physical host. Operating System
The operating system. Valid values include a range of Windows and Linux variants. This is a display only field, as no operating system is actually installed during this process. Stateless
The virtual machine is to run in stateless mode. The stateless mode is mostly used for virtual desktops. A stateless desktop or server is always created from the base template, and deleted on shutdown. Every time the virtual machine is run, a new instance of the virtual machine is created from the base template. This type of virtual machine is very useful when creating virtual machines that need to be used for a short time, or by temporary staff. - If the Operating System chosen is Windows, the Windows Sys Prep group displays. Enter the Domain and Time Zone in which the virtual machine is to run. This is the time zone for the virtual machine, and not necessarily the time zone for the physical host on which the virtual machine is running.
- On the Console tab, enter the Protocol, USB Policy and number of Monitors.
Table 6.5. New Virtual Machine Dialog Box Fields
FieldDescriptionNotesProtocol Define the display protocol to be used. Select either: - SPICE
- VNC
Select SPICE for Windows or Linux virtual machines. This is the recommended protocol. Optionally, select VNC for Linux virtual machines if desired. USB Policy Select Enabled or Disabled to indicate whether a USB device can be inserted into the client machine. - Select the Host tab. Define the host for the virtual machine to Run On by selecting either Any Host in Cluster if the virtual machine can start and run on any available host in the cluster, or Specific if the virtual machine must run on a particular host in the cluster. Select the specific host from the list of available hosts in the cluster.Define further options for running the virtual machine using the Run/Migration Options. Either select Run VM on Host (no migration allowed), to start and run the virtual machine only on the specified host, or select Allow VM migration only upon Administrator specific request (system will not trigger automatic migration of this VM) to prevent migration in mid-operation to other hosts in the cluster, for example, in case of overload or fencing of the host. However, the virtual machine may start on any host.
- Enter Resource Allocation for the virtual machine if required. You can define the Storage Allocation by selecting an attached Storage Domain from the list, as well as the Memory Allocation by entering a value in the Physical Memory Guaranteed field.
- Enter boot information for the virtual machine in the Boot Options tab of the New Desktop Virtual Machine dialog box:
Table 6.6. New Virtual Machine Dialog Box Fields
FieldDescriptionNotesFirst Device - Hard Disk
- CD-ROM
- Network (PXE)
After installing a new virtual machine, the new virtual machine must go into Boot mode before powering up. Select the first device that the virtual machine must try to boot: - Hard Disk to boot from the hard disk (though if this is a blank virtual machine, it will obviously not boot from the hard disk)
- CD-ROM to boot from the CD
- Network (PXE) to boot from the network.
Second Device - Hard Disk
- CD-ROM
- Network (PXE)
Select the second device for the virtual machine to use to boot if the first device is not available. The first device selected in the previous option does not appear in the options. Attach CD A list of available CD-ROMs appear if Attach CD is selected. Select the appropriate operating system ISOs available in the ISO domain. - Enter Custom Properties for the virtual machine if required.
- Click.If all the mandatory fields have been selected, The New Virtual Machine - Guide Me dialog box displays. If not, the dialog box does not close, and unfilled fields are indicated with a red border. Complete all the mandatory fields.You can use the buttons in the New Virtual Machine - Guide Me dialog box immediately, or the tabs on the Details Pane to complete the configuration. Click . The new virtual machine is created and displays in the list of virtual machines with the Virtual Desktop icon and Status Down icon.
To create a cloned virtual machine from an existing template:
- Click the Virtual Machines tab.The Virtual Machines tab displays a list of existing virtual machines.
- Click the New Server button.The New Server Virtual Machine dialog box displays.
- Select an existing template from the Based on Template list. All templates that exist in the cluster display in the list.
- Enter a Name and appropriate Description, and accept the default values inherited from the template in the rest of the fields. You can change them if needed. See Table 6.4, “New Virtual Machine Dialog Box Fields” for field descriptions.
- In the Resource Allocation tab, on the Provisioning field, select Clone from the list.
Select the disk provisioning mode in the Disks field. This selection impacts both the speed of the clone operation and the amount of disk space it requires.- Selecting
Thin Provision
results in a faster clone operation and provides optimized usage of storage capacity. Disk space is allocated only as it is required. This is the default selection. - Selecting
Preallocated
results in a slower clone operation and is optimized for the speed of guest read and write operations. All disk space requested in the template is allocated at the time of the clone operation.
- Click OK to create the cloned virtual machine. The virtual machine displays in the Virtual Machines list.
Note
It may take some time for the virtual machine to be created. During this time, the status of the virtual machine displays as Image Locked, followed by Down.
Define the NICs and Virtual Disks:
- On the New Virtual Machine - Guide Me dialog box, To set up one or more network interfaces (or NICs) click the Configure Network Interfaces button. The New Network Interface dialog box displays. You can accept the default values, or change them if necessary.Enter or select the Name, Network and Type of the network interface for the new virtual machine.
Note
The options on the Network and Type fields are populated by the networks available to the cluster, and the NICs available to the virtual machine.The type of NIC that can be added to a virtual machine depends on the NIC drivers available for a guest operating system. For virtual machines running Linux operating systems, use e1000. For virtual machines running Windows operating systems, use rtl8139. The Red Hat VirtIO NIC is an enhanced, custom virtual NIC which requires a special driver and offers major speed improvements over other virtual NICs. This VirtIO driver is installed by default in Red Hat Enterprise Linux 6 guests, and must be installed manually in Windows guests. The VirtIO NIC is the optimal NIC for virtual machines in the Red Hat Enterprise Virtualization environment. - If required, select the Specify Custom MAC address checkbox, and enter the address of the NIC. Ensure that the MAC address is entered in lowercase.
- Click New Virtual Machine - Guide Me dialog box displays again, with changed context. If you have additional NICs, you can add additional network interfaces, by clicking the Add another Network Interface button.. The dialog box closes, and the
- To set up one or more virtual disks, on the New Virtual Machine - Guide Me dialog box, click the button.
- The New Virtual Disk dialog box displays. You can accept the default values, or change them if necessary.
- Enter the Size of the virtual disk in GB. Ensure that the size is appropriate to the applications that need to run on the virtual machine.
- Select the Storage domain where the virtual disk image is to be created.
- You can also define the Advanced properties of the virtual disk. These are:
Table 6.7. New Virtual Machine Dialog Box Fields
FieldOptionsNotesDisk TypeSelect from System or Data options.This refers to the disk onto which an operating system will be installed. For "Data", the default volume type is "Preallocated" and volume format is "RAW". For "System", the default volume type is "Preallocated" in case of adding disk to a virtual server and "Sparse" (thin-provisioning) in case of adding disk to a virtual desktop. Volume format for "System" disks is calculated according to the volume type and the storage domain type. Note that only one disk can be marked "Is Bootable" from the Manager. Interface
Select the network drivers, either IDE or PV. IDE is the default selection that uses an emulation of the IDE protocol. Windows 2008 virtual machines require a IDE drivers. Select PV to use the para-virtualized drivers. Format
Select from Preallocated or Thin Provision.Pre-allocated is the recommended selection for a server virtual machine, where a block of disk space is reserved for the virtual machine.Thin Provision allocates disk space as and when the virtual machine requires it. Thin Provision is the recommended selection for a desktop virtual machine.Wipe after delete
Select if the disk is to be formatted after the virtual machine is deleted. Selecting this option ensures that all data in the virtual machine is removed after the virtual machine is deleted. Is bootable
Select if the disk is to be a bootable disk.
- Click New Virtual Machine - Guide Me dialog box displays again, with changed context. There should now be no further mandatory configuration to perform. Click to close the dialog box.. The dialog box closes, and the
Note
To install an operating system onto a virtual machine:
- Select the newly created virtual machine. It should have a status of Down.
- button on the Virtual Machines toolbar.
- The Run Virtual Machine dialog box displays. The Run Virtual Machine dialog box consists of three sections — Boot Options to define how the virtual machine is to boot; Boot Sequence to determine which boot device is used first; and Display Protocol to select how the virtual machine is to connect to the system.
Define the Boot Options
- Attach Floppy – Use this option typically to install Windows drivers. It is mandatory to attach the floppy before attempting installation. The floppy must be attached, and the Boot from CD option selected to install drivers for the virtual machine.
- Attach CD – Select this option to install the operating system and applications from the CD onto the newly created virtual machine. In this case, select an ISO file from the drop-down list.
- Boot Sequence – After installing a new virtual machine, the new virtual machine must go into Boot mode before powering up. The Boot sequence can be altered from the previously selected one by moving the options up or down using the list buttons: Hard Disk to boot from the hard disk (though if this is a blank virtual machine, it will obviously not boot from the hard disk), CD-ROM to boot from the CD, or Network (PXE) to boot from the network.
- Run Stateless – Select this option if the virtual machine is to run in stateless mode. The stateless mode is mostly used for virtual desktops. A stateless desktop or server is always created from the base template, and deleted on shutdown. Every time the virtual machine is run, a new instance of the virtual machine is created from the base template. This type of virtual machine is very useful when creating virtual machines that need to be used for a short time, or by temporary staff.
- Start in Pause Mode – Select this option to run the virtual machine in Pause mode. In some instances, the virtual machine needs to be started and then paused to allow the administrator to connect to the display before the virtual machine goes into timeout. Connection to a virtual machine in a remote location may take longer than usual; consequently, the SPICE session may open after a timeout in an executed program has passed. To avoid such an occurrence, use the Pause mode. After the remote connection is made, resume the virtual machine session, either by selecting the virtual machine in the Administration Portal and clicking the Play button; or by right-clicking the virtual machine's SPICE console window and selecting Play.
- Linux Boot Option – If the virtual machine is a Linux machine, you can enter customized option for the kernel path, initrd path, kernel params (parameters).
- Custom Properties – Enter any custom properties for the virtual machine to use while booting.
- Reinitialize Sysprep – For Windows virtual machines only. When a virtual machine runs for the first time, the system automatically attaches a virtual floppy drive containing the Sysprep configuration file to be used during Sysprep (relevant only if the virtual machine was sealed with Sysprep). The Reinitialize Sysprep option allows the administrator to restart the virtual machine with the attached floppy and configuration file. (For Windows virtual machines only). This option will not display for virtual machines that have never been initialized.
Define the Display Protocol
- Select SPICE for Windows or Linux virtual machines. This is the recommended protocol.
- Select VNC for Linux virtual machines if desired.
- Click.
Note
To assign a user to a virtual machine:
- On the Virtual Machines tab, select the required virtual machine and click the Permissions tab from the Details pane. The Permissions tab displays a list of users and their current roles and permissions, if any. Note that there are no inherited permissions for virtual machines.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select the required role, for example, .
- Click.The name of the user displays in the Permissions tab.
Note
To remove a user role:
- Click the Virtual Machine tab. A list of virtual machines displays. If the required virtual machine is not visible, perform a search (see Section 1.2, “Search”).
- Select the required virtual machine and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Select the check box of the appropriate user.
- Click Permissions tab.. A dialog prompts you to confirm the removal, click to proceed. The user is removed from the
UserVmManager
role gives the user permissions to create, manage and delete the virtual machine, including its network and storage, as well as the permission to migrate the virtual machine.
To assign a system administrator role for a virtual machine:
- Click the Virtual Machines tab.A list of virtual machines displays. If the required virtual machine is not visible, perform a search (see Section 1.2, “Search”).
- Select the virtual machine that you want to edit, and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any. Note that there are no inherited permissions for virtual machines.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select .
- Click.The name of the user displays in the Permissions tab.
Note
To remove a virtual machine system administrator role:
- Click the Virtual Machine tab. A list of virtual machines displays. If the required virtual machine is not visible, perform a search (see Section 1.2, “Search”).
- Select the required virtual machine and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Select the check box of the appropriate user.
- Click Permissions tab.. A dialog prompts you to confirm the removal, click to proceed. The user is removed from the
To log in to a virtual machine using SPICE
- On the Virtual Machines tab select a running virtual machine.The Details pane displays.
- Click the Console button or click the Console option from the right-click menu.
- The SPICE installation process starts if SPICE has not been previously installed. Follow the prompts to install SPICE, and proceed.
- SPICE displays the login screen:Enter your Username and Password. Click to log onto the virtual machine.
- When you have finished using the virtual machine, log out according to instructions specific to the operating system.
To log in to a virtual machine using RDP:
- On the Virtual Machines tab select a running virtual machine.The Details Pane displays.
- Click the down arrow on the Console button and select the RDP option or click the RDP option from the right-click menu.The RDP Windows login screen of the virtual machine displays.
- Enter your username and password, and click. You are logged on to the virtual machine.
- Install/uninstall applications and make the required changes to settings, if needed. If you wish, you can use the virtual machine to create a template. Refer Chapter 7, Templates.
- Shut down the virtual machine, or log out according to instructions specific to the Windows operating system.
To log in to a virtual machine using VNC:
- Select the virtual machine from the list on the Virtual Machines tab.
- Click Edit Virtual Machine dialog displays.. TheSelect the Console tab. Set the Protocol field to . Click to save your changes.
- Back on the Virtual Machines tab, select the virtual machine you wish to log in to. Ensure that it is running, and click the Console button.The VNC login screen of the virtual machine displays.
- Enter your username and password, and click. You are logged on to the virtual machine.
- Install/uninstall applications and make the required changes to settings, if needed. If you wish, you can use the virtual machine to create a template. Refer Chapter 7, Templates.
- Shut down the virtual machine, or log out from the virtual machine.
Note
- At the top left corner of the Console window, click the SPICE icon.
- The SPICE menu displays.
- Send CTRL+ALT+DEL (or enter Ctrl+Alt+End): to simulate this key sequence as if entered on the virtual machine.
- Toggle full screen (or enter Shift+F11): to switch between full-screen and window mode for the virtual machine.
- Special Keys : to input special characters (selecting from the list to send a key sequence to the virtual machine).
- USB Devices : allows attaching and detaching USB devices currently connected to your client.
- Change CD : for the list of imported ISO image files found in the
/images
folder. - Play, Pause, Stop : to perform these basic virtual machine management operations from the Console Window menu.
Warning
To edit virtual machine details:
- Click the Virtual Machines tab.
- If the virtual machine you want to edit is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine and click thebutton.The Edit Virtual Machine dialog box displays. Disabled fields cannot be changed.
- Edit the required details of enabled fields. Refer Section 6.2.2, “Creating New Virtual Machines without a Template” for details of the fields.
Note
Some fields cannot be changed, and are disabled by default. - Click.The details of the virtual machine are updated in the Virtual Machines tab.
To power on a virtual machine:
- Click the Virtual Machines tab.
- If the virtual machine that you want to edit is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine with a status of Down.
- Click
or right-click and select .
The Status of the virtual machine changes to Up. The display protocol and IP of the selected host display.
Warning
To pause a virtual machine:
- Click the Virtual Machines tab.
- If the virtual machine that you want to edit is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine.
- Click the(
) button.
The Status of the virtual machine changes to Paused.
To shut down a virtual machine:
- Click the Virtual Machines tab.
- If the virtual machine that you want to edit is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine.
- Click the(
) button.
The Status of the virtual machine changes to Down.
Note
To migrate a virtual machine to another host:
- Click the Virtual Machines tab.
- If the virtual machine you want to migrate is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine.
- Click the Migrate Virtual Machine dialog box displays.button. The
- Choose from Select Host Automatically or specify a destination from the Select Destination Host list. If you chose Select Destination Host, only active hosts within the cluster display in the list.
- Clickto close the dialog box.
To move a virtual machine to another storage domain:
- Click the Virtual Machines tab.
- If the virtual machine you want to migrate is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine.
- Shut down the virtual machine.
- Click thebutton.
- The Move Virtual Machine dialog box displays. Select from the list of available Storage Domains. If there are no additional Storage domains, an error message displays.
- Click.
Warning
To remove a virtual machine:
- Click the Virtual Machine tab.
- If the virtual machine you want to remove is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine.
- Shut down the virtual machine. The Remove button is only enabled for a virtual machine that has a status of Down.
- Click thebutton.A confirmation message is displays. Click.
- The virtual machine is removed from the platform and no longer displays on the Virtual Machines tab.
Warning
To create a snapshot of a virtual machine:
- Click the Virtual Machines tab.
- If the virtual machine for which you want to create a Snapshot is not displayed, perform a search (see Section 1.2, “Search”).
- Select the virtual machine. Ensure that the virtual machine has a status of Down.
- On the Details pane, select the Snapshots tab. Click the button.The Create Snapshot dialog box displays.
- Enter a description for the snapshot, select all the virtual disks attached to the virtual machine and click.The virtual machine's operating system and applications are stored in a snapshot that can be previewed or restored. The status of the virtual machine briefly changes to Image Locked, before returning to Down.
To use a snapshot to restore a virtual machine:
- Click the Virtual Machines tab.
- If the virtual machine you want to restore is not visible in the list, perform a search (see Section 1.2, “Search”). Ensure that the virtual machine is powered down and has a status of Down.
- Click the virtual machine. On the Details Pane, click the Snapshots tab. A list of snapshots displays.
- Select the snapshot that you want to restore.The Snapshot Details display, and thebutton is enabled.
- Clickto preview the snapshot. The Status of the virtual machine briefly changes to Image Locked, before returning to Down.
- At this point, you can start the virtual machine and it will run with the disk image of the time the snapshot was taken. After you have checked the snapshot do one of the following:
- To restore to this point:Click Commit.The virtual machine is restored to the state it was in at the time of the snapshot. Also, any subsequent snapshots are erased.
- Alternatively, click the Undo button.The virtual machine is not restored to the state of the snapshot, and returns to its current state.
To delete a snapshot:
- Click the required virtual machine. On the Details Pane, click the Snapshots tab. A list of snapshots displays.
- Clickto preview the snapshot. The Status of the virtual machine briefly changes to Image Locked, before returning to Down.
- At this point, you can start the virtual machine and it will run with the disk image of the time the snapshot was taken. After you have checked the snapshot, and are sure that you wish to delete it, click thebutton.
- To move virtual resources to a different installation of Red Hat Enterprise Virtualization.
- To move virtual resources to a different data center in the same installation of Red Hat Enterprise Virtualization. To do this, the original virtual resource must be deleted.
- To back up virtual resources.
- Exporting or importing one or more virtual machines or templates.
- Exporting and importing a domain of virtual machines and templates. Refer to Import Existing ISO or Export Storage Domain.
Note
To perform an export-import of virtual resources:
- Attach the export domain to the source data center. See Section 3.1.2.2.3, “Attaching an Export Storage Domain”
- Export the virtual resource to the export domain.
- Detach the export domain from the source data center. See Section 3.1.5.2.1, “Detaching Storage Domains from a Data Center”
- Attach the export domain to the destination Data center. See Section 3.1.2.2.3, “Attaching an Export Storage Domain”
- Import the virtual resource into the destination data center.
To export individual virtual machines to the export domain:
- Click the Virtual Machines tab.
- If the virtual machine you want to export is not visible in the list, perform a search (see Section 1.2, “Search”).
- Select the virtual machine.
- Shut down the virtual machine. Once the virtual machine is shut down, right click to display the menu.
- Click theoption.
- The Export Virtual Machine dialog box displays. Select from the list of available options as appropriate, Force Override and Collapse Snapshots.Select Force Override to override existing images of the virtual machine which may already exist on the export domain.Select Collapse Snapshots to create a single export file per disk. Select this option if you wish to retain both the source and destination versions of the virtual machine.
- Click.The export of the virtual machine begins, this can take some time. The virtual machine displays in the Virtual Machines list with a Locked Status. Use the Events tab to view the progress.
- The Events tab displays that the virtual machine has been exported.
- The virtual machine displays on the VM Import tab of the export domain.
- You can repeat the procedure above to export each virtual machine that you need to migrate, so that the export domain has a number of virtual machines.
To Import the Virtual Machine into the Destination Data Center
- Detach the export domain from the source data center (see Section 3.1.5.2.1, “Detaching Storage Domains from a Data Center”), then attach it to the destination data center (see Section 3.1.2.2.3, “Attaching an Export Storage Domain”).
- On the Storage tab, select the Export data domain. The Details pane of the Export storage domain displays.
- On the Details pane, select the VM Import tab. Select the virtual machine that is to be imported. Click .
- The Import Virtual Machine dialog box displays. The names of the available virtual machines display.Select the name of the virtual machine, and select the Destination Cluster and Destination Storage of the destination data center.If you have not deleted the original virtual machine in the source data center, select Collapse Snapshots.
- Click OK. The virtual machine is imported into the destination data center. This can take some time. Eventually, the virtual machine displays in the Virtual Machines tab on the Details pane of the Storage domain belonging to the destination data center.
- You can now run the virtual machine, provided that the virtual machine was created from scratch, or from a template which still resides in the storage domain.
To create a template from an existing virtual machine:
- Click the Virtual Machines tab.The Virtual Machines tab displays a list of all virtual machines in the system.
- Select the virtual machine that you want to use as a basis for the template definition. Ensure that the virtual machine is powered down and has a status of Down.
Note
Take a snapshot of the Virtual Machine at this stage if you wish to use the virtual machine (as a virtual machine) after it is used to create a template. - Click.The New Virtual Machine Template displays, with the details of the selected Virtual Machine.
- Enter, accept or change the following information. Name and Description are typically the only fields in which new information is to be entered. The rest of the fields are taken directly from the existing virtual machine.
- Define the Host Cluster and Storage Domain for the virtual machines that will be created with this template. By default, these are the same as the source virtual machine, but you can select from the list, if there are multiple clusters and domains in the data center. The template is a copy of the virtual machine, hence the requirement for the Host Cluster and Storage Domain.
- Optionally, select the Make Private option to restrict access to the template. Templates marked as private are only available to their creator, and users with the
Super User
role. - Click Image Locked while the template is being created. The template is created and added to the Templates tab. Depending on the virtual machine disk image size, this may take a long time. During this time, the action buttons for the template remain disabled. Once created, the action buttons are enabled and the template is ready for use. For example, the newly created template displays in the list of templates in the Template field on the New Virtual Machine dialog box.. The virtual machine displays a status of
Note
Sysprep
(or a similar tool) to generalize the Virtual Machine and remove "specific" personalization. Failure to do so will cause conflicts when multiple virtual machines from an un-generalized Windows templates are run. In general, templates of Linux virtual machines do not require sealing.
Sysprep
to seal a template before use. This ensures that machine-specific settings are not propagated through the template.
Important
- The Windows Sysprep parameters have been correctly defined. If not, click Edit VM and enter the required information in the Operating System and Domain fields.
- The correct Product Key has been entered in the Configuration Tool,
rhevm-config
. If not, as the root user on the Manager, run the Configuration Tool and enter the required information. The configuration keys that you need to set areProductKey
andSysPrepPath
. For example, for Windows 7, the configuration value isProductKeyWindow7
, andSysPrepWindows7Path
. The command to set the value is:# rhevm-config --set ProductKeyWindow7=<validproductkey> --cver=general
For the exact syntax for getting and setting configuration values, see Red Hat Enterprise Virtualization 3.0 Installation Guide
Procedure 7.1. To seal a Windows XP template
- Download
sysprep
to the virtual machine to be used as a template.The Windows XP Sysprep tool is available at: http://www.microsoft.com/download/en/details.aspx?id=11282 - Create a new folder
c:\sysprep
. - Open the
deploy.cab
file and put its contents inc:\sysprep
. - Execute
sysprep.exe
from within the folder. Click on the welcome message. - The Sysprep tool displays.Select the following check boxes:
- Don't reset grace period for activation
- Use Mini-Setup
Ensure that the Shutdown mode is set to Shut down before clicking - Acknowledge the pop-up window. The virtual desktop will go through the sealing process and then shut down automatically.
Procedure 7.2. To seal a Windows 7 or Windows 2008 template
- In the virtual machine to be used as a template, open a command line terminal and type regedit.
- The Registry Editor window displays. On the left pane, expand → → .
- On the main window, right click to add a new string value using→ .
- Right click on the file and select Modify. When the Edit String dialog box displays, enter the following information in the provided text boxes:
- Value name:
UnattendFile
- Value data:
a:\sysprep.inf
- Launch Sysprep from
C:\Windows\System32\sysprep\sysprep.exe
- Under System Cleanup Action, select Enter System Out-of-Box-Experience (OOBE).
- Tick the Generalize check box if you need to change the computer's system identification number (SID).
- Under Shutdown Options, select Shutdown.
Click OK. - The virtual machine will now go through the sealing process and shut down automatically.
- Login to the virtual machine to be used as a template and flag the system for re-configuration by running the following command as root:
# touch /.unconfigured
- Remove ssh host keys. Run:
# rm -rf /etc/ssh/ssh_host_*
- Shut down the virtual machine. Run:
# poweroff
To edit template details:
- Click the Templates tab. The Templates tab displays.
- If the template you want to edit is not visible on the list, perform a search (see Section 1.2, “Search”), and select the template.
- Click thebutton.
- The Edit Template dialog box opens. This dialog box is essentially the same as the Create New Virtual Machine dialog box.
- Edit details, as required. Refer Section 6.2.2, “Creating New Virtual Machines without a Template”.
- Click.The details of the template are updated in the Templates tab.
Note
Important
To copy a template:
- Navigate to the required template and select the template.
- Click the Copy Template dialog box displays.button. The
- Select the Storage Domain that you wish to copy the template to.
- Click.The details of the template are copied to the new Storage Domain. The copy of the template displays the new storage domain in the Domain column of the Templates tab.
To delete a template:
- Click the Templates tab.
- Select the template. If the template you want to delete is not visible on the list, perform a search (see Section 1.2, “Search”).
- Click thebutton. A confirmation message displays.
- Click Templates tab.. The template is deleted, and removed from the
Note
- Exporting or Importing one or more templates.
- Exporting and Importing a domain of virtual machines and templates. Refer to Import Existing ISO or Export Storage Domain for more information.
To export individual templates to the export domain:
- Click the Templates tab. If the template you want to export is not visible in the list, perform a search to display the template on the results list (see Section 1.2, “Search”).
- Click Backup Template dialog box displays.. The
- Click Events tab to view the progress.. The export of the template begins, this can take some time. Use the
- On the Storage tab, select the export domain. The Details pane of the Export storage domain displays. The successfully exported template displays on the Template Import tab of the export domain.
- You can repeat the procedure above to export each template that you need to migrate, so that the export domain has a number of templates before you start the import process.
To Import the Template into the Destination Data Center
- Detach the export domain from the source data center, and attach it to the destination data center. Refer to To perform an export-import of virtual resources: for more information.
- On the Storage tab, select the export domain. The Details pane of the export domain displays.
- On the Details pane, select the Template Import tab. Select the template that is to be imported.The Delete buttons are enabled on the Template Import tab.and
- Click Import Template dialog box displays. The names of the available templates display.. The
- Select the name of the template, and select the Destination Cluster and Destination Storage of the destination data center.Click OK.
- Eventually, the template displays in the Template tab on the Details pane of the data domain belonging to the destination data center. It also displays on the Templates tab with its changed cluster information indicating it's new location.
- You can now use the template to create new virtual machines, or run existing imported virtual machines that are based on the template.
To assign a user to a template:
- Click the Templates tab.A list of templates displays. If the required template is not visible, perform a search (see Section 1.2, “Search”). Select the template that you want to edit, and click the tab from the Details pane.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Select the check box of the user to be assigned the permissions. Scroll through the Assign role to user list and select .
- Click.The name of the user displays in the Permissions tab.
Note
To remove a user role:
- Click the Virtual Machine tab. A list of templates displays. If the required template is not visible, perform a search (see Section 1.2, “Search”).
- Select the required template and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any. Note that you cannot remove users with inherited permissions.
- Select the check box of the appropriate user.
- Click. The user is removed from the Permissions tab.
To assign a template administrator role:
- Click the Templates tab.A list of templates displays. If the required virtual machine is not visible, perform a search (see Section 1.2, “Search”).
- Select the template that you want to edit, and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.to add an existing user. The
- Click.The name of the user displays in the Permissions tab.
Note
To remove a virtual machine system administrator role:
- Click the Templates tab. A list of templates displays. If the required template is not visible, perform a search (see Section 1.2, “Search”).
- Select the required template and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any.
- Select the check box of the appropriate user.
- Click. The user is removed from the tab.
- Select System from the root of the Tree pane. Click the Pools tab. A list of pools displays.
- Click thebutton.
- The New Pool dialog box displays the following tabs: General, Pool, Console, Host, Resource Allocation and Boot Options. If you choose Windows as the operating system, a Windows Sys Prep tab also displays. Ensure that you enter the mandatory information in the mandatory fields. Unfilled mandatory fields display with a colored border.
- In the General group, enter the basic information about the pool, and the type of virtual machines required, as listed in the table.
Table 8.1. New Pool Dialog Box Fields
FieldDescriptionNotesData Center
Select an existing data center from the list.The Default data center displays by default. Host Cluster
The name of the host cluster to which the pool is attached. It can be hosted on any physical machine in the cluster depending on the policy rules. This is the migration domain for the virtual machine. The Default cluster displays by default. Name
The name of the new pool. Ensure it is a unique name. The name cannot be any longer than 15 characters, and must contain at least one alphabet, a-z. A number is appended onto the name of the desktop pool to create a unique name for the virtual desktops. For example, if the desktop pool is named HR, and has five virtual desktops, the names of the virtual desktops will be, HR-1, HR-2, HR-3, HR-4, HR-5. Ensure that the name is succinct rather than verbose. The maximum length of a virtual machine name is 15 characters. Follow the operating system's rules for virtual machine names. Description
A meaningful description of the new pool. Number of VMs
Enter the Number of VMs (Virtual Machines) to create for the pool. Based on Template
Select an existing template to create the virtual machines from an existing model. See Section 6.2.1, “Creating Virtual Machines from Existing Templates”The field displays the list of existing templates in the storage domain.Memory Size (MB)
The amount of memory assigned to each virtual machine. Consider the processing and storage needs of the applications that are intended to run on the virtual machines. The maximum allowable memory for a virtual machine is 256GB, allowing even the most memory-intensive enterprise workloads to be virtualized. Total Cores
The processing power allocated to the virtual machine, as CPU Cores, from 1 to 16 on the slider bar. It is recommended that you do not assign a number that is too high, or more cores than actually exist on the physical host. CPU Sockets
The number of CPU sockets for the virtual machine from 1 to 16 on the slider bar. It is recommended that you do not assign a number that is too high, or more CPUs than actually exist on the physical host. Operating System
The operating system. Valid values include a range of Windows and Linux variants. This is a display only field, as no operating system is actually installed during this process.
- In Pool, select one of the following pool types: Manual or Automatic.
Table 8.2. Pool Types Fields
FieldDescriptionNotesManual The administrator is responsible for explicitly returning the desktop to the pool. The desktop reverts to the original base image after the administrator returns it to the pool. Automatic When the desktop is shut down, it reverts to its base image and is then returned to the desktop pool. - If the Operating System chosen was Windows, the Windows Sys Prep group displays.
Enter the following information:Table 8.3. Windows Sys Prep Fields
FieldDescriptionNotesDomain Enter the domain in which the virtual machines are to be created. Time Zone Enter the time zone in which the virtual machines are to run. This is the time zone for the virtual machines, and not necessarily the time zone for the physical host on which the virtual machines are to run. - Enter information in the Console group, to specify the communication protocol to be used, whether USB devices are allowed, and the number of monitors that the virtual machines are permitted.
Table 8.4. New Virtual Machine Dialog Box Fields
FieldDescriptionNotesProtocol Define the display protocol to be used. Select either: - SPICE
- VNC
Select SPICE for Windows or Linux virtual machines. This is the recommended protocol. or select VNC for Linux virtual machines if desired. USB Policy Select Enabled or Disabled to indicate whether a USB device can be inserted into the client machine. The USB policy editor can be used to set up policies. MonitorsFor Windows virtual machines, the number of monitors that the virtual machine can have. Consider the processing and storage needs of the applications that are intended to run on the virtual machine. - Enter information in the Host group if you wish to define the specific hosts on which the virtual machines are to be run and specific migration details.
Table 8.5. New Pool Host Fields
FieldDescriptionNotesRun On The host for the virtual machines to run on. - Select Any Host in Cluster if the virtual machines can run on any available host in the cluster.
- Select Specific if the virtual machines are to run on a particular host in the cluster. Select the host from the list of available hosts in the cluster.
Run/Migration Options Further options for running virtual machines - Select Run VM only on the selected Host to start and run the virtual machine only on the host specified in the Run On field.
- Select Do not migrate VM to prevent migration in mid-operation to other hosts in the cluster, for example, in case of overload or fencing of the host. However, the virtual machine may start on any host.
- Enter information in the Resource Allocation group. This step specifies the storage requirements for all the virtual machines in the pool.
Table 8.6. New Pool Allocation Fields
FieldDescriptionNotesStorage Domain The name of the storage domain where the images of the virtual machines of the pool will be stored. Provisioning The type of storage required for the virtual machines. Select either: - Thin
- Clone
Refer to Section 6.1.3, “Understanding Virtual Machine Storage” for a description of these options. Memory Allocation/Physical Memory Guarantee The amount of physical memory that must be reserved for this pool. - Enter information in the Boot Sequence fields to specify how the virtual machines are to attempt to boot.
Table 8.7. New Pools Boot Device Sequence Fields
FieldDescriptionNotesFirst Device - HardDisk
- CD-ROM
- Network (PXE)
After installing a new virtual machine, the new virtual machine must go into Boot mode before powering up. Select the first device that the virtual machine must try to boot: - Hard Disk to boot from the hard disk (though if this is a blank virtual machine, it will obviously not boot from the hard disk)
- CD-ROM to boot from the CD
- Network (PXE) to boot from the network.
Second Device Select the second device that the virtual machine must try to boot: - Hard Disk
- CD-ROM
- Network (PXE)
Select the second device for the virtual machine to use to boot if the first device is not available. The first device selected in the previous option does not appear in the options. Attach CD A list of available CD-ROMs appear if Attach CD is selected. Select the appropriate operating system ISOs available on the system. Linux Boot Options If the virtual machine is a Linux machine, you can enter customized options for the kernel path,initrd path, kernel params (parameters).
- Click. If any mandatory fields have been omitted, you are prompted to enter information. The required fields display with a red border. Enter the requisite information.A pool of the specified number of identical virtual machines is created. You can view these virtual machines in the Virtual Machines tab (on the Details pane), or on the main Virtual Machines tab. Note the icon denoting that the virtual machines are part of a pool. During creation, the desktops have a status of Image Locked, followed by a status of Down. You need to start the desktops in the Virtual Machines tab. See Chapter 6, Managing Virtual Resources.
Note
- On the Pools tab, select the desktop pool. The Details pane displays. Click the Permissions tab.
- Click Add Users to Pool dialog box displays.. The
- Click thebutton to view all existing users, or enter search criteria for a set of users.
- Select the users from the list, and click.
- The users are assigned to the pool and display in the Permissions tab on the Details pane of the selected pool.
Removing Users from a Pool
- On the Pools tab, select the desktop pool. The Details pane displays. Click the Permissions tab.
- Select the user to be removed. Thebutton is enabled.
- Click. A dialog box displays, prompting to confirm the user or list of users. Click . The user is removed from the pool.
Note
Note
- Click the Pools tab.
- Select the pool. If the pool you want to edit is not displayed, perform a search (see Section 1.2, “Search”).
- Click thebutton.The Edit pool dialog box opens.
- This dialog box is identical to the New Pool dialog box, except that fields that cannot be changed are disabled. Make other changes as appropriate. See Section 8.1, “Creating Desktop Pools” .
- Click.The details of the desktop pools are updated.
- Select the desktop pool.
- Click thebutton.The Edit pool dialog box opens.
- On the General tab, in the Number of VMs field, click the button. A text box appears allowing you to indicate the number of additional virtual machines to be added to the pool.
- Click.The additional virtual machines display in the Virtual Machines tab on the Detail pane of the Pools tab . These virtual machines are identical to the existing virtual machines.
- Click the Pools tab. The list of desktop pools displays.
- Select the pool containing the desktop that is to be detached.The Virtual Machines tab on the Details pane displays a list of the virtual machine in the pool.
- Select the desktop(s) that you want to remove, and click. A confirmation message box displays.
- Click.
To assign administrator permissions to a virtual machine pool:
- Click the Pools tab. A list of virtual machines displays. If the required virtual machine is not visible, perform a search (see Section 1.2, “Search”).
- Select the virtual machine that you want to edit, and click the Details pane.tab from the
- Click Add Permission to User dialog box displays. Enter a Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches is displayed in the results list.to add an existing user. The
- Click.The name of the user displays in the Permissions tab.
Note
To remove the role from a user:
- Click the Virtual Machine tab. A list of virtual machines displays. If the required virtual machine is not visible, perform a search (see Section 1.2, “Search”).
- Select the required virtual machine and click thetab from the Details pane.The Permissions tab displays a list of users and their current roles and permissions, if any. Note that you cannot remove users with inherited permissions.
- Select the appropriate user.
- Click Permissions tab.. A confirmation dialog displays, click . The user is removed from the
To remove a desktop pool:
- Click the Pools tab.The list of desktop pools displays.
- Select the pool to be removed.Click the Virtual Machines tab in the Details pane of the selected pool to display a list of the pool's desktops.
- Select all the desktops in the Virtual Machines tab and click . The desktops are detached from the pool. However, they will continue to display in the Virtual Machines tab as standalone desktops.
- Ensure the pool is selected on the Pools tab, and click the Remove button. A message displays prompting you to confirm the removal.
- Click OK to confirm the removal of the pool. The pool is removed from the data center.
Note
Table of Contents
- 9. Monitoring Red Hat Enterprise Virtualization
- 10. Red Hat Enterprise Virtualization Reports
- 11. History Database Reports
Note — Reporting Tools
Storage
- Graphs of the used space on each storage domain;Hosts
- Graphs of CPU, memory and network traffic usage for each host;Virtual Machines
- Graphs of CPU, memory and network traffic usage for each virtual machine; andHigh Severity Events
- Viewable in the lower panel.
Event
list:
Column | Description |
---|---|
Event |
The type of event. The possible event types are:
![]() ![]() ![]() |
Time | The time that the event occurred. |
Message | The message describing that an event occurred. |
User | The user that received the event. |
Host | The host on which the event occurred. |
Virtual Machine | The virtual machine on which the event occurred. |
Template | The template of the virtual machine where the event occurred. |
Important:; Reports require sufficient data
- In Red Hat Enterprise Linux 5.7 - Firefox 3.6
- In Red Hat Enterprise Linux 6 - Firefox 3.6
- In Windows XP - Internet Explorer 8
- In Windows 7 - Internet Explorer 8 and Internet Explorer 9
- In Windows Server 2008 - Internet Explorer 8 and Internet Explorer 9
http://server.example.com
/rhevm-reports
. A login screen for Red Hat Enterprise Virtualization Reports displays. Enter your login credentials. Table 10.1. Navigation Folders
Folder | Description |
---|---|
RHEVM Reports
| Contains sub-folders for all reporting resources. |
Ad Hoc Reports
| Contains report types for generation of ad hoc reports, which are created with the Ad Hoc Reports Tool. See Section 10.6, “Ad Hoc Reports” for details. |
Dashboards
| Contains all dashboards available in the system. See Section 10.5, “Dashboards” for details. |
Reports
| Contains all reports available in the system. See Section 10.4, “Running Reports” for details. |
Resources
| Contains configuration and system resources. Should not be changed by users. |
Procedure 10.1. Accessing the Red Hat Enterprise Virtualization Reports user-management menu
- While signed in to Red Hat Enterprise Virtualization Reports, hover over the Manage tab in the top-right part of the screen.
- Click on Users in the drop-down menu that appears.
- The Manage Users interface appears.The Manage Users interface contains three panes:
- Organizations
- Users
- Details
- Select a set of reports in the Organizations pane by clicking on the name of the report.
- Select a user in the Users pane by clicking on the name of the user. Information about the user displays in the Details pane.
- The details pane contains these four fields:
- The user's name
- Assigned Roles
- Profile Attributes
- Whether the user is enabled.
At the top of the Details pane, a menu displays three options. These options are:- Edit
- Login as User
- Delete User
This menu allows you to manage users.
- ROLE_ADMINISTRATOR - Can create/edit/delete reports, dashboards, ad hoc reports, and manage the server.
- ROLE_USER - Can create/edit/delete ad hoc reports and view reports and dashboards.
Report Parameter Selection Dialog
appears:
Report Parameter Selection Dialog
consists of a number of drop-down menus that define the report's parameters:
Active Virtual Machines by OS
report shows a summary of the number of active virtual machines in a given time period, broken down by operating system. The following parameters are provided to run this report:
Table 10.2. Active Virtual Machines by OS Parameters
Parameter | Description |
---|---|
Data Center
| The report includes only virtual machines in the selected data center. The options list shows only data centers that contain virtual machines. |
Cluster
|
The report only includes virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report only includes virtual machines of the selected type. Possible types are Server and Desktop . The options list shows only types that exist in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Cluster Capacity Vs Usage
report shows the relationship between system capacity and usage (workload) over a given time period. Capacity is expressed in terms of CPU cores and physical memory, while usage is expressed as vCPUs and virtual machine memory. The following parameters must be provided to run this report:
Table 10.3. Cluster Capacity Vs Usage Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list contains only data centers that contain clusters.
|
Cluster
|
The report only includes the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all clusters in the selected data center.
|
Period Range
| The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. |
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Host OS Break Down
report indicates the number of hosts running each operating system version over a given time period. The following parameters must be provided to run this report:
Table 10.4. Host OS Break Down Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Summary of Host Usage Resources
report shows a scatter plot of average host resource utilization for a given time period in terms of CPU and memory usage. The following parameters must be provided to run this report:
Table 10.5. Summary of Host Usage Resources Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Hosts Inventory
report shows a list of all hosts in the selected data center and cluster. The following parameters must be provided to run this report:
Table 10.6. Hosts Inventory Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Only Active Hosts?
|
If Yes is selected, the report includes only active hosts, i.e. ones not deleted from the system. If No is selected, the report includes both active and deleted hosts.
|
Storage Domain Size Over Time
report shows a line graph contrasting the total available and total used space for a single storage domain over time for a given period. The following parameters must be provided to run this report:
Table 10.7. Storage Domain Size Over Time Parameters
Parameter | Description |
---|---|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
|
The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. The list of options for the Storage Domain name parameter includes only storage domains that were attached during the specified period.
|
Data Center
|
The options list for the Storage Domain Name parameter shows only storage domains in this selected data center.
|
Storage Type
|
The options list for the Storage Domain Name parameter shows only storage domains of this selected type.
|
Storage Domain Name
| The report refers to the storage domain selected. A report is only for a single storage domain and the user must select a storage domain. The list of options shows only storage domains that were attached to the data center during the selected period. |
Virtual Machines Inventory
report shows a list of all virtual machines in the selected data center and cluster. The following parameters must be provided to run this report:
Table 10.8. Virtual Machines Inventory Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Only Active Virtual Machines?
|
If Yes is selected, the report includes only active virtual machines, i.e. ones not deleted from the system. If No is selected, the report includes both active and deleted virtual machines.
|
Cluster Host Uptime
report shows the weighted average uptime of hosts within a cluster for a given period of time. This report also provides a table listing the total planned (maintenance) and unplanned down time for each host. The following parameters must be provided to run this report:
Table 10.9. Cluster Host Uptime Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Cluster Quality of Services - Hosts
report shows the amount of time hosts sustain load above a specified threshold for a given time period. Load is defined in terms of CPU usage percent and memory usage percent. The following parameters must be provided to run this report:
Table 10.10. Cluster Quality of Service - Hosts Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
CPU Threshold
|
The report measures the quality of service as the amount of time hosts sustain load above a given threshold. The CPU Threshold defines a load threshold as a percentage of total CPU usage on the host. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A CPU Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
MEM Threshold
|
The report measures the quality of service as the amount of time hosts sustain load above a given threshold. The MEM Threshold defines a load threshold as a percentage of total memory usage on the host. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A MEM Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Cluster Quality of Service - Virtual Machines
report shows the amount of time virtual machines sustain load above a specified threshold for a given time period. Load is defined in terms of CPU usage percent and memory usage percent. The following parameters must be provided to run this report:
Table 10.11. Cluster Quality of Service - Virtual Machines Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
CPU Threshold
|
The report measures quality of service as the amount of time virtual machines sustain load above a given threshold. The CPU Threshold defines a load threshold as a percentage of total CPU usage on the virtual machine. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A CPU Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
MEM Threshold
|
The reports measures quality of service as the amount of time virtual machines sustain load above a given threshold. The MEM Threshold defines a load threshold as a percentage of total memory usage on the virtual machine. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A MEM Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Single Host Uptime
report shows the total proportion of uptime, planned downtime and unplanned downtime for a single host. The following parameters must be provided to run this report:
Table 10.12. Single Host Uptime Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host Name parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and a user must select a host. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Top 10 Downtime Hosts
report shows the total proportion of uptime, planned downtime and unplanned downtime for the 10 hosts with the greatest amount of downtime. The following parameters must be provided to run this report:
Table 10.13. Top 10 Downtime Hosts Parameters
Parameter
| Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list contains only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
High Availability Virtual Servers Uptime
report shows the weighted average uptime of high availability virtual servers within a cluster for a given period of time. The report also provides a table listing the total uptime and unplanned down time for each virtual server. The following parameters must be provided to run this report:
Table 10.14. High Availability Virtual Servers Uptime Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual servers in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual servers in the selected data center.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Five Least Utilized Hosts (Over Time)
report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five hosts with the lowest load factor for a given period of time. The following parameters must be provided to run this report:
Table 10.15. Five Least Utilized Hosts (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Five Least Utilized Virtual Machines (Over Time)
report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five virtual machines with the lowest load factor for a given period of time. The following parameters must be provided to run this report:
Table 10.16. Five Least Utilized Virtual Machines (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Five Most Utilized Hosts (Over Time)
report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five hosts with the highest load factor for a given period of time. The following parameters must be provided to run this report:
Table 10.17. Five Most Utilized Hosts (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Five Most Utilized Virtual Machines (Over Time)
report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five virtual machines with the highest load factor for a given period of time. The following parameters must be provided to run this report:
Table 10.18. Five Most Utilized Virtual Machines (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers which contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Multiple Hosts Resource Usage (Over Time)
report shows the daily peak load, in terms of CPU and memory usage, for up to five selected hosts over a given period of time. The following parameters must be provided to run this report:
Table 10.19. Multiple Hosts Resource Usage (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host List parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host List parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host List parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host List parameter includes all host types.
|
Host List
| The report includes all hosts selected in the host list. Select any number of hosts up to a maximum of five. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Multiple Virtual Machines Resource Usage (Over Time)
report shows the daily peak load, in terms of CPU and memory usage, for up to five selected virtula machines over a given period of time. The following parameters must be provided to run this report:
Table 10.20. Multiple Virtual Machines Resource Usage (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM List parameter include only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM List parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM List parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM List parameter includes all virtual machine types.
|
VM List
| The report includes all virtual machines selected in the virtual machine list. Select any number of virtual machines up to a maximum of five. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Single Host Resource Usage (Days of Week)
report shows various resource utilization metrics for a single host over a given period of time and broken down by day of the week. The metrics include CPU usage, memory usage, number of active virtual machines and network usage. The following parameters must be provided to run this report:
Table 10.21. Single Host Resource Usage (Days of Week) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host Name parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and the user must select a host. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Single Host Resource Usage (Hour of Day)
report shows a variety of resource utilization metrics for a single host over a given period of time, broken down by hour of the day (0-23). The metrics include CPU usage, memory usage, number of active virtual machines and network usage. The following parameters must be provided to run this report:
Table 10.22. Single Host Resource Usage (Hour of Day) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
Only hosts of the selected type will be included in the list of options for the Host Name parameter. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and the user must select a host. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Single Virtual Machine Resources (Days of Week)
report shows a variety of resource utilization metrics for a single virtual machine over a given period of time, broken down by day of the week. The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 10.23. Single Virtual Machine Resources (Days of Week) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM Name parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
VM Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Single Virtual Machine Resources (Hour of Day)
report shows a variety of resource utilization metrics for a single virtual machine over a given period of time, broken down by hour of the day (0-23). The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 10.24. Single Virtual Machine Resources (Hour of Day) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers which contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM Name parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
VM Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Single Virtual Machine Resources (Over Time)
report shows a variety of resource utilization metrics for a single virtual machine over a given period of time. The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 10.25. Single Virtual Machine Resources (Over Time) Parameters
Parameter | Description |
---|---|
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM Name parameter lists only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
VM Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center Inventory Dashboard
provides an executive summary of the inventory of a data center over a given period of time. The dashboard includes average disk use, number of active virtual machines and a breakdown of host operating systems. The following parameters must be provided to view this dashboard:
Table 10.26. Data Center Inventory Dashboard Parameters
Parameter | Description |
---|---|
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Cluster
|
The report refers to the cluster selected. If All is selected, the report refers to the entire data center.
|
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center Trends Dashboard
provides an executive summary of the trends in a data center over a given period of time. The dashboard includes graphs of CPU and memory usage over time for the most highly utilized hosts and virtual machines in the data center. The following parameters must be provided to view this dashboard:
Table 10.27. Data Center Trends Dashboard Parameters
Parameter | Description |
---|---|
Data Center
|
The report refers to the selected data center. The options list shows only data centers containing either hosts or virtual machines. The options list for the Cluster parameter includes only clusters in the selected data center.
|
Cluster
|
The report refers to the cluster selected. If All is selected, the report refers to the entire data center.
|
Host Type
| The list of most utilized hosts in the dashboard includes only hosts of the selected type. If All is selected, the dashboard includes all host types. |
VM Type
| The list of most utilized virtual machines in the dashboard includes only virtual machines of the selected type. If All is selected, the dashboard includes all virtual machine types. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center Uptime Dashboard
provides an executive summary of the service level and uptime for a data center over a given period of time. The dashboard includes details on total uptime for each cluster in the data center for the period. The following parameters must be provided to view this dashboard:
Table 10.28. Data Center Uptime Dashboard Parameters
Parameter | Description |
---|---|
Data Center
| The report refers to the data center selected. The options list shows only data centers containing either hosts or virtual machines. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
System Overview Dashboard
provides an executive summary of the hosts in a data center over a given period of time. The dashboard includes:
- A quality of service (QoS) view for each cluster, which shows the proportion of period where CPU and memory exceeded thresholds on the hosts in the cluster;
- A break down of host operating systems; and
- A summary of average host resource utilization over the period.
Table 10.29. System Overview Dashboard Parameters
Parameter | Description |
---|---|
Data Center
|
The report refers to the data center selected. The list of options shows only data centers containing either hosts or virtual machines. The options list for the Cluster parameter includes only clusters in the selected data center.
|
Cluster
|
The report refers to the cluster selected. If All is selected, the report pertain to the entire data center.
|
CPU Threshold
| The report refers to the amount of Host CPU utilized. |
Memory Threshold
| The report refers to the amount of Memory utilized in the host by virtual machines. |
Period Range
| The report refers to the range of dates selected. |
Dates
| The report refers to the dates displayed. This parameter changes automatically when the Range parameter is set. |
Working with the Ad Hoc Editor
section of the online help explains the ad hoc report interface in detail. See Section 10.1.2, “Online Help” for more information.
Warning — Do Not Stop RHEVM History Service
SELECT
statement. The result of the SELECT
statement populates the virtual table that the view returns. A user references the view name in PL/PGSQL statements the same way a table is referenced.
- A new entity is added to the rhevm database - the ETL Service replicates the change to the rhevm_history database as a new entry.
- An existing entity is updated - the ETL Service replicates the change to the rhevm_history database as a new entry.
- An entity is removed from the rhevm database - A new entry in the rhevm_history database flags the corresponding entity as removed. Removed entities are only flagged as removed. To maintain correctness of historical reports and representations, they are not physically removed.
- a
history_id
to indicate the configuration version of the entity; - a
create_date
field to indicate when the entity was added to the system; - an
update_date
field to indicate when the entity was changed; and - a
delete_date
field to indicate the date the entity was removed from the system.
- A tag is created in the Administration Portal - the ETL Service copies the tag details, position in the tag tree and relation to other objects in the tag tree.
- A entity is attached to the tag tree in the Administration Portal - the ETL Service replicates the addition to the rhevm_history database as a new entry.
- A tag is updated - the ETL Service replicates the change of tag details to the rhevm_history database as a new entry.
- An entity or tag branch is removed from the Administration Portal - the rhevm_history database flags the corresponding tag and relations as removed in new entries. Removed tags and relations are only flagged as removed or detached. In order to maintain correctness of historical reports and representations, they are not physically removed.
- A tag branch is moved - the corresponding tag and relations are updated as new entries. Moved tags and relations are only flagged as updated. In order to maintain correctness of historical reports and representations, they are not physically updated.
where
clause are substituted with the appropriate values for your environment and that the latest configuration is in use.
Example 11.1. Report query for resource utilization on a single host
select history_datetime as DateTime, cpu_usage_percent as CPU, memory_usage_percent as Memory from v3_0_host_configuration_view, v3_0_host_samples_history_view where v3_0_host_configuration_view.host_id = v3_0_host_samples_history_view.host_id and host_name = 'example.labname.abc.company.com' and v3_0_host_configuration_view.history_id in (select max(a.history_id) from v3_0_host_configuration_view as a where v3_0_host_configuration_view.host_id = a.host_id) and history_datetime >= '2011-07-01 18:45' and history_datetime <= '2011-07-31 21:45'
Table 11.1. Resource Utilization for a Single Host Example Data
DateTime | CPU | Memory |
---|---|---|
2010-07-01 18:45 | 42 | 0 |
2010-07-01 18:46 | 42 | 0 |
2010-07-01 18:47 | 42 | 1 |
2010-07-01 18:48 | 33 | 0 |
2010-07-01 18:49 | 33 | 0 |
2010-07-01 18:50 | 25 | 1 |
where
clause are substituted with appropriate values for your environment.
Example 11.2. Report query for resource utilization across all hosts
select extract(hour from history_datetime) as Hour, avg(cpu_usage_percent) as CPU, avg(memory_usage_percent) as Memory from v3_0_host_hourly_history_view where history_datetime >= '2011-07-01' and history_datetime < '2011-07-31' group by extract(hour from history_datetime) order by extract(hour from history_datetime)
Table 11.2. Resource utilization across all hosts example data
Hour | CPU | Memory |
---|---|---|
0 | 39 | 40 |
1 | 38 | 38 |
2 | 37 | 32 |
3 | 35 | 45 |
4 | 35 | 37 |
5 | 36 | 37 |
where
clause are substituted with appropriate values for your environment.
Example 11.3.
SELECT vm_name FROM v3_0_latest_vm_configuration_view inner join v3_0_latest_tag_relations_history_view on (v3_0_latest_vm_configuration_view.vm_id = v3_0_latest_tag_relations_history_view.entity_id) inner join v3_0_latest_tag_details_view on (v3_0_latest_tag_details_view.tag_id = v3_0_latest_tag_relations_history_view.parent_id) WHERE getpathinnames(v3_0_latest_tag_details_view.history_id) like '/root/tlv%'
Table 11.3. Tag Filtering of Latest VM Configuration
vm_name |
---|
RHEL6-Pool-67 |
RHEL6-Pool-5 |
RHEL6-Pool-6 |
RHEL6-23 |
Example 11.4.
SELECT vm_name, vm_type_value.value as vm_type, os_value.value as operating_system FROM v3_0_latest_vm_configuration_view inner join v3_0_enum_translator_view as vm_type_value on (vm_type_value.enum_type = 'VM_TYPE' and v3_0_latest_vm_configuration_view.vm_type = vm_type_value.enum_key) inner join v3_0_enum_translator_view as os_value on (os_value.enum_type = 'OS_TYPE' and v3_0_latest_vm_configuration_view.operating_system = os_value.enum_key)
Table 11.4. Current Virtual Machines' Names, Types, and Operating Systems
vm_name | vm_type | operating_system |
---|---|---|
RHEL6-Pool-2 | Desktop | RHEL 6 x64 |
RHEL6-Pool-1 | Desktop | RHEL 6 x64 |
RHEL6-Pool-3 | Desktop | RHEL 6 x64 |
RHEL6-Pool-4 | Desktop | RHEL 6 x64 |
RHEL6-Pool-5 | Desktop | RHEL 6 x64 |
Reporting Views
Table of Contents
- 12. Live Migration
- 13. High Availability
- 14. Managing Multilevel Administration
- 15. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager.
- 16. Extending VDSM with Hooks
- The source and destination host must both be members of the same cluster, ensuring CPU compatibility between them.
- The source and destination host must have a status of
Up
. - The source and destination host must have access to the same virtual networks and VLANs.
- The source and destination host must have access to the data storage domain on which the virtual machine resides.
- There must be enough CPU capacity on the destination host to support the virtual machine's requirements.
- There must be enough RAM on the destination host that is not in use to support the virtual machine's requirements.
- To move a host to maintenance mode, see Section 12.3.1, “Moving a Host to Maintenance Mode”.
- To configure cluster policy, see Section 12.3.2, “Cluster Policy”.
- To prevent automatic migration of a specific virtual machine, see Section 12.3.3, “Preventing Automatic Migration of a Virtual Machine”.
- Ensure the Tree tab is selected in the left hand pane of the Administration Portal.
- Expand the tree view using the + buttons until the host to be moved into maintenance mode is visible.
- Select the host to be moved into maintenance mode. Click thebutton.All running virtual machines will be migrated to alternative hosts. Once this has occurred the host is moved into maintenance mode. The Status field of the host will change to Preparing for Maintenance, and finally Maintenance when the operation completes successfully.
- Result:All running virtual machines have been migrated to alternatives hosts. The host has been placed into maintenance mode.
- Ensure that you have the Tree tab open to the left of the Administration Portal screen. Expand the objects in the tree, by clicking the + icon next to them, until the cluster that you are modifying is visible.
- Select the cluster from the list and click thebutton. The button is located on the details pane. Note that the current cluster policy, if one is defined, is also visible in the details pane.
- Select the policy to use, the available options are:
- None — to have no load or power saving between hosts. This is the default mode. When starting a new virtual machine the host to use is selected based on CPU utilization. The active host in the cluster with the lowest CPU utilization will be chosen. While this is the same mechanism as used to select the initial host for a virtual machine under the Even Distribution policy no automatic live migration is performed once the virtual machine has started to maintain the distribution. Once the virtual machine has started it will continue to run on this host until it is stopped, the host goes into maintenance mode, or the host becomes non-responsive.
- Even Distribution — evenly distributes the processing load across all hosts in the cluster. The host's CPU load is measured and used to apply the policy. Use the blue slider to specify the Maximum Service Level a host is permitted to have. For example, a host that has reached the maximum service level defined will not have further virtual machines started on it. You must also specify the time interval in minutes that a host is permitted to run at the maximum service level before virtual machines are migrated off it.Once the host has run at the maximum service level for the specified amount of time the manager will begin migrating virtual machines to other hosts in the cluster until the host's CPU load returns to a level below the maximum service threshold. When migrating the virtual machines the manager chooses the host in the cluster with the lowest CPU usage as the destination.
- Power Saving — distributes the load in a way that consolidates virtual machines on a subset of available hosts, allowing surplus hosts not in use to be powered down to save power. Use the green slider to specify the Minimum Service Level a host is permitted to have. You must also specify the time interval in minutes that a host is permitted to run below the minimum service level before remaining virtual machines are migrated to other hosts in the cluster — as long as the maximum service level set also permits this.Under-utilized hosts are then able to be turned off either manually or using the REST API to save power.
- Click OK to save the policy selection for the cluster.
- Result:The cluster policy for the selected cluster has been updated.
- Ensure that you have the Tree tab open to the left of the Administration Portal Screen. Expand the objects in tree, by clicking the + icon next to them, until the cluster on which the virtual machine you are modifying runs is visible.
- Expand the entry for the cluster and select the VMs object. The list of the cluster's virtual machines will appear.
- Select the virtual machine from the list. Click the Edit button. Depending on the type of virtual machine selected the Edit Desktop Virtual Machine or Edit Server Virtual Machine dialog box will appear.
- Click the Host tab on the dialog box. A number of options used to determine where the virtual machine is able to run appear.
- Set the Run On option to either Any Host in Cluster or Specific.
- Select Any Host in Cluster to allow the virtual machine to run on any host in the cluster. Subsequent options in the dialog will still allow you to ensure the virtual machine is not automatically migrated once it has started on a host. You will not however be able to disable manual migration.
- Select Specific to set the virtual machine to only run on a specific host in the cluster. You must also select the host on which the virtual machine must run from the list. The list contains all active hosts in the cluster.
Warning — Mutually Exclusive with High Availability
Explicitly assigning a virtual machine to a specific host and disabling migration is mutually exclusive with high availability. Virtual machines that are assigned to a specific host and set not to migrate can not be made highly available.
- To force the virtual machine to only run on the host selected when it starts, and to disable migration, you must select either:
- Run VM on the selected host (no migration allowed) — No migration of the virtual machine is permitted. Automatic migration of the virtual machine will not be attempted and manual attempts to migrate the virtual machine will be denied. This option is only available when you have selected to run the virtual machine on a specific host.
- Allow VM migration only upon Administrator specific request (system will not trigger automatic migration of this VM) — Only manual migration of the virtual machine is permitted. Automatic migration of the virtual machine will not be attempted. This option is available regardless of whether you have selected to run the virtual machine on a specific host or on any host in the cluster.
- Result:The migration settings for the virtual machine have been updated.
- Click the Virtual Machines tab.
- Select the entry for the virtual machine that you want to migrate.
- With the entry for the virtual machine still selected, click thebutton; or
- Right click the entry for the virtual machine and selectin the menu that appears.
- The Red Hat Enterprise Virtualization Manager is able to automatically select the host to migrate the virtual machine to or you are able to manually specify a host.
- Choose Select Host Automatically to allow Red Hat Enterprise Virtualization Manager to select the destination host; or
- Choose Select Destination Host to manually select a host. You must also select the destination host from the list provided. Only active hosts within the cluster are listed.
Note — Automatic Host Selection
Virtual Machines migrate within their designated host cluster. When the Select Host Automatically option is selected the system determines the host to which the virtual is migrated, according to the load balancing and power management rules set up in the cluster policy. - Clickto commence migration and close the dialog box.
- Result:The virtual machine is migrated. Once migration has completed the Host column will update to display the host the virtual machine has been migrated to.
- Click the Virtual Machines tab.
- Select the entry for the virtual machine that you want to migrate.
- With the entry for the virtual machine still selected, click thebutton; or
- Right click the entry for the virtual machine and clickin the menu that appears.
- Click the High Availability tab.
- Set the priority of the virtual machine by selecting Low, Medium, or High under Priority for Run/Migrate Queue.
- Clickto save the change to the virtual machine's priority.
- Result:The virtual machine's migration priority has been modified.
- When a host becomes non-operational due to hardware failure.
- When a host is put into maintenance mode for scheduled downtime.
- When a host becomes unavailable because it has lost communication with an external storage resource.
- When a virtual machine fails due to an operating system crash.
- Power management must be configured for the hosts running the highly available virtual machines.
- The host on which the highly available virtual machines are running must be part of a cluster which has other available hosts.
- The destination host must be running.
- The source and destination host must have access to the data storage domain on which the virtual machine resides.
- The source and destination host must have access to the same virtual networks and VLANs.
- There must be enough virtual CPUs on the destination host that are not in use to support the virtual machine's requirements.
- There must be enough virtual RAM on the destination host that is not in use to support the virtual machine's requirements.
To set up fencing on a host:
- Ensure the Tree tab is selected in the left hand pane of the Administration Portal. Expand the tree view using the buttons until the host to be fenced is visible. The Hosts tab displays a list of all hosts in the system.
- Select the host for which you wish to set up fencing and click the Edit button. The Edit Host dialog displays. Click the Power Management tab.
- Enable Power Management: Select this checkbox to turn out-of-band (OOB) power management on. The fields for Power Management are enabled.
- The Address of the host. This is usually the address of the remote access card (RAC) on the host.
- A valid User Name for the OOB management.
- A valid, robust Password for the OOB management.
- The Type of the fencing device. Select the appropriate device from the drop down list.
alom Sun Integrated Lights Out Manager (ILOM) apc APC Master MasterSwitch network power switch bladecenter IBM Bladecentre Remote Supervisor Adapter drac5 Dell Remote Access Controller for Dell computers eps ePowerSwitch 8M+ network power switch ilo HP Integrated Lights Out standard ipmilan Intelligent Platform Management Interface rsa IBM Remote Supervisor Adaptor rsb Fujitsu-Siemens RSB management interface wti WTI Network PowerSwitch cisco_ucs Cisco UCS Integrated Management Controller Note:
Depending on the Type selected, some or all of the following fields display on the Power Management tab.- Click Secure to use SSH to connect to OOB management.
- The Port to connect to OOB management.
- Enter the Slot if a Blade server is being configured.
- Enter any Options that are needed for the fence-agents commands or ssh command. This is free text field that enables the administrator to enter commands that are not available via the graphical user interface. Red Hat Enterprise Virtualization Manager does not perform any checks on these options. These options should only be used by advanced users, as any errors will cause the host to become unreachable.
- Click the Test Succeeded, Host Status is: on displays.button to test the operation of the OOB management solution. If the power management options can be verified, the text
Warning
Power management parameters (userid, password, options, etc) are tested by Red Hat Enterprise Virtualization Manager only during setup and when required. There are no periodic tests unless manually scheduled. If you choose to ignore alerts about incorrect parameters, or if the parameters are changed on the power management hardware without the corresponding change in Red Hat Enterprise Virtualization Manager, fencing is likely to fail when most needed. - Click.You are returned to the list of hosts. Note that the exclamation mark next to the host's name has now disappeared, signifying that power management has been successfully configured.
To use power management options:
- On the Hosts tab, select the host. Click the Power Management drop-down menu.
- You can select between the following options:
- Restart: This option stops the host, and waits until the host's status changes to Down. When the agent has verified that the host is down, the highly available virtual machines are restarted on another host in the cluster. The agent then restarts this host, and when the host is ready for use, its status displays as Up.
- Start: This option starts the host and lets it join a cluster. When it is ready for use its status displays as Up.
- Stop: This option powers off the host. Before using this option, ensure that the virtual machines running on the host have been migrated to other hosts in the cluster. Otherwise, the virtual machines will crash, and only the highly available ones will be restarted on another host. When the host has been stopped, its status displays as Non Operational.
- Based on the option you chose, a relevant dialog pops up asking you to confirm your selection. Click OK to confirm and proceed.
Important
To manually fence a non-responsive host:
- On the Hosts tab, select the host. The status must display as Not Responding.
- Manually reboot the host. This could mean physically entering the lab and rebooting the host.
- On the Administration Portal, right click the host entry and select thebutton.
- A message displays prompting you to ensure that the host has been shut down or rebooted. Select the Approve Operation check box and click OK.
- The host to be fenced is isolated from the virtualized system, enabling any of its functions to be automatically transferred to an active host.
- After the non-responsive host is rectified, and is reinstalled or rebooted, click the Activate button to restore the host status to Up.
Important
To mark a virtual machine as highly available:
- On the Virtual Machines tab, select the entry for the virtual machine that you want to migrate, and click the button.
- On the Edit Server Virtual Machine dialog, click the High Availability tab.
- Tick the Highly Available checkbox. Set the priority of the virtual machine by selecting Low, Medium, or High under Priority for Run/Migrate Queue. When migration is triggered, a queue is created in which the high priority virtual machines are migrated first. If a cluster is running low on resources, only the high priority virtual machines are migrated.
- Clickto set the virtual machine high availability.
To define a cluster resilience policy:
- On the Clusters tab which displays on the results list, select the cluster and click Edit. The Edit Cluster dialog displays. Select the Resilience Policy tab.
- Select the policy to use. The available options are:
- Migrate Virtual Machines: This option migrates all virtual machines when a host becomes non-operational. The virtual machines are migrated in order of their defined priority, so the highly available virtual machines are at the front of the migration queue.
- Migrate only Highly Available Virtual Machines: This option migrates only the highly available virtual machines, so the other available hosts in the cluster do not become overloaded if they are to rescue virtual machines from non-operational hosts.
- Do Not Migrate Virtual Machines: This option prevents your virtual machines from being migrated at all.
Note
Virtual machine migration is a network-intensive operation. For instance, on a setup where a host is running ten or more virtual machines, migrating all of them can be a long and resource-consuming process. Therefore, select the policy action to best suit your setup. If you prefer a conservative approach, disable all migration of virtual machines. Alternatively, if you have many virtual machines, but only several which are running critical workloads, select the option to migrate only highly available virtual machines. - Clickto save the policy selection for virtual machines in the cluster.
Note
administrator
roles and user
roles. See Table 5.1, “Red Hat Enterprise Virtualization User Roles” for details on roles.
Role Types
- Administrator - Allows access to the Administration Portal for managing virtual resources. An administrator role does not confer any permissions for the user portal.
- User - Allows access to the User Portal for managing and accessing virtual machines. A user role does not confer any permissions for the Administration Portal
administrator
role on a cluster, they can manage all virtual machines in the cluster using the Administration Portal. They cannot access any of these virtual machines in the User Portal; this requires a user
role.
To create a new role:
- On the header bar of the Red Hat Enterprise Virtualization Manager menu, click Configure. The Configure dialog box displays. The dialog box includes a list of default User and Administrator roles, and any custom roles.
- Click New. The New Role dialog box displays.
- Enter the Name and Description of the new role. This name will display in the list of roles.
- Select either Admin or User as the Account Type. If Admin is selected, this role displays with the administrator icon in the list.
- Use the Check Boxes to Allow Action list. You can also expand or collapse the options for each object.or buttons to view more or fewer of the permissions for the listed objects in the
- For each of the objects, select or deselect the actions you wish to permit/deny for the role you are setting up.
- Clickto apply the changes you have made. The new role displays on the list of roles.
To edit a role:
- On the header bar of the Red Hat Enterprise Virtualization Manager menu, click Configure. The Configure dialog box displays. The dialog box below shows the list of Administrator roles.
- If necessary, edit the Name and Description of the role. This name will display in the list of roles.
- Use theor buttons to view more or fewer of the permissions for the listed objects. You can also expand or collapse the options for each object.
- For each of the objects, select or deselect the actions you wish to permit/deny for the role you are editing.
- Clickto apply the changes you have made.
To clone a role:
- On the header bar of the Red Hat Enterprise Virtualization Manager menu, click Configure. The Configure dialog box displays. The dialog box includes a list of default roles, and any custom roles that exist on the platform.
- Click Clone. The Clone Role dialog box displays.
- Change the Name and Description of the new role. This name will display in the list of roles.
- Use theor buttons to view more or fewer of the permissions for the listed objects. You can also expand or collapse the options for each object.
- For each of the objects, select or deselect the actions you wish to permit/deny for the role you are editing.
- Clickto apply the changes you have made.
To assign a UserRole account:
- Ensure that Penelope has a valid user account in the IPA or Active Directory domain. See the Directory Services chapter of the Red Hat Enterprise Virtualization Installation Guide.
- In the Administration Portal, add Penelope's account to the Red Hat Enterprise Virtualization platform. See Section 5.3.1, “Adding Users and Groups”.
- Create a virtual machine (Penelope-VM) in the appropriate data center and cluster. Provision it with the applications that Penelope requires, and ensure the machine has a status of Up.
- Click the Virtual Machines tab, and select the virtual machine (Penelope-VM). Click Permissions from the Details pane.
- The Permissions tab displays a list of users and their current roles and permissions, if any. Note that there are no inherited permissions for virtual machines. Click to add an existing user. The Add Permission to User dialog box displays. Enter Penelope's Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.
- Tick Penelope's checkbox. Scroll through the Assign role to user list and select .
- Click Permissions tab. Penelope can now connect to the virtual machine via the User Portal and log into the virtual machine that has been created for her. Since no one else has been assigned to this machine, she will always have access to the virtual machine, and should experience no difference to using a physical machine.. Penelope's name displays in the
UserVmManager
account for her own virtual machine.
To assign a UserVmManager role:
- Since Penelope is an existing user, you do not need to check her status, or set up her machine. In the Administration Portal, click the Virtual Machines tab, and select the virtual machine (Penelope-VM). Click Permissions from the Details pane.
- The Permissions tab displays a list of users and their current roles and permissions, if any. Note that there are no inherited permissions for virtual machines. Click to add an existing user. The Add Permission to User dialog box displays. Enter Penelope's Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.
- Tick Penelope's checkbox. Scroll through the Assign role to user list and select .
- Click Permissions tab as a . Penelope can now administrate the virtual machine as well as log into the virtual machine.. Penelope's name displays in the
PowerUserRole
permissions for the data center in which the new virtual machine will reside. This is because to create a new virtual machine, she needs to be able to make changes to several components within the data center, including creating the virtual machine disk image in the storage domain. However, note that this is not the same as assigning DataCenterAdmin
privileges to Penelope. As a PowerUser for a data center, Penelope can perform virtual machine-specific actions on virtual machines within the data center. She cannot perform data center-level operations such as attaching hosts or storage to a data center.
To assign a PowerUser Role:
- Since Penelope is an existing user, you do not need to check her status. In the Administration Portal, click the Data Centers tab. Select the data center in which the new virtual machine will reside. Click Permissions from the Details pane. A list of users and their current roles and permissions displays.
- The Permissions tab displays a list of users and their current roles and permissions, if any. Click Add to add an existing user. The Add Permission to User dialog displays. Enter Penelope's Name, or User Name, or part thereof in the Search text box, and click . A list of possible matches display in the results list.
- Tick Penelope's checkbox. Scroll through the Assign role to user list and select .
- Click Permissions tab, Penelope's name now displays with privileges. Penelope can now create a virtual machine for herself from the User Portal.. In the
Example 14.1. Cluster Permissions
cluster
called accounts
. She is assigned the ClusterAdmin
role on the accounts cluster. This enables her to manage all virtual machines in the cluster, since the virtual machines are child objects of the cluster as shown in Figure 5.3, “Red Hat Enterprise Virtualization Object Hierarchy”. Managing the virtual machines includes editing, adding or removing virtual resources such as disks, and taking snapshots. It does not allow her to manage any resources outside this cluster. Because ClusterAdmin
is an administrator role, it allows her to use the Administration Portal to manage these resources, but does not give her any access via the User Portal.
Example 14.2. VM PowerUser Permissions
johndesktop
for him. John is assigned the PowerUserRole
on the johndesktop virtual machine. This allows him to access this single virtual machine using the User Portal. Because he has PowerUser permissions, he can modify the virtual machine and add resources to it, such as new virtual disks. Because PowerUserRole
is a user role, it does not allow him to use the Administration Portal.
Example 14.3. Custom Role Permissions
The custom role shown above allows manipulation of users, permissions and roles. These actions are organized under
System
- the top level object of the hierarchy shown in Figure 5.3, “Red Hat Enterprise Virtualization Object Hierarchy”. This means they apply to all other objects in the system. The role is set to have an Account Type of Admin. This means that when she is assigned this role, Rachel can only use the Administration Portal, not the User Portal.
rhevm
database is a key component of the Red Hat Enterprise Virtualization environment so it is highly recommended that regular backups of the database be taken.
rhevm
database, they should be repeated for each database being backed up. For example, the same procedures can be used to back up and restore the rhevm_history
database.
Procedure 15.1. To backup the rhevm
database:
- From the terminal on the Red Hat Enterprise Virtualization Manager server as root use the
pg_dump
command to dump therhevm
database:# pg_dump -C -E UTF8 --column-inserts --disable-dollar-quoting --disable-triggers -U postgres --format=p -f
/usr/share/rhevm/db-backups/dump_RHEVDB_BACKUP_`date "+%Y%m%d_%R"`.sql
rhevmThe output file name and directory are user specified,/usr/share/rhevm/db-backups/dump_RHEVDB_BACKUP_`date "+%Y%m%d_%R"`.sql
should be replaced with a desired location and file name. - Consider mounting a remote backup location locally and using the
pg_dump
to write the database backup file directly to the mounted remote location. - Copy the
.sql
file to a remote backup location. This can be accomplished using scp, rsync, or some other third party back up tool. - Consider automating the
rhevm
database backup with ssh keys, a script, and a cron job.Example 15.1. Example
rhevm
Postgres database backup scriptThis script presumes that an ssh key has been set up for the user that executes the script. The public key must then be added to the remote users~/.ssh/authorized_hosts
using thessh-copy-id BACKUPUSER@BACKUPDIRECTORY
command so that thescp
command can be done without a password.#!/bin/sh # Enter appropriate values for the BACKUPUSER, BACKUPSERVER, and BACKUPDIRECTORY variables. DATE = `date "+%Y%m%d_%R"`; BACKUPUSER = ; BACKUPSERVER = ; BACKUPDIRECTORY = ; # pg_dump -C -E UTF8 --column-inserts --disable-dollar-quoting --disable-triggers -U postgres --format=p -f
/usr/share/rhevm/db-backups/dump_RHEVDB_BACKUP_`date "+%Y%m%d_%R"`.sql
rhevm; scp/usr/share/rhevm/db-backups/dump_RHEVDB_BACKUP_`date "+%Y%m%d_%R"`.sql
$BACKUPUSER@$BACKUPSERVER:$BACKUPDIRECTORY;
rhevm
database using the pg_dump
, you can use the .sql
file you created to restore the rhevm
database.
Procedure 15.2. To restore the rhevm
database:
- To restore a
.sql
that was created using thepg_dump
command, use thepsql
interactive shell. From the terminal on the Red Hat Enterprise Virtualization Manager server as root:# psql -U postgres -d rhevm -W -f
Substitute the name of the/usr/share/rhevm/db-backups/dump_RHEVDB_BACKUP_`date "+%Y%m%d_%R"`.sql
.sql
file being restored fordump_RHEVDB_BACKUP_CURRENT_DATE
.- If you are required to remove the existing
rhevm
database to create a new one, first stop the jbossas service using theservice jbossas stop
command. - When you have created the new
rhevm
database and imported database backup file, start the jbossas service using theservice jbossas start
.
Table 15.1. Configuration files and directories requiring backup.
Location | What is it? |
---|---|
/etc/jbossas/jbossas.conf | Configuration file for JBoss Application Server. |
/etc/rhevm/ | Contains Red Hat Enterprise Virtualization Manager configuration files. |
/etc/yum/pluginconf.d/versionlock.list | Contains version information about currently installed Red Hat Enterprise Virtualization components. |
/etc/pki/rhevm/ | Security certificates provided by the Red Hat Enterprise Virtualization Manager to clients. |
/etc/jbossas/rhevm-slimmed/ | Contains the optimized enhancements for the JBoss server used by the Red Hat Enterprise Virtualization Manager. |
/usr/share/rhevm-reports-server/buildomatic | Contains files required to build the Red Hat Enterprise Virtualization reports server. |
/usr/share/rhevm/conf/iptables.example | An example of a correct iptables configuration that allows the communications required by the Red Hat Enterprise Virtualization Manager. |
/usr/share/rhevm/kerberos/krb5.conf | Kerberos configuration file for Red Hat Enterprise Virtualization external authorization. |
/usr/share/rhevm/dbscripts/create_db.sh.log |
Log file from the creation of the rhevm database.
|
/usr/share/rhevm/rhevm.ear/rhevmanager.war/ExternalConfig.txt | An XML configuration file for the Red Hat Enterprise Virtualization Manager Web Service. |
/usr/share/rhevm/rhevm.ear/rhevmanager.war/ServerParameters.js | Contains port information for accessing the manager. |
/usr/share/rhevm-reports/reports-INSERT_VERSION_NUMBER /resources/organizations/rhevmreports/Resources/JDBC/data_sources/rhevm.xml
| Contains JDBC connection information for the Red Hat Enterprise Virtualization databases. |
/usr/share/rhevm-reports/reports-INSERT_VERSION_NUMBER /users/rhevmreports/rhevm-002dadmin.xml
| Contains plain-text, un-encrypted user and password information for the rhev-admin user. |
/usr/share/rhevm-reports-server/buildomatic/default_master.properties | Contains settings to handle the configuration and deployment of JasperServer. |
/usr/share/rhevm-reports-server/buildomatic/install.xml | Installation related macros and targets for configuration and deployment of JasperServer. |
/usr/share/rhevm-reports-server/buildomatic/setup.xml | Sets properties, reads and sets up configuration files, and checks the app server of JasperServer. |
/root/.pgpass | Contains password information for the postgres and rhevm users. |
/root/.rnd | Random seed file, used to generate secure certificates. |
Procedure 15.3. To Restore the Red Hat Enterprise Virtualization Manager
- Stop the JBoss service:
# service jbossas stop
- Completely remove all previous installations of the Red Hat Enterprise Virtualization Manager:
# yum remove rhevm
- Remove the
rhevm-slimmed
profile:# rm -rf /var/lib/jbossas/server/rhevm-slimmed
- Delete the old configuration for
rhevm-slimmed
profile:# rm -rf /etc/jbossas/rhevm-slimmed
- Remove /etc/pki/rhevm:
# rm -rf /etc/pki/rhevm
- Install the Red Hat Enterprise Virtualization Manager:
# yum install -y rhevm
- Restore the files listed in Table 15.1, “Configuration files and directories requiring backup.” to their original locations.
- Make sure the ownership of the .keystore file is correct:
# chown jboss:jboss /etc/pki/rhevm/.keystore
- Make sure the permissions of the notifier.conf file is correct:
# chmod 644 /etc/rhevm/notifier/notifier.conf
- Start the
JBoss
service:# service jbossas start
/usr/libexec/vdsm/hooks/nn_event-name
/
on the host in alphanumeric order. By convention each hook script is assigned a two digit number, included at the front of the file name, to ensure that the order in which the scripts will be run in is clear. You are able to create hook scripts in any programming language, Python will however be used for the examples contained in this chapter.
Warning VDSM hooks may cause data loss
Table 16.1. Supported VDSM Events
Name | Description |
---|---|
before_vm_start | Before VM start. |
after_vm_start | After VM start. |
before_vm_cont | Before VM continue. |
after_vm_cont | After VM continue. |
before_vm_pause | Before VM pause. |
after_vm_pause | After VM pause. |
before_vm_hibernate | Before VM hibernate. |
after_vm_hibernate | After VM hibernate. |
before_vm_dehibernate | Before VM de-hibernate. |
after_vm_dehibernate | After VM de-hibernate. |
before_vm_migrate_source | Before VM migration, run on the source hypervisor host from which the migration is occurring. |
after_vm_migrate_source | After VM migration, run on the source hypervisor host from which the migration is occurring. |
before_vm_migrate_destination | Before VM migration, run on the destination hypervisor host to which the migration is occurring. |
after_vm_migrate_destination | After VM migration, run on the destination hypervisor host to which the migration is occurring. |
after_vm_destroy | After VM destruction. |
before_vdsm_start |
Before VDSM is started on the hypervisor host. before_vdsm_start hooks are executed as the user root, and do not inherit the environment of the VDSM process.
|
after_vdsm_stop |
After VDSM is stopped on the hypervisor host. after_vdsm_stop hooks are executed as the user root, and do not inherit the environment of the VDSM process.
|
vdsm
user and inherit the environment of the VDSM process. The exceptions are hook scripts triggered by the before_vdsm_start
and after_vdsm_stop
events. Hook scripts triggered by these events run as the root
user and do not inherit the environment of the VDSM process.
_hook_domxml
variable is appended to the environment. This variable contains the path of the libvirt domain XML representation of the relevant virtual machine. The libvirt domain XML format is used by VDSM to define virtual machines. Details on the libvirt domain XML format can be found at http://libvirt.org/formatdomain.html. The uuid of the virtual machine may be deduced from the domain XML, but it is also available as the environment variable vmId
.
Important
before_migration_destination
and before_dehibernation
hooks currently receive the XML of the domain from the source host. The XML of the domain at the destination will have various differences.
rhevm-config
. Run this command as the root
user on the host where Red Hat Enterprise Virtualization Manager is installed.
UserDefinedVMProperties
is used to store the names of the custom properties supported. Regular expressions defining the valid values for each named custom property are also contained in this configuration key.
jbossas
service must be restarted for it to take effect.
Example 16.1. Defining smartcard
Custom Property
- Check the existing custom properties defined by the
UserDefinedVMProperties
configuration key usingrhevm-config -g UserDefinedVMProperties
.In this case the custom propertymemory
is already defined. The regular expression^[0-9]+$
ensures that the custom property will only ever contain numeric characters.# rhevm-config -g UserDefinedVMProperties UserDefinedVMProperties : version: general UserDefinedVMProperties : version: 2.2 UserDefinedVMProperties : memory=^[0-9]+$ version: 3.0
- As the
memory
custom property is already defined in theUserDefinedVMProperties
configuration key the new custom property must be appended to it. The additional custom property,smartcard
, is added to the configuration key's value. The new custom property is able to hold a value oftrue
orfalse
.# rhevm-config -s UserDefinedVMProperties='memory=^[0-9]+$;smartcard=^(true|false)$' --cver=3.0
- Verify that the custom properties defined by the
UserDefinedVMProperties
configuration key now match your expectations.# rhevm-config -g UserDefinedVMProperties UserDefinedVMProperties : version: general UserDefinedVMProperties : version: 2.2 UserDefinedVMProperties : memory=^[0-9]+$;smartcard=^(true|false)$ version: 3.0
- Finally, the
jbossas
service must be restarted for the configuration change to take effect.# service restart jbossas
key
=value
, where key
is the name of the custom property and value
is the value which it should be set to for this virtual machine. Where multiple custom properties are being provided they must be separated by a semi-colon, as illustrated in the example below.
Example 16.2. Evaluating Custom Properties
key1
. If the custom property is set then the value is printed to standard error. If the custom property is not set then no action is taken.
#!/usr/bin/python import os import sys if os.environ.has_key('key1'): sys.stderr.write('key1 value was : %s\n' % os.environ['key1']) else: sys.exit(0)
xml.dom
library (http://docs.python.org/release/2.6/library/xml.dom.html) to manipulate the object.
Table 16.2. Hooking module functions
Name | Argument | Description |
---|---|---|
tobool
| string | Converts a string "true" or "false" to a Boolean value |
read_domxml
| - | Reads the virtual machine's libvirt XML into a DOM object |
write_domxml
| DOM object | Writes the virtual machine's libvirt XML from a DOM object |
before_vm_start
scripts may edit the domain XML in order to change VDSM's definition of a virtual machine before it reaches libvirt. Caution must be exercised in doing so. Hook scripts have the potential to disrupt the operation of VDSM, and buggy scripts can result in outages to the Red Hat Enterprise Virtualization environment. In particular, ensure you never change the uuid of the domain, and do not attempt to remove a device from the domain without sufficient background knowledge.
before_vdsm_start
and after_vdsm_stop
hook scripts are run as the root
user. Other hook scripts that require root
access to the system must be written to use the sudo
command for privilege escalation. To support this the /etc/sudoers
must be updated to allow the vdsm
user to use sudo
without reentering a password. This is required as hook scripts are executed non-interactively.
Example 16.3. Configuring sudo
for VDSM Hooks
sudo
command will be configured to allow the vdsm
user to run the /bin/chown
command as root
.
- Log into the virtualization host as
root
. - Open the
/etc/sudoers
file in a text editor. - Add this line to the file:
vdsm ALL=(ALL) NOPASSWD: /bin/chown
This specifies that thevdsm
user has the ability to run the/bin/chown
command as theroot
user. TheNOPASSWD
parameter indicates that the user will not be prompted to enter their password when callingsudo
.
sudo
command to run /bin/chown
as root
. This Python code uses sudo
to execute /bin/chown
as root
on the file /my_file
.
retcode = subprocess.call( ["/usr/bin/sudo", "/bin/chown", "/my_file"] )
Table 16.3. Hook return codes
Code | Description |
---|---|
0 | The hook script ended successfully |
1 | The hook script failed, other hooks should be processed |
2 | The hook script failed, no further hooks should be processed |
>2 | Reserved |
Example 16.4. CPU Pinning
pincpu
custom property. Where the custom property is not set no action is taken.
pincpu=^[\^]?\d+(-\d+)?(,[\^]?\d+(-\d+)?)*$
pincpu
custom property for a given virtual machine to specify:
- that a specific CPU be used for the virtual machine (
pincpu=0
, specifies that only CPU 0 be used), or - that a range of CPUs be used for the virtual machine (
pincpu=1-4
, specifies that CPUs 1 through 4 be used), or - that a specific CPU not be used for the virtual machine (
pincpu=^3
, specifies that CPU 3 not be used), or - any comma separated combination of the above (
pincpu=1-4,6
, specifies that CPUs 1 to 4, and 6 be used).
/usr/libexec/vdsm/hooks/before_vm_start/50_pincpu
#!/usr/bin/python import os import sys import hooking import traceback ''' pincpu usages ============= pincpu=0 (use the first cpu) pincpu=1-4 (use cpus 1-4) pincpu=^3 (dont use cpu 3) pincpu=1-4,6 (or all together) ''' if os.environ.has_key('pincpu'): try: domxml = hooking.read_domxml() vcpu = domxml.getElementsByTagName('vcpu')[0] if not vcpu.hasAttribute('cpuset'): sys.stderr.write('pincpu: pinning cpu to: %s\n' % os.environ['pincpu']) vcpu.setAttribute('cpuset', os.environ['pincpu']) hooking.write_domxml(domxml) else: sys.stderr.write('pincpu: cpuset attribute is present in vcpu, doing nothing\n') except: sys.stderr.write('pincpu: [unexpected error]: %s\n' % traceback.format_exc()) sys.exit(2)
Example 16.5. NUMA Node Tuning
numaset
custom property. Where the custom property is not set no action is taken.
numaset=^(interleave|strict|preferred):[\^]?\d+(-\d+)?(,[\^]?\d+(-\d+)?)*$
numaset
custom property for a given virtual machine to specify both the allocation mode (interleave
, strict
, preferred
) and the node to use. The two values are separated by a colon (:
). The regular expression allows specification of the nodeset
as:
- that a specific node (
numaset=strict:1
, specifies that only node 1 be used), or - that a range of nodes be used (
numaset=strict:1-4
, specifies that nodes 1 through 4 be used), or - that a specific node not be used (
numaset=strict:^3
, specifies that node 3 not be used), or - any comma separated combination of the above (
numaset=strict:1-4,6
, specifies that nodes 1 to 4, and 6 be used).
/usr/libexec/vdsm/hooks/before_vm_start/50_numa
#!/usr/bin/python import os import sys import hooking import traceback ''' numa hook ========= add numa support for domain xml: <numatune> <memory mode="strict" nodeset="1-4,^3" /> </numatune> memory=interleave|strict|preferred numaset="1" (use one NUMA node) numaset="1-4" (use 1-4 NUMA nodes) numaset="^3" (don't use NUMA node 3) numaset="1-4,^3,6" (or combinations) syntax: numa=strict:1-4 ''' if os.environ.has_key('numa'): try: mode, nodeset = os.environ['numa'].split(':') domxml = hooking.read_domxml() domain = domxml.getElementsByTagName('domain')[0] numas = domxml.getElementsByTagName('numatune') if not len(numas) > 0: numatune = domxml.createElement('numatune') domain.appendChild(numatune) memory = domxml.createElement('memory') memory.setAttribute('mode', mode) memory.setAttribute('nodeset', nodeset) numatune.appendChild(memory) hooking.write_domxml(domxml) else: sys.stderr.write('numa: numa already exists in domain xml') sys.exit(2) except: sys.stderr.write('numa: [unexpected error]: %s\n' % traceback.format_exc()) sys.exit(2)
internal
this is only used for the admin
user. To add and remove other users from the system it is first necessary to add the directory service(s) in which they are found.
rhevm-manage-domains
, to add and remove domains provided by these services. In this way it is possible to grant access to the Red Hat Enterprise Virtualization environment to users stored across multiple domains. This is true even where some users are stored in a domain managed by Active Directory and others are stored in a domain managed by IPA.
rhevm-manage-domains
command on the machine to which Red Hat Enterprise Virtualization Manager was installed. The rhevm-manage-domains
command must be run as the root
user.
Usage: rhevm-manage-domains -action
=ACTION
[options]
add
- Add a domain to the manager's directory services configuration.
edit
- Edit a domain in the manager's directory services configuration.
delete
- Delete a domain from the manager's directory services configuration.
validate
- Validate the manager's directory services configuration. The command attempts to authenticate to each domain in the configuration using the configured username and password.
list
- List the manager's current directory services configuration.
-domain=
DOMAIN
- Specifies the domain the action must be performed on. The
-domain
parameter is mandatory foradd
,edit
, anddelete
. -user=
USER
- Specifies the domain user to use. The
-user
parameter is mandatory foradd
, and optional foredit
. -interactive
- Specifies that the domain user's password is to be provided interactively. This option, or the
-passwordFile
option, must be used to provide the password for use with theadd
action. -passwordFile=
FILE
- Specifies that the domain user's password is on the first line of the provided file. This option, or the
-interactive
option, must be used to provide the password for use with theadd
action. -configFile=
FILE
- Specifies an alternative configuration file that the command must load. The
-configFile
parameter is always optional. -report
- Specifies that when performing the
validate
action all validation errors encountered will be reported in full.
rhevm-manage-domains
command's help output:
# rhevm-manage-domains --help
rhevm-manage-domains
to perform basic manipulation of the Red Hat Enterprise Virtualization Manager domain configuration.
Example A.1. Adding Domains to Configuration
rhevm-manage-domains
command to add the directory.demo.redhat.com
domain to the Red Hat Enterprise Virtualization Manager configuration. The configuration is set to use the admin
user when querying the domain with the password to be provided interactively.
# rhevm-manage-domains -action=add -domain='directory.demo.redhat.com' -user='admin' -interactive loaded template kr5.conf file setting default_tkt_enctypes setting realms setting domain realm success User guid is: 80b71bae-98a1-11e0-8f20-525400866c73 Successfully added domain directory.demo.redhat.com
Example A.2. Edit Domain in Configuration
rhevm-manage-domains
command to edit the directory.demo.redhat.com
domain in the Red Hat Enterprise Virtualization Manager configuration. The configuration is updated to use the admin
user when querying this domain with the password to be provided interactively.
# rhevm-manage-domains -action=edit -domain=directory.demo.redhat.com -user=admin -interactive loaded template kr5.conf file setting default_tkt_enctypes setting realms setting domain realmo success User guid is: 80b71bae-98a1-11e0-8f20-525400866c73 Successfully edited domain directory.demo.redhat.com
Example A.3. Deleting Domains from Configuration
rhevm-manage-domains
command to remove the directory.demo.redhat.com
domain from the Red Hat Enterprise Virtualization Manager configuration. Users defined in the removed domain will no longer be able to authenticate with Red Hat Enterprise Virtualization Manager. The entries for the affected users will remain defined in Red Hat Enterprise Virtualization Manager until they are explicitly removed.
admin
user from the internal
domain will be able to log in until another domain is added.
# rhevm-manage-domains -action=delete -domain='directory.demo.redhat.com' WARNING: Domain directory.demo.redhat.com is the last domain in the configuration. After deleting it you will have to either add another domain, or to use the internal admin user in order to login. Successfully deleted domain directory.demo.redhat.com. Please remove all users and groups of this domain using the Administration portal or the API.
Example A.4. Validating Configuration
rhevm-manage-domains
command to validate the Red Hat Enterprise Virtualization Manager configuration. The command attempts to log into each listed domain with the credentials provided in the configuration. If the attempt is successful then the domain is reported as valid.
# rhevm-manage-domains -action=validate User guid is: 80b71bae-98a1-11e0-8f20-525400866c73 Domain directory.demo.redhat.com is valid.
Example A.5. Listing Domains in Configuration
rhevm-manage-domains
command to list the domains defined in the Red Hat Enterprise Virtualization Manager configuration. For each configuration entry the command displays the domain, the username — in User Principle Name (UPN) format, and whether the domain is local or remote.
# rhevm-manage-domains -action=list Domain: directory.demo.redhat.com User name: admin@DIRECTORY.DEMO.REDHAT.COM This domain is a remote domain.
rhevm-config
.
- list all available configuration keys,
- list all available configuration values,
- get the value of a specific configuration key, and
- set the value of a specific configuration key.
--cver
parameter is used to specify which configuration version is to be used. The default configuration version is general
.
rhevm-config
command's help output:
# rhevm-config --help
Common Tasks
- List Available Configuration Keys
- Use the
--list
parameter to list available configuration keys.#
rhevm-config
--list
The tool lists each available configuration key by name. It also returns a description of each key's purpose. - List Available Configuration Values
- Use the
--all
parameter to list available configuration values.#
rhevm-config
--all
The tool lists each available configuration key by name as well as the current value of the key, and the configuration version. - Get Value of Configuration Key
- Use the
--get
parameter to get the value of a specific key.#
rhevm-config
--get
KEY_NAME
ReplaceKEY_NAME
with the name of the key to retrieve. The tool returns the key name, value, and the configuration version. Optionally the--cver
parameter is used to specify the configuration version from which the value should be retrieved. - Set Value of Configuration Key
- Use the
--set
parameter to set the value of a specific key. You must also set the configuration version to which the change is to apply using the--cver
parameter.#
rhevm-config
--set
KEY_NAME
=KEY_VALUE
--cver=
VERSION
ReplaceKEY_NAME
with the name of the key to set, and replaceKEY_VALUE
with the value to assign to it. In an environment with more than one configuration version you must also take care to replaceVERSION
with the name of the configuration version in use.
rhevm-log-collector
. You must be logged in as the root
user to run it successfully. You must provide the administration credentials for the Red Hat Enterprise Virtualization environment on the command line. Full usage information, including a list of all valid options for the command, is available by running the rhevm-log-collector -h
command.
Usage:rhevm-log-collector
[options]
list
[all, clusters, datacenters]
rhevm-log-collector
[options]
collect
list
, and collect
.
- The
list
parameter lists either the hosts, clusters, or data centers attached to the Red Hat Enterprise Virtualization Manager. You are then able to filter log collection based on the listed objects. - The
collect
parameter performs log collection from the Red Hat Virtualization Manager. The collected logs are placed in an archive file under the/tmp/logcollector
directory. Therhevm-log-collector
command outputs the specific filename that it chose to use when log collection is completed.
rhevm-log-collector
command has a large number of options. You can use these options to further refine the scope of log collection.
General Options
--version
- Displays the version number of the command in use, and exits immediately.
-h
,--help
- Displays command usage information, and exits immediately.
--conf-file=
PATH
- Sets
PATH
as the configuration file the tool is to use. --local-tmp=
PATH
- Sets
PATH
as the directory to which retrieved logs are to be saved. Default is/tmp/logcollector
. --ticket-number=
TICKET
- Sets
TICKET
as the ticket, or case number, to associate with the SOS report. --upload=
FTP_SERVER
- Sets
FTP_SERVER
as the destination for retrieved logs to be sent using FTP. Do not use this option unless advised to by a Red Hat support representative. --quiet
- Sets quiet mode, reducing console output to a minimum. This is off by default.
--log-file=
PATH
- Sets
PATH
as the log file the command should use for its own log output. Note that this is not to be confused with the--local-tmp
parameter. -v
,--verbose
- Sets verbose mode, providing more console output. This is off by default.
Red Hat Enterprise Virtualization Manager Options
A
and B
where the name of the host matches pattern SalesHost*
.
--no-hypervisors
- Sets the option to skip collection of logs from the virtualization hosts.
-u
,USER
--user=
USER
- Sets the username to log in as to
USER
. This must be a username that exists in directory services, and is known to the Red Hat Enterprise Virtualization Manager. The user must be specified in the formatuser
@domain
, whereuser
is replaced by the username, anddomain
is replaced by the directory services domain in use. -r
,FQDN
--rhevm=
FQDN
- Sets the Red Hat Enterprise Virtualization Manager to connect to as
FQDN
.FQDN
must be replaced by the fully qualified domain name of the manager. By default it is assumed that the log collector is being run on the same machine as the manager. Therefore the default value for this parameter islocalhost
. -c
,CLUSTER
--cluster
CLUSTER
- Collect all logs from the Red Hat Enterprise Virtualization Manager, as well as virtualization hosts in the cluster named
CLUSTER
. The cluster(s) for inclusion must be specified in a comma separated list of cluster names or match patterns. -d
,DATACENTER
--data-center
DATACENTER
- Collect all logs from the Red Hat Enterprise Virtualization Manager, as well as virtualization hosts in the data center named
DATACENTER
. The data center(s) for inclusion must be specified as a comma separated list of data center names or match patterns. -H
,HOSTS_LIST
--hosts=
HOSTS_LIST
- Collect all logs from the Red Hat Enterprise Virtualization Manager, as well as virtualization hosts included in
HOSTS_LIST
. The hosts for inclusion must be specified as a comma separated list of hostnames, fully qualified domain names, or IP addresses. Match patterns for each type of value are also valid.
SOS Report Options
--java-home
, --jboss-user
, and jboss-pass
parameters must also be provided.
--jboss-home=
JBOSS_HOME
- JBoss installation directory path. Default is
/var/lib/jbossas
. --java-home=
JAVA_HOME
- Java installation directory path. Default is
/usr/lib/jvm/java
. --jboss-profile=
JBOSS_PROFILE
- Quoted and space separated list of server profiles. This is used to limit log collection to the specified profiles. The default is
'rhevm-slimmed'
. --enable-jmx
- Enable the collection of run-time metrics from Red Hat Enterprise Virtualization's JBoss JMX interface.
--jboss-user=
JBOSS_USER
- JBoss JMX invoker user to be used with twiddle. Default is
admin
. --jboss-logsize=
LOG_SIZE
- Maximum size for each log file retrieved, in MB.
--jboss-stdjar=
STATE
- Sets collection of JAR statistics for JBoss standard JARs. Replace
STATE
withon
, oroff
. The default ison
. --jboss-servjar=
STATE
- Sets collection of JAR statistics from any server configuration directories. Replace
STATE
withon
, oroff
. The default ison
. --jboss-twiddle=
STATE
- Sets collection of twiddle data on, or off. Twiddle is the JBoss tool used to collect data from the JMX invoker. Replace
STATE
withon
, oroff
. The default ison
. --jboss-appxml=
XML_LIST
- Quoted and space separated list of applications whose XML descriptions should be retrieved. Default is
'all'
.
SSH Configuration
--ssh-host=
PORT
- Sets
PORT
as the port to use for SSH connections with virtualization hosts. -k
,KEYFILE
--key-file=
KEYFILE
- Sets
KEYFILE
as the public SSH key to be used for accessing the virtualization hosts. --max-connections=
MAX_CONNECTIONS
- Sets
MAX_CONNECTIONS
as the maximum concurrent SSH connections for logs from virtualization hosts. The default is10
.
PostgreSQL Database Options
pg-pass
is specified. The database username, and database name also must be specified if they were changed from the default values during installation.
pg-dbhost
, and optionally supply a pg-host-key
, to collect remote logs. The PostgreSQL SOS plugin must be installed on the database server for remote log collection to be successful.
--no-postgresql
- Disables collection of database. Database collection is performed by default.
--pg-user=
USER
- Sets
USER
as the username to use for connections with the database server. The default ispostgres
. --pg-dbname=
DBNAME
- Sets
DBNAME
as the database name to use for connections with the database server. The default isrhevm
. --pg-dbhost=
DBHOST
- Sets
DBHOST
as the hostname for the database server. The default islocalhost
. --pg-host-key=
KEYFILE
- Sets
KEYFILE
as the public identity file (private key) for the database server. This value is not set by default as it is not required where the database exists on the local host.
Example A.8. Basic Log Collector Usage
#rhevm-log-collector
Please provide the username for rhevm (CTRL+D to abort): admin@directory.demo.redhat.com Please provide the password for rhevm (CTRL+D to abort): Host list (datacenter=None, cluster=None, host=None): Data Center | Cluster | Hostname/IP Address SalesDataCenter | SalesCluster | 192.168.122.250 EngineeringDataCenter | EngineeringCluster | 192.168.122.251 FinanceDataCenter | FinanceCluster | 192.168.122.252 #rhevm-log-collector collect
Please provide the username for rhevm (CTRL+D to abort): admin@directory.demo.redhat.com Please provide the password for rhevm (CTRL+D to abort): About to collect information from 3 hypervisors. Continue? (Y/n): Y INFO: Gathering information from selected hypervisors... INFO: collecting information from 192.168.122.250 INFO: collecting information from 192.168.122.251 INFO: collecting information from 192.168.122.252 INFO: finished collecting information from 192.168.122.250 INFO: finished collecting information from 192.168.122.251 INFO: finished collecting information from 192.168.122.252 Please provide the password to dump the PostgreSQL database (CTRL+D to abort): INFO: Gathering PostgreSQL the RHEV-M database and log files from localhost... INFO: Gathering RHEV-M information... Please provide the password for jboss (CTRL+D to abort): INFO: Log files have been collected and placed in /tmp/logcollector/sosreport-rhn-account-20110804121320-ce2a.tar.xz. The MD5 for this file is 6d741b78925998caff29020df2b2ce2a and its size is 26.7M
- Client
- Red Hat Enterprise Linux 6.0 and higher
- Red Hat Enterprise Linux 5.5 and higher
- Windows XP
- Windows 7
- Windows 2008
- Guest
- Windows XP
- Windows 7
usbfilter.txt
. The policy rules defined in this file allow, or deny, the passthrough of specific USB devices from client machines to virtual machines managed using Red Hat Enterprise Virtualization Manager. Once configured the policy file resides on the Red Hat Enterprise Virtualization Manager in the following location:
/usr/share/rhevm/rhevm.ear/userportal.war/org.ovirt.engine.ui.userportal.UserPortal/consoles/spice/usbfilter.txt
jbossas
service on the Red Hat Enterprise Virtualization Manager server is restarted. To obtain the USB Filter Editor, download the USBFilterEditor.msi
file from Red Hat Network, under the Red Hat Enterprise Virtualization Manager (v.3 x86_64)
channel.
To install the USB Filter Editor
- On a Windows machine, launch the
USBFilterEditor.msi
installer that was obtained from Red Hat Network. - You will be guided through a series of steps to install the USB Filter Editor on your machine. If you do not specify an alternative location, the USB Filter Editor will be installed by default in either
C:\Program Files\RedHat\USB Filter Editor
, orC:\Program Files(x86)\RedHat\USB Filter Editor
depending on the version of Windows in use. - When the installation completes, a shortcut icon is created on your desktop. This is how you launch the USB Filter Editor.
Important — Secure Copy Utility
- For each USB device, the Class, Vendor, Product, Revision and Action displays. The permitted devices display with an Allow action, the blocked devices display with a Block action.
- You can Block for any devices. This ensures that all devices that are not explicitly allowed in the policy are blocked.to, and from, the list of devices that the policy allows virtual machines access to. The USB device policy rules are processed in the order in which they are listed. The and buttons enable you to move devices higher or lower in the list. The last rule in the list must always be the rule with actionThebutton allows you to create policy rules based on the devices attached to the system the USB Filter Editor is being run on. Additionally the , and buttons allow you to move USB device policy files to and from the Red Hat Enterprise Virtualization Manager.
Table A.1. USB Editor Fields
Name | Description |
---|---|
Class | Type of USB device; for example, printers, mass storage controllers. |
Vendor | The manufacturer of the selected type of device. |
Product | The specific USB device model. |
Revision | The revision of the product. |
Action | Allow or block the specified device. |
To add a new policy, on the Red Hat USB Editor:
- Click the Edit USB Criteria dialog displays:button. The
- Add any combination of USB devices, products, and vendors using the USB Class, Vendor ID, Product ID, and Revision check boxes and lists.To allow virtual machines to use the specified USB device, click the OK to exit the dialog box. This action adds the selected filter rule to the list.button. Or, to block virtual machines from using the specified USB device, click the button. Click
Example A.9. Adding a Device
The following is an example of how to add USB ClassSmartcard
, deviceEP-1427X-2 Ethernet Adaptor
, from manufacturerAcer Communications & Multimedia
to the list of allowed devices. - Click theentry in the menu to save the changes.
- For USB filter policy changes to take effect they must also be exported to the Red Hat Enterprise Virtualization Manager, see Section A.4.2, “Export a USB Policy”.
To remove a policy, on the Red Hat USB Editor:
- Click thebutton. A message displays prompting you to confirm that you want to remove the policy.
- Click thebutton to confirm that you want to remove the policy.
- Click theentry in the menu to save the changes.
- For USB filter policy changes to take effect they must also be exported to the Red Hat Enterprise Virtualization Manager, see Section A.4.2, “Export a USB Policy”.
- Double click the USB Filter Editor icon on your desktop. The Red Hat USB Filter Editor displays the current USB policies.
- button. The
- Select the device and click theor button as appropriate. Double click the selected device to close the dialog box. A policy rule for the device is added to the list.
- Use the Up and Down buttons to change the position the new policy rule in the list.
- Click theentry in the menu to save the changes.
- For USB filter policy changes to take effect they must also be exported to the Red Hat Enterprise Virtualization Manager, see Section A.4.2, “Export a USB Policy”.
jbossas
service must be restarted.
- Double click the USB Filter Editor icon on your desktop. The Red Hat USB Filter Editor displays the current USB policies.
- Click thebutton. The dialog displays.
- Save the file with a filename of
usbfilter.txt
. - Using a Secure Copy client, such as WinSCP, upload the
usbfilter.txt
file to the server running Red Hat Enterprise Virtualization Manager. The file must be placed in the following directory on the server:/usr/share/rhevm/rhevm.ear/userportal.war/org.ovirt.engine.ui.userportal.UserPortal/consoles/spice/
- As the
root
user on the server running Red Hat Enterprise Virtualization Manager restart thejbossas
service.# service jbossas restart
- Using a Secure Copy client, such as WinSCP, download the
usbfilter.txt
file from the server running Red Hat Enterprise Virtualization Manager. The file exists in the following directory on the server:/usr/share/rhevm/rhevm.ear/userportal.war/org.ovirt.engine.ui.userportal.UserPortal/consoles/spice/
- Double click the USB Filter Editor icon on your desktop. The Red Hat USB Filter Editor displays.
- Click thebutton. The dialog displays
- Open the
usbfilter.txt
file that was downloaded from the server. The USB device policy will be presented in the USB Filter Editor for editing.
Note
Procedure B.1. How to install the qxl drivers
- Log in to the Red Hat Enterprise Linux Virtual Machine.
- Open a terminal.
- Run
#
yum install xorg-x11-drv-qxl
This installs the qxl drivers. They must now be configured.
How to configure the qxl drivers
Procedure B.4. Configuring the tablet and mouse to use SPICE
- Verify that the tablet device is available on your guest:
#
If there is no output from the command, do not continue configuring the tablet./sbin/lsusb -v | grep 'QEMU USB Tablet'
- Back up
/etc/X11/xorg.conf
by running this command:#
cp /etc/X11/xorg.conf /etc/X11/xorg.conf.$$.backup
- Make the following changes to /etc/X11/xorg.conf:
Section "ServerLayout" Identifier "single head configuration" Screen 0 "Screen0" 0 0 InputDevice "Keyboard0" "CoreKeyboard" InputDevice "Tablet" "SendCoreEvents" InputDevice "Mouse" "CorePointer" EndSection Section "InputDevice" Identifier "Mouse" Driver "void" #Option "Device" "/dev/input/mice" #Option "Emulate3Buttons" "yes" EndSection Section "InputDevice" Identifier "Tablet" Driver "evdev" Option "Device" "/dev/input/event2" Option "CorePointer" "true" EndSection
- Log out and log back into the virtual machine to restart X-Windows.
admin@internal
user account is automatically created when you installed and configured Red Hat Enterprise Virtualization Manager. This account is stored locally in Red Hat Enterprise Virtualization Manager's PostgreSQL database, and exists separately from other directory services. Unlike the IPA or Active Directory domains, users cannot be added or deleted from the internal
domain. The admin@internal
user is the SuperUser of the Red Hat Enterprise Virtualization Manager, and has administrative privileges over the environment via the Administration Portal.
admin@internal
user. However, if you have forgotten the password, or choose to reset the password, you can use the rhevm-config utility.
Procedure C.1. To reset the password for the admin@internal user
- Log in to the Red Hat Enterprise Virtualization Manager server as the
root
user. - Use the rhevm-config utility to set a new password for the
admin@internal
user. Run the following command:# rhevm-config -s AdminPassword=<your_password>
You do not need to use quotes, but use escape shell characters if you include them in the password. - Restart the JBoss service for the changes to take effect.
# service jbossas restart
Note
delete_date
does not appear in latest views because these views provide the latest configuration of living entities, which, by definition, have not been deleted.
Table D.1. v3_0_datacenter_configuration_view\v3_0_latest_datacenter_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
datacenter_id | uuid | The unique ID of the data center in the system. |
datacenter_name | varchar(40) | Name of the data center, as displayed in the edit dialog. |
datacenter_description | varchar(4000) | Description of the data center, as displayed in the edit dialog. |
storage_type | smallint |
|
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.2. v3_0_datacenter_storage_domain_map_view\v3_0_latest_datacenter_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
storage_domain_id | uuid | The unique ID of this storage domain in the system. |
datacenter_id | uuid | The unique ID of the data center in the system. |
attach_date | timestamp with time zone | The date the storage domain was attached to the data center. |
detach_date | timestamp with time zone | The date the storage domain was detached from the data center. |
Table D.3. v3_0_storage_domain_configuration_view\v3_0_latest_storage_domain_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
storage_domain_id | uuid | The unique ID of this storage domain in the system. |
storage_domain_name | varchar(250) | Storage domain name. |
storage_domain_type | smallint |
|
storage_type | smallint |
|
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.4. v3_0_cluster_configuration_view\v3_0_latest_cluster_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
cluster_id | uuid | The unique identifier of the datacenter this cluster resides in. |
cluster_name | varchar(40) | Name of the cluster, as displayed in the edit dialog. |
cluster_description | varchar(4000) | As defined in the edit dialog. |
datacenter_id | uuid | The unique identifier of the datacenter this cluster resides in. |
cpu_name | varchar(255) | As displayed in the edit dialog. |
compatibility_version | varchar(40) | As displayed in the edit dialog. |
datacenter_configuration_version | integer | The data center configuration version at the time of creation or update. |
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.5. v3_0_host_configuration_view\v3_0_latest_host_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
host_id | uuid | The unique ID of the host in the system. |
host_unique_id | varchar(128) | This field is a combination of the host physical UUID and one of its MAC addresses, and is used to detect hosts already registered in the system. |
host_name | varchar(255) | Name of the host (same as in the edit dialog). |
cluster_id | uuid | The unique ID of the cluster that this host belongs to. |
host_type | smallint |
|
fqn_or_ip | varchar(255) | The host's DNS name or its IP address for Red Hat Enterprise Virtualization Manager to communicate with (as displayed in the edit dialog). |
memory_size_mb | integer | The host's physical memory capacity, expressed in megabytes (MB). |
swap_size_mb | integer | The host swap partition size. |
cpu_model | varchar(255) | The host's CPU model. |
number_of_cores | smallint | Total number of CPU cores in the host. |
host_os | varchar(255) | The host's operating system version. |
pm_ip_address | varchar(255) | Power Management server IP address. |
kernel_version | varchar(255) | The host's kernel version. |
kvm_version | varchar(255) | The host's KVM version. |
vdsm_version | varchar(40) | The host's VDSM version. |
vdsm_port | integer | As displayed in the edit dialog. |
cluster_configuration_version | integer | The cluster configuration version at the time of creation or update. |
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.6. v3_0_host_configuration_view\v3_0_latest_host_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
host_interface_id | uuid | The unique ID of this interface in the system. |
host_interface_name | varchar(50) | The interface name as reported by the host. |
host_id | uuid | Unique ID of the host this interface belongs to. |
host_interface_type | smallint |
|
host_interface_speed_bps | integer | The interface speed in bits per second. |
mac_address | varchar(20) | The interface MAC address. |
network_name | varchar(50) | The logical network associated with the interface. |
ip_address | varchar(50) | As displayed in the edit dialog. |
gateway | varchar(20) | As displayed in the edit dialog. |
bond | Boolean | A flag to indicate if this interface is a bonded interface. |
bond_name | varchar(50) | The name of the bond this interface is part of (if it is part of a bond). |
vlan_id | integer | As displayed in the edit dialog. |
host_configuration_version | integer | The host configuration version at the time of creation or update. |
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.7. v3_0_vm_configuration_view\v3_0_latest_vm_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
vm_id | uuid | The unique ID of this VM in the system. |
vm_name | varchar(255) | The name of the VM. |
vm_description | varchar(4000) | As displayed in the edit dialog. |
vm_type | smallint |
|
cluster_id | uuid | The unique ID of the cluster this VM belongs to. |
template_id | uuid | The unique ID of the template this VM is derived from. The field is for future use, as the templates are not synchronized to the history database in this version. |
template_name | varchar(40) | Name of the template from which this VM is derived. |
cpu_per_socket | smallint | Virtual CPUs per socket. |
number_of_sockets | smallint | Total number of virtual CPU sockets. |
memory_size_mb | integer | Total memory allocated to the VM, expressed in megabytes (MB). |
operating_system | smallint |
|
ad_domain | varchar(40) | As displayed in the edit dialog. |
default_host | uuid | As displayed in the edit dialog, the ID of the default host in the system. |
high_availability | Boolean | As displayed in the edit dialog. |
initialized | Boolean | A flag to indicate if this VM was started at least once for Sysprep initialization purposes. |
stateless | Boolean | As displayed in the edit dialog. |
fail_back | Boolean | As displayed in the edit dialog. |
auto_suspend | Boolean | As displayed in the edit dialog. |
usb_policy | smallint | As displayed in the edit dialog. |
time_zone | varchar(40) | As displayed in the edit dialog. |
cluster_configuration_version | integer | The cluster configuration version at the time of creation or update. |
default_host_configuration_version | integer | The host configuration version at the time of creation or update. |
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.8. v3_0_vm_configuration_view\latest_vm_interface_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
vm_interface_id | uuid | The unique ID of this interface in the system. |
vm_interface_name | varchar(50) | As displayed in the edit dialog. |
vm_id | uuid | The ID of the virtual machine this interface belongs to. |
vm_interface_type | smallint |
The type of the virtual interface.
|
vm_interface_speed_bps | integer | The average speed of the interface during the aggregation in bits per second. |
mac_address | varchar(20) | As displayed in the edit dialog. |
network_name | varchar(50) | As displayed in the edit dialog. |
vm_configuration_version | integer | The virtual machine configuration version at the time of creation or update. |
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.9. v3_0_disks_vm_map_view\v3_0_latest_disks_vm_map_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
vm_disk_id | uuid | The unique ID of this virtual disk in the system. |
vm_id | uuid | The unique ID of the virtual machine in the system. |
attach_date | timestamp with time zone | The date the virtual disk was attached to the virtual machine. |
detach_date | timestamp with time zone | The date the virtual disk was detached from the virtual machine. |
Table D.10. v3_0_vm_disk_configuration_view\v3_0_latest_vm_disk_configuration_view
Name | Type | Description |
---|---|---|
history_id | integer | The ID of the configuration version in the history database. |
vm_disk_id | uuid | The unique ID of this disk in the system. |
storage_domain_id | uuid | The ID of the storage domain this disk image belongs to. |
vm_internal_drive_mapping | varchar | The virtual machine internal drive mapping. |
vm_disk_description | varchar(4000) | As displayed in the edit dialog. |
vm_disk_space_size_mb | integer | The defined size of the disk in megabytes (MB). |
disk_type | integer |
As displayed in the edit dialog. Only System and data are currently used.
|
vm_disk_format | integer |
As displayed in the edit dialog.
|
vm_disk_interface | integer |
|
create_date | timestamp with time zone | The date this entity was added to the system. |
update_date | timestamp with time zone | The date this entity was changed in the system. |
delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table D.11. v3_0_datacenter_samples_history_view\v3_0_datacenter_hourly_history_view\v3_0_datacenter_daily_history_view
Name | Type | Description |
---|---|---|
history_id | integer | The unique ID of this row in the table. |
history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
datacenter_id | uuid | The unique ID of the data center. |
datacenter_status | smallint |
|
minutes_in_status | decimal | The total number of minutes that the data center was in the status shown in the datacenter_status column for the aggregation period. For example, if a data center was up for 55 minutes and in maintenance mode for 5 minutes during an hour, two rows will show for this hour. One will have a datacenter_status of Up and minutes_in_status of 55, the other will have a datacenter_status of Maintenance and a minutes_in_status of 5. |
datacenter_configuration_version | integer | The data center configuration version at the time of sample. |
Table D.12. Storage domain hourly history, daily history, and samples history view
Name | Type | Description |
---|---|---|
history_id | integer | The unique ID of this row in the table. |
history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
storage_domain_id | uuid | Unique ID of the storage domain in the system. |
available_disk_size_gb | integer | The total available (unused) capacity on the disk, expressed in gigabytes (GB). |
used_disk_size_gb | integer | The total used capacity on the disk, expressed in gigabytes (GB). |
storage_configuration_version | integer | The storage domain configuration version at the time of sample. |
Table D.13. v3_0_host_samples_history_view\v3_0_host_hourly_history_view\v3_0_host_daily_history_view
Name | Type | Description |
---|---|---|
history_id | integer | The unique ID of this row in the table. |
history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
host_id | uuid | Unique ID of the host in the system. |
host_status | smallint |
|
minutes_in_status | decimal | The total number of minutes that the host was in the status shown in the |