Red Hat Enterprise Virtualization 3.0

Administration Guide

System Administration of Red Hat Enterprise Virtualization Environments using the Administration Portal

Edition 2

Logo

Red Hat Documentation Team

Red Hat Engineering Services and Operations

Kate Grainger

Red Hat Engineering Content Services

Cheryn Tan

Red Hat Engineering Content Services

Tim Hildred

Red Hat Engineering Content Services

Stephen Gordon

Red Hat Engineering Content Services

Zac Dover

Red Hat Engineering Content Services

Daniel Macpherson

Red Hat Engineering Content Services

Shikha Nansi

Red Hat Engineering Content Services

Susan Burgess

Red Hat Engineering Content Services

David Jorm

Red Hat Engineering Content Services

Legal Notice

Copyright © 2011 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.

Abstract

Red Hat Enterprise Virtualization 3.0 Administration Guide
1. About this Guide
1.1. Documentation Suite
1.2. Audience
2. Document Conventions
2.1. Typographic Conventions
2.2. Pull-quote Conventions
2.3. Notes and Warnings
3. We Need Feedback!
Introduction
1. Red Hat Enterprise Virtualization Architecture
1.1. System Components
2. Red Hat Enterprise Virtualization Resources
3. Administration of the Red Hat Enterprise Virtualization Platform
3.1. Maintaining the Red Hat Enterprise Virtualization Platform
I. The Red Hat Enterprise Virtualization Interface
1. Getting Started
1.1. Graphical User Interface
1.1.1. Tree Mode and Flat Mode
1.1.2. Using the Guide Me facility
1.2. Search
1.2.1. Search Syntax
1.2.2. Saving and Accessing Queries as Bookmarks
1.3. Tags
II. Managing System Components
2. Managing Data Centers
2.1. Data Centers
2.1.1. Data Center Properties
2.1.2. Data Centers Operations
2.1.3. Data Centers Related Entities
2.1.4. Data Centers Troubleshooting
2.1.5. System Permissions
2.2. Clusters
2.2.1. Cluster Properties
2.2.2. Cluster Operations
2.2.3. Cluster Related Entities
2.2.4. Cluster Troubleshooting
2.2.5. Cluster Permissions
2.3. Logical Networks
2.3.1. Logical Networks Properties
2.3.2. Logical Network Operations
2.3.3. Logical Networks Troubleshooting
2.3.4. Logical Networks System Permissions
3. Storage
3.1. Managing Storage
3.1.1. Storage Properties
3.1.2. Storage Operations
3.1.3. Storage Entities
3.1.4. Storage Permissions
3.1.5. Storage Troubleshooting
4. Red Hat Enterprise Virtualization Hosts
4.1. Managing Hosts
4.1.1. Hosts Properties
4.1.2. Host Operations
4.1.3. Hosts Entities
4.1.4. Host Troubleshooting
4.1.5. Hosts Permissions
5. Users
5.1. Authorization Model
5.2. User Properties
5.2.1. Roles
5.2.2. Permissions
5.3. Users Operations
5.3.1. Adding Users and Groups
5.4. Users Troubleshooting
5.4.1. Managing Event Notifiers
5.4.2. Removing Users
III. Managing Virtualization Infrastructure
6. Managing Virtual Resources
6.1. About Virtual Machines
6.1.1. Supported Virtual Machines
6.1.2. Virtual Machine Performance Parameters
6.1.3. Understanding Virtual Machine Storage
6.2. Creating New Virtual Machines
6.2.1. Creating Virtual Machines from Existing Templates
6.2.2. Creating New Virtual Machines without a Template
6.2.3. Cloning Virtual Machines from Existing Templates
6.3. Completing the Configuration of the Virtual Machine
6.4. Installing Operating Systems onto Blank Virtual Machines
6.5. Managing Permissions to Virtual Machines
6.5.1. Assigning Virtual Machines to Users
6.5.2. Assigning System Permissions to Virtual Machines
6.6. Logging in to Virtual Machines
6.6.1. Logging into Virtual Machines using SPICE
6.6.2. Logging in to Windows Virtual Machines with Remote Desktop (RDP)
6.6.3. Logging in to Virtual Machines with VNC
6.6.4. Console Window Menu Extension for Administrators
6.7. Managing Virtual Machines
6.7.1. Editing Virtual Machines
6.7.2. Powering Virtual Machines On
6.7.3. Shutting Down or Pausing Virtual Machines
6.7.4. Migrating Virtual Machines
6.7.5. Moving Virtual Machines within a Data Center
6.7.6. Removing Virtual Machines
6.8. Using Virtual Machine Snapshots
6.8.1. Creating Snapshots of Virtual Machines
6.8.2. Restoring Virtual Machines from Snapshots
6.8.3. Deleting Snapshots
6.9. Exporting and Importing Virtual Resources
6.9.1. Overview of the Export-Import Process
6.9.2. Exporting Virtual Machines
6.9.3. Importing Virtual Machines into the Destination Data Center
6.10. Backing Up Virtual Resources
7. Templates
7.1. Creating Templates from Existing Virtual Machines
7.1.1. Sealing a Windows Template with Sysprep
7.1.2. Sealing a Linux Template
7.2. Managing Templates
7.2.1. Editing Templates
7.2.2. Copying Templates to a Different Storage Domain
7.2.3. Deleting Templates
7.3. Exporting and Importing Templates
7.3.1. Exporting Templates
7.3.2. Importing Templates
7.3.3. Backing Up Templates
7.4. Managing Permissions to Templates
7.4.1. Assigning Templates to Users
7.4.2. Assigning System Permissions for Templates Usage
8. Pools
8.1. Creating Desktop Pools
8.2. Managing Desktop Pools
8.2.1. Assigning Users to a Desktop Pool
8.2.2. Editing Desktop Pools
8.2.3. Detaching Desktops from a Pool
8.3. Managing Permissions to Pools
8.4. Removing Desktop Pools
IV. Monitoring and Reporting
9. Monitoring Red Hat Enterprise Virtualization
9.1. Using the Monitoring Tools
9.1.1. Monitoring Storage
9.1.2. Monitoring Hosts
9.1.3. Monitoring Virtual Machines
9.1.4. Monitoring High Severity Events
9.1.5. Viewing the Event List
9.1.6. Viewing Alert Information
10. Red Hat Enterprise Virtualization Reports
10.1. Overview
10.1.1. JasperReports & JasperServer
10.1.2. Online Help
10.1.3. Red Hat Enterprise Virtualization History Database
10.2. System Requirements
10.3. Accessing Reports and Dashboards
10.3.1. Logging in
10.3.2. Navigating Reports
10.3.3. Managing Users
10.4. Running Reports
10.4.1. Report Parameters
10.4.2. Executive Reports
10.4.3. Inventory Reports
10.4.4. Service Level Reports
10.4.5. Trend Reports
10.5. Dashboards
10.5.1. Data Center Inventory Dashboard
10.5.2. Data Center Trends Dashboard
10.5.3. Data Center Uptime Dashboard
10.5.4. System Overview Dashboard
10.6. Ad Hoc Reports
11. History Database Reports
11.1. Overview
11.1.1. Tracking Configuration History
11.1.2. Recording Statistical History
11.1.3. Tracking Tag History
11.2. Connecting to the History Database
11.3. Example Reports
11.3.1. Resource Utilization on a Single Host
11.3.2. Resource Utilization Across All Hosts
11.3.3. Tag Filter of Latest VM Configuration
11.3.4. List Current Virtual Machines' Names, Types, and Operating Systems
V. Managing Advanced Functionality
12. Live Migration
12.1. What is Live Migration?
12.2. Live Migration Prerequisites
12.3. Automatic Virtual Machine Migration
12.3.1. Moving a Host to Maintenance Mode
12.3.2. Cluster Policy
12.3.3. Preventing Automatic Migration of a Virtual Machine
12.4. Manually Migrating Virtual Machines
12.5. Setting Migration Priority
13. High Availability
13.1. What is High Availability?
13.1.1. Why Use High Availability?
13.2. High Availability Considerations
13.3. Host High Availability
13.3.1. Setting the Parameters for Fencing
13.3.2. Using Power Management Functions on a Fenced Host
13.3.3. Manually Fencing or Isolating a Host
13.4. Virtual Machine High Availability
13.4.1. Configuring a Highly Available Virtual Machine
13.4.2. Setting a Cluster Resilience Policy
14. Managing Multilevel Administration
14.1. Configuring Roles
14.1.1. Roles
14.1.2. Creating Custom Roles
14.1.3. Editing Roles
14.1.4. Cloning Roles
14.2. User Roles Examples
14.2.1. Setting Up an End User
14.2.2. Setting Up a Virtual Machine Administrator
14.2.3. Setting Up a Power User
14.3. Authorization Examples
15. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager.
15.1. Backup and Restore the rhevm Postgres Database
15.1.1. Backing up Databases in Red Hat Enterprise Virtualization
15.1.2. Restoring Databases in Red Hat Enterprise Virtualization
15.2. Backing up and Restoring Manager Configuration Files
15.2.1. Red Hat Enterprise Virtualization Manager Configuration Files Requiring Backup
15.2.2. Restoring Red Hat Enterprise Virtualization Manager Configuration Files
16. Extending VDSM with Hooks
16.1. Environment
16.1.1. Domain XML
16.1.2. Custom Properties
16.1.3. Hooking module
16.2. Execution
16.3. Examples
A. Utilities
A.1. Domain Management Tool
A.1.1. Syntax
A.1.2. Examples
A.2. Configuration Tool
A.2.1. Syntax
A.2.2. Examples
A.3. Log Collector
A.3.1. Syntax
A.3.2. Examples
A.4. USB Filter Editor
A.4.1. Updating the USB Device Policy
A.4.2. Export a USB Policy
A.4.3. Import USB Policy
B. Configuring Red Hat Enterprise Linux 5.4 or Higher Virtual Machines to Use SPICE
C. Changing Passwords on the Red Hat Enterprise Virtualization Manager
C.1. Changing Password for the Administrative User
D. Reports Schema
D.1. Configuration History Views
D.1.1. Latest datacenter configuration view
D.1.2. Latest datacenter configuration view
D.1.3. Latest storage domain configuration view
D.1.4. Latest cluster configuration view
D.1.5. Latest host configuration view
D.1.6. Latest host interface configuration view
D.1.7. Latest virtual machine configuration view
D.1.8. Latest virtual machine interface configuration view
D.1.9. Latest disks-to-virtual-machine-map view
D.1.10. Latest virtual machine disk configuration view
D.2. Statistics History Views
D.2.1. Datacenter daily history view
D.2.2. Storage domain daily history view
D.2.3. Host hourly and daily history views
D.2.4. Host interface hourly and daily history views
D.2.5. Virtual machine hourly and daily history views
D.2.6. Virtual machine interface hourly and daily history views
D.2.7. Vitual machine disk hourly and samples history views
D.3. Tag History and ENUM Views
D.3.1. Tag relations and latest tag relations history views
D.3.2. Tag details and latest tag details views
D.3.3. Enum translator view
E. Search Parameters
E.1. Searching for Resources
E.1.1. Searching for Data Centers
E.1.2. Searching for Clusters
E.1.3. Searching for Hosts
E.1.4. Searching for Storage
E.1.5. Searching for Virtual Machines
E.1.6. Searching for Pools
E.1.7. Searching for Templates
E.1.8. Searching for Users
E.1.9. Searching for Events
F. SAP Monitoring
G. KVM Virtual Machine Timing Management
H. Additional References
I. Revision History