Administrating Red Hat Enterprise Virtualization Environments.
Edition 1
Legal Notice
Abstract
- Preface
- 1. Using this Guide
- 2. Basics
- I. Administering the Resources
- 3. Data Centers
- 4. Clusters
- 5. Logical Networks
- 6. Hosts
- 7. Storage
- 7.1. Introduction to Storage in Red Hat Enterprise Virtualization
- 7.2. Understanding Storage Domains
- 7.3. Storage Metadata Versions in Red Hat Enterprise Virtualization
- 7.4. Preparing and Adding File-based Storage
- 7.5. Adding POSIX Compliant File System Storage
- 7.6. Adding Block-based Storage
- 7.7. Storage Tasks
- 7.8. Red Hat Storage Volumes
- 7.9. Storage and Permissions
- 8. Virtual Machines
- 8.1. Introduction to Virtual Machines
- 8.2. Supported Virtual Machine Operating Systems
- 8.3. Virtual Machine Performance Parameters
- 8.4. Creating Virtual Machines
- 8.5. Using Virtual Machines
- 8.6. Shutting Down or Pausing Virtual Machines
- 8.7. Managing Virtual Machines
- 8.8. Virtual Machines and Permissions
- 8.9. Backing Up and Restoring Virtual Machines with Snapshots
- 8.10. Importing and Exporting Virtual Machines
- 8.11. Migrating Virtual Machines Between Hosts
- 8.12. Improving Uptime with Virtual Machine High Availability
- 8.13. Other Virtual Machine Tasks
- 9. Templates
- 10. Pools
- 11. Virtual Machine Disks
- 11.1. Understanding Virtual Machine Storage
- 11.2. Understanding Virtual Disks
- 11.3. Shareable Disks in Red Hat Enterprise Virtualization
- 11.4. Creating Unassociated Virtual Machine Hard Disks
- 11.5. Explanation of Settings in the New Virtual Machine Disk and Edit Virtual Machine Disk Windows
- 11.6. Moving a Virtual Machine Hard Disk Between Data Domains
- 11.7. Virtual Disks and Permissions
- II. Administering the Environment
- 12. Users and Roles
- 13. Quotas
- 13.1. Introduction to Quota
- 13.2. Shared Quota and Individually-defined Quota
- 13.3. Quota Accounting
- 13.4. Enabling and Changing a Quota Mode in a Data Center
- 13.5. Creating a New Quota Policy
- 13.6. Explanation of Quota Threshold Settings
- 13.7. Assigning a Quota to an Object
- 13.8. Using Quota to Limit Resources by User
- 13.9. Editing Quotas
- 13.10. Removing Quotas
- 14. Event Notifications
- 15. Updating the Red Hat Enterprise Virtualization Environment
- 16. Reports, History Database Reports, and Dashboards
- A. Firewalls
- B. VDSM and Hooks
- B.1. VDSM
- B.2. VDSM Hooks
- B.3. Extending VDSM with Hooks
- B.4. Supported VDSM Events
- B.5. The VDSM Hook Environment
- B.6. The VDSM Hook Domain XML Object
- B.7. Defining Virtual Machine Custom Properties
- B.8. Setting Virtual Machine Custom Properties
- B.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook
- B.10. Using the VDSM Hooking Module
- B.11. VDSM Hook Execution
- B.12. VDSM Hook Return Codes
- B.13. VDSM Hook Examples
- C. Utilities
- C.1. Managing Domains with the Domain Management Tool
- C.2. Editing the Configuration of the Red Hat Virtualization Manager with the Configuration Tool
- C.3. Uploading Virtual Machine Images with the Image Uploader Tool
- C.4. Editing USB Filters with the USB Filter Editor
- C.5. Collecting Logs with the Log Collector Tool
- C.6. Uploading ISO Files with the ISO Uploader Tool
- C.7. Guest Drivers and Agents
- D. Backups
- E. Using Search, Bookmarks, and Tags to Find Your Way Around
- F. Revision History
Mono-spaced Bold
To see the contents of the filemy_next_bestselling_novelin your current working directory, enter thecat my_next_bestselling_novelcommand at the shell prompt and press Enter to execute the command.
Press Enter to execute the command.Press Ctrl+Alt+F2 to switch to a virtual terminal.
mono-spaced bold. For example:
File-related classes includefilesystemfor file systems,filefor files, anddirfor directories. Each class has its own associated set of permissions.
Choose → → from the main menu bar to launch Mouse Preferences. In the Buttons tab, select the Left-handed mouse check box and click to switch the primary mouse button from the left to the right (making the mouse suitable for use in the left hand).To insert a special character into a gedit file, choose → → from the main menu bar. Next, choose → from the Character Map menu bar, type the name of the character in the Search field and click . The character you sought will be highlighted in the Character Table. Double-click this highlighted character to place it in the Text to copy field and then click the button. Now switch back to your document and choose → from the gedit menu bar.
Mono-spaced Bold Italic or Proportional Bold Italic
To connect to a remote machine using ssh, typesshat a shell prompt. If the remote machine isusername@domain.nameexample.comand your username on that machine is john, typessh john@example.com.Themount -o remountcommand remounts the named file system. For example, to remount thefile-system/homefile system, the command ismount -o remount /home.To see the version of a currently installed package, use therpm -qcommand. It will return a result as follows:package.package-version-release
Publican is a DocBook publishing system.
mono-spaced roman and presented thus:
books Desktop documentation drafts mss photos stuff svn books_tests Desktop1 downloads images notes scripts svgs
mono-spaced roman but add syntax highlighting as follows:
static int kvm_vm_ioctl_deassign_device(struct kvm *kvm,
struct kvm_assigned_pci_dev *assigned_dev)
{
int r = 0;
struct kvm_assigned_dev_kernel *match;
mutex_lock(&kvm->lock);
match = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head,
assigned_dev->assigned_dev_id);
if (!match) {
printk(KERN_INFO "%s: device hasn't been assigned before, "
"so cannot be deassigned\n", __func__);
r = -EINVAL;
goto out;
}
kvm_deassign_device(kvm, match);
kvm_free_assigned_device(kvm, match);
out:
mutex_unlock(&kvm->lock);
return r;
}Note
Important
Warning
- search or browse through a knowledgebase of technical support articles about Red Hat products.
- submit a support case to Red Hat Global Support Services (GSS).
- access other product documentation.
- at least one data center,
- at least one cluster,
- at least one host,
- at least one data storage domain,
- at least one logical network: the
rhevmmanagement network, - and at least one user: the internal
adminuser.
- Data Centers;
- Clusters;
- Networks;
- Hosts;
- Storage;
- Virtual Machines, Templates, and Pools;
- Users and Roles;
- Quotas;
- Monitoring, Reports, and Dashboards;
- Firewalls;
- VDSM and Hooks;
- Utilities; and
- Backups.
- 2.1.1. Red Hat Enterprise Virtualization Architecture
- 2.1.2. Red Hat Enterprise Virtualization System Components
- 2.1.3. Red Hat Enterprise Virtualization Resources
- 2.1.4. Red Hat Enterprise Virtualization API Support Statement
- 2.1.5. SPICE
- 2.1.6. Administering and Maintaining the Red Hat Enterprise Virtualization Environment
- Virtual machine hosts using the Kernel-based Virtual Machine (KVM).
- Agents and tools running on hosts including VDSM, QEMU, and libvirt. These tools provide local management for virtual machines, networks and storage.
- The Red Hat Enterprise Virtualization Manager; a centralized management platform for the Red Hat Enterprise Virtualization environment. It provides a graphical interface where you can view, provision and manage resources.
- Storage domains to hold virtual resources like virtual machines, templates, ISOs.
- A database to track the state of and changes to the environment.
- Access to an external Directory Server to provide users and authentication.
- Networking to link the environment together. This includes physical network links, and logical networks.
- Data Center - A data center is the highest level container for all physical and logical resources within a managed virtual environment. It is a collection of clusters of virtual machines, storage, and networks.
- Clusters - A cluster is a set of physical hosts that are treated as a resource pool for virtual machines. Hosts in a cluster share the same network infrastructure and storage. They form a migration domain within which virtual machines can be moved from host to host.
- Logical Networks - A logical network is a logical representation of a physical network. Logical networks group network traffic and communication between the Manager, hosts, storage, and virtual machines.
- Hosts - A host is a physical server that runs one or more virtual machines. Hosts are grouped into clusters. Virtual machines can be migrated from one host to another within a cluster.
- Storage Pool - The storage pool is a logical entity that contains a standalone image repository of a certain type, either iSCSI, Fiber Channel, NFS, or POSIX. Each storage pool can contain several domains, for storing virtual machine disk images, ISO images, and for the import and export of virtual machine images.
- Virtual Machines - A virtual machine is a virtual desktop or virtual server containing an operating system and a set of applications. Multiple identical virtual machines can be created in a Pool. Virtual machines are created, managed, or deleted by power users and accessed by users.
- Template - A template is a model virtual machine with pre-defined settings. A virtual machine that is based on a particular template acquires the settings of the template. Using templates is the quickest way of creating a large number of virtual machines in a single step.
- Virtual Machine Pool - A virtual machine pool is a group of identical virtual machines that are available on demand by each group member. Virtual machine pools can be set up for different purposes. For example, one pool can be for the Marketing department, another for Research and Development, and so on.
- Snapshot - A snapshot is a view of a virtual machine's operating system and all its applications at a point in time. It can be used to save the settings of a virtual machine before an upgrade or installing new applications. In case of problems, a snapshot can be used to restore the virtual machine to its original state.
- User Types - Red Hat Enterprise Virtualization supports multiple levels of administrators and users with distinct levels of permissions. System administrators can manage objects of the physical infrastructure, such as data centers, hosts, and storage. Users access virtual machines available from a virtual machine pool or standalone virtual machines made accessible by an administrator.
- Events and Monitors - Alerts, warnings, and other notices about activities help the administrator to monitor the performance and status of resources.
- Reports - A range of reports either from the reports module based on JasperReports, or from the data warehouse. Preconfigured or ad hoc reports can be generated from the reports module. Users can also generate reports using any query tool that supports SQL from a data warehouse that collects monitoring data for hosts, virtual machines, and storage.
Supported Interfaces for Read and Write Access
- Representational State Transfer (REST) API
- The REST API exposed by the Red Hat Enterprise Virtualization Manager is a fully supported interface for interacting with Red Hat Enterprise Virtualization Manager.
- Software Development Kit (SDK)
- The SDK provided by the rhevm-sdk package is a fully supported interface for interacting with Red Hat Enterprise Virtualization Manager.
- Command Line Shell
- The command line shell provided by the rhevm-cli package is a fully supported interface for interacting with the Red Hat Enterprise Virtualization Manager.
- VDSM Hooks
- The creation and use of VDSM hooks to trigger modification of virtual machines based on custom properties specified in the Administration Portal is supported on Red Hat Enterprise Linux virtualization hosts. The use of VDSM Hooks on virtualization hosts running Red Hat Enterprise Virtualization Hypervisor is not currently supported.
Supported Interfaces for Read Access
- Red Hat Enterprise Virtualization Manager History Database
- Read access to the Red Hat Enterprise Virtualization Manager history database using the database views specified in the Administration Guide is supported. Write access is not supported.
- Libvirt on Virtualization Hosts
- Read access to
libvirtusing thevirsh -rcommand is a supported method of interacting with virtualization hosts. Write access is not supported.
Unsupported Interfaces
- The vdsClient Command
- Use of the
vdsClientcommand to interact with virtualization hosts is not supported unless explicitly requested by Red Hat Support. - Red Hat Enterprise Virtualization Hypervisor Console
- Console access to Red Hat Enterprise Virtualization Hypervisor outside of the provided text user interface for configuration is not supported unless explicitly requested by Red Hat Support.
- Red Hat Enterprise Virtualization Manager Database
- Direct access to and manipulation of the Red Hat Enterprise Virtualization Manager database is not supported unless explicitly requested by Red Hat Support.
Important
- video at more than 30 frames per second
- bi-directional audio (for soft-phones/IP phones)
- bi-directional video (for video telephony/video conferencing)
- connection to multiple monitors with a single virtual machine
- USB redirection from the client's USB port into the virtual machine
- Managing physical and virtual resources such as hosts and virtual machines. This includes upgrading and adding hosts, importing domains, converting virtual machines created on foreign hypervisors, and managing virtual machine pools.
- Monitoring the overall system resources for potential problems such as extreme load on one of the hosts, insufficient memory or disk space, and taking any necessary actions (such as migrating virtual machines to other hosts to lessen the load or freeing resources by shutting down machines).
- Responding to the new requirements of virtual machines (for example, upgrading the operating system or allocating more memory).
- Managing customized object properties using tags.
- Managing searches saved as public bookmarks.
- Managing user setup and setting permission levels.
- Troubleshooting for specific users or virtual machines for overall system functionality.
- Generating general and specific reports.
User Interface Elements
Header
The Header bar contains the name of the current logged in user and the button. The button shows version information. The button allows you to configure user roles. The button provides a shortcut to the book you are reading now.
Search Bar
The Search bar allows you to build queries to find the resources that you need. Queries can be as simple as a list of all the hosts in the system, or much more complex. As you type each part of the search query, you are offered choices to assist you in building the search. The star icon can be used to save the search as a bookmark.
Resource Tabs
All resources, such as hosts and clusters, can be managed using the appropriate tab. Additionally, the Events tabs allow you to view events for each resource.The Administration Portal provides the following tabs: Data Centers, Clusters, Hosts, Storage, Disks, Virtual Machines, Pools, Templates, Users, and Events, and a Dashboard tab if you have installed the Data Warehouse and Reporting services.
Results List
Perform a task on an individual item, multiple items, or all the items in the results list, by selecting the item(s) and then clicking the relevant action button. Information on a selected item is displayed in the details pane.
Details Pane
The Details pane shows detailed information about a selected item in the results list. If multiple items are selected, the details pane displays information on the first selected item only.
Tree/Bookmarks/Tags Pane
The Tree pane displays a navigable hierarchy of the resources in the virtualized environment.Bookmarks are used to save frequently used or complicated searches for repeated use. Bookmarks can be added, edited, or removed.Tags are applied to groups of resources and are used to search for all resources associated with that tag.
Alerts/Events Pane
The Alerts tab lists all high severity events such as errors or warnings. The Events tab shows an audit of events for all resources. The Tasks tab lists the current running tasks. You can view this panel by clicking the maximize/ minimize button.
Important
Procedure 2.1. Saving a Query String as a Bookmark
- Enter the desired search query in the search bar and perform the search.
- Click the star-shaped button to the right of the search bar to open the New Bookmark window.
- Enter the Name of the bookmark.
- Edit the Search string field (if applicable).
- Click to save the query as a bookmark and close the window.
- The search query is saved and displays in the Bookmarks pane.
Table of Contents
- 3. Data Centers
- 4. Clusters
- 5. Logical Networks
- 6. Hosts
- 7. Storage
- 7.1. Introduction to Storage in Red Hat Enterprise Virtualization
- 7.2. Understanding Storage Domains
- 7.3. Storage Metadata Versions in Red Hat Enterprise Virtualization
- 7.4. Preparing and Adding File-based Storage
- 7.5. Adding POSIX Compliant File System Storage
- 7.6. Adding Block-based Storage
- 7.7. Storage Tasks
- 7.8. Red Hat Storage Volumes
- 7.9. Storage and Permissions
- 8. Virtual Machines
- 8.1. Introduction to Virtual Machines
- 8.2. Supported Virtual Machine Operating Systems
- 8.3. Virtual Machine Performance Parameters
- 8.4. Creating Virtual Machines
- 8.5. Using Virtual Machines
- 8.6. Shutting Down or Pausing Virtual Machines
- 8.7. Managing Virtual Machines
- 8.8. Virtual Machines and Permissions
- 8.9. Backing Up and Restoring Virtual Machines with Snapshots
- 8.10. Importing and Exporting Virtual Machines
- 8.11. Migrating Virtual Machines Between Hosts
- 8.12. Improving Uptime with Virtual Machine High Availability
- 8.13. Other Virtual Machine Tasks
- 9. Templates
- 10. Pools
- 11. Virtual Machine Disks
- 11.1. Understanding Virtual Machine Storage
- 11.2. Understanding Virtual Disks
- 11.3. Shareable Disks in Red Hat Enterprise Virtualization
- 11.4. Creating Unassociated Virtual Machine Hard Disks
- 11.5. Explanation of Settings in the New Virtual Machine Disk and Edit Virtual Machine Disk Windows
- 11.6. Moving a Virtual Machine Hard Disk Between Data Domains
- 11.7. Virtual Disks and Permissions
- 3.5.1. Creating a New Data Center
- 3.5.2. Explanation of Settings in the New Data Center and Edit Data Center Windows
- 3.5.3. Editing a Resource
- 3.5.4. Creating a New Logical Network in a Data Center or Cluster
- 3.5.5. Re-Initializing a Data Center: Recovery Procedure
- 3.5.6. Removing a Data Center
- 3.5.7. Force Removing a Data Center
Note
Procedure 3.1. Creating a New Data Center
- Select the Data Centers resource tab to list all data centers in the results list.
- Click to open the New Data Center window.
- Enter the Name and Description of the data center.
- Select the storage Type, Compatibility Version, and Quota Mode of the data center from the drop-down menus.
- Click to create the data center and open the New Data Center - Guide Me window.
- The Guide Me window lists the entities that need to be configured for the data center. Configure these entities or postpone configuration by clicking the button; configuration can be resumed by selecting the data center and clicking the button.
Table 3.1. Data Center Properties
|
Field
|
Description/Action
|
|---|---|
Name
|
The name of the data center. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Description
| The description of the data center. This field is recommended but not mandatory. |
Type
|
The storage type. Choose one of
|
Compatibility Version
|
The version of Red Hat Enterprise Virtualization. Choose one of:
|
Quota Mode
|
Quota is a resource limitation tool provided with Red Hat Enterprise Virtualizaton. Choose one of:
|
Procedure 3.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Procedure 3.3. Defining Logical Networks in a Cluster
- Use the Data Centers or Clusters resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Logical Networks tab of the details pane to list the existing logical networks.
- Click in the Data Centers details pane to open the New Logical Network window.Click in the Clusters details pane to open the New Logical Network window.
- Enter the Name and Description of the logical network.
- Select the check boxes to enable a VM Network, Enable VLAN tagging, and Override MTU.
- Select the cluster(s) you want to assign the network to. Note that the network is added as required Network to the selected clusters.
- Click OK to create the logical network.
Procedure 3.4. Re-Initializing a Data Center
- Click the Data Centers resource tab and select the data center to re-initialize.
- Ensure that any storage domains attached to the data center are in maintenance mode.
- Right-click the data center and select Re-Initialize Data Center from the drop-down menu to open the Data Center Re-Initialize window.
- The Data Center Re-Initialize window lists all available (detached; in maintenance mode) storage domains. Click the radio button for the storage domain you are adding to the data center.
- Select the Approve operation check box.
- Click to close the window and re-initialize the data center.
Procedure 3.5. Removing a Data Center
- Ensure the storage domains attached to the data center is in maintenance mode.
- Click the Data Centers resource tab and select the data center to remove.
- Click to open the Remove Data Center(s) confirmation window.
- Click .
Non Responsive if the attached storage domain is corrupt or if the host becomes Non Responsive. You cannot Remove the data center under either circumstance.
Procedure 3.6. Force Removing a Data Center
- Click the Data Centers resource tab and select the data center to remove.
- Click Force Remove to open the Force Remove Data Center confirmation window.
- Select the Approve operation check box.
- Click OK
Procedure 3.7. Attaching an Existing Data Domain to a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains already attached to the data center.
- Click to open the Attach Storage window.
- Select the check box for the data domain to attach to the data center. You can select multiple check boxes to attach multiple data domains.
- Click .
Procedure 3.8. Attaching an Existing ISO Domain to a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains already attached to the data center.
- Click to open the Attach ISO Library window.
- Click the radio button for the appropriate ISO domain.
- Click .
Procedure 3.9. Attaching an Existing Export Domain to a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains already attached to the data center.
- Click to open the Attach Export Domain window.
- Click the radio button for the appropriate Export domain.
- Click .
Note
Procedure 3.10. Detaching a Storage Domain from a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains attached to the data center.
- Select the storage domain to detach. If the storage domain is
Active, click to move the domain into maintenance mode. - Click to open the Detach Storage confirmation window.

- Click .
Procedure 3.11. Activating a Data Domain from Maintenance Mode
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains attached to the data center.
- Select the appropriate storage domain and click .
- Create and remove clusters associated with the data center;
- Add and remove hosts, virtual machines, and pools associated with the data center; and
- Edit user permissions for virtual machines associated with the data center.
Note
Table 3.2. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| DataCenterAdmin | Data Center Administrator | Can use, create, delete, manage all physical and virtual resources within a specific data center, including clusters, hosts, templates and virtual machines. |
| NetworkAdmin | Network Administrator | Can configure and manage the network of a particular data center. A network administrator of data center inherits network permissions for virtual machines within the data center as well. |
Procedure 3.12. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 3.13. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 4.2.1. Creating a New Cluster
- 4.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows
- 4.2.3. Editing a Resource
- 4.2.4. Setting Load and Power Management Policies for Hosts in a Cluster
- 4.2.5. Explanation of Settings and Controls in the Edit Cluster Policy Window
- 4.2.6. Creating a New Logical Network in a Data Center or Cluster
- 4.2.7. Removing a Cluster
- 4.2.8. Designate a Specific Traffic Type for a Logical Network with the Assign/UnAssign Window
- 4.2.9. Explanation of Settings in the Assign/UnAssign Window
Important
Procedure 4.1. Creating a New Cluster
- Select the Clusters resource tab to list all clusters in the results list.
- Click to open the New Cluster window.
- Select the Data Center the cluster will belong to from the drop-down menu.
- Enter the Name and Description of the cluster.
- Select the CPU Name and Compatibility Version from the drop-down menus. It is important to match the CPU processor family with the minimum CPU processor type of the hosts you intend to attach to the cluster, otherwise the host will be non-operational.
- Click the Memory Optimization tab to select the memory page sharing threshold for the cluster
- Click the Resilience Policy tab to select the virtual machine migration policy.
- Click to create the cluster and open the New Cluster - Guide Me window.
- The Guide Me window lists the entities that need to be configured for the cluster. Configure these entities or postpone configuration by clicking the button; configuration can be resumed by selecting the cluster and clicking the button.
Table 4.1. General Cluster Settings
|
Field
|
Description/Action
|
|---|---|
Data Center
|
The data center that will contain the cluster.
|
Name
|
The name of the cluster. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Description
| The description of the cluster. This field is recommended but not mandatory. |
CPU Name
|
The CPU type of the cluster. Choose one of:
|
Compatibility Version
|
The version of Red Hat Enterprise Virtualization. Choose one of:
|
Table 4.2. Memory Optimization Settings
|
Field
|
Description/Action
|
|---|---|
None
|
Disables memory page sharing.
|
Optimized for Server Load
|
Sets the memory page sharing threshold to 150% of the system memory on each host.
|
Optimized for Desktop Load
| Sets the memory page sharing threshold to 200% of the system memory on each host. |
Note
Table 4.3. Resilience Policy Settings
|
Field
|
Description/Action
|
|---|---|
Migrate Virtual Machines
|
Migrates all virtual machines in order of their defined priority.
|
Migrate only Highly Available Virtual Machines
|
Migrates only highly available virtual machines to prevent overloading other hosts.
|
Do Not Migrate Virtual Machines
| Prevents virtual machines from being migrated. |
Procedure 4.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Procedure 4.3. Setting Load and Power Management Policies for Hosts
- Use the resource tabs, tree mode, or the search function to find and select the cluster in the results list.
- Click the button, found in the General tab of the details pane, to open the Edit Policy window.
- Select one of the following policies:
- None
- Even Distribution - use the blue slider to specify the Maximum Service Level for a host.
- Power Saving - use the green slider to specify the Minimum Service Level for a host. Use the blue slider to specify the Maximum Service Level for a host.
- Specify the defined time interval (in minutes) in the text field.
- Click .
- ResultYou have updated the cluster policy for the cluster.
Table 4.4. Cluster General Tab Properties
|
Field/Tab
|
Description/Action
|
|---|---|
None
|
Set the policy value to None to have no load or power sharing between hosts. This is the default mode.
|
Even Distribution
|
Distributes the CPU processing load evenly across all hosts in the cluster. Additional virtual machines attached to a host will not start if that host has reached the defined Maximum Service Level.
|
Power Saving
|
Distributes the CPU processing load across a subset of available hosts to reduce power consumption on under-utilized hosts. Hosts with a CPU load below the minimum service level past the defined time interval will migrate all virtual machines to other hosts so that it can be powered down. Additional virtual machines attached to a host will not start if that host has reached the defined maximum service level.
|
Maximum Service Level
|
Set by the blue slider. If the host runs at maximum service level for the defined time interval, the Red Hat Enterprise Virtualization Manager will migrate virtual machines to other hosts in the cluster until the host's CPU load is below the maximum service threshold.
|
Minimum Service Level
|
Set by the green slider. If the host runs below minimum service level for the defined time interval, the Red Hat Enterprise Virtualization Manager will migrate virtual machines to other hosts in the cluster and power down the host.
|
Defined Time Interval
|
Sets the time (in minutes) that a host can run a CPU load outside of the defined service levels before the cluster policy takes action. The defined time interval protects against temporary spikes in CPU load activating cluster policies and instigating unnecessary virtual machine migration. Maximum two characters.
|
Procedure 4.4. Defining Logical Networks in a Cluster
- Use the Data Centers or Clusters resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Logical Networks tab of the details pane to list the existing logical networks.
- Click in the Data Centers details pane to open the New Logical Network window.Click in the Clusters details pane to open the New Logical Network window.
- Enter the Name and Description of the logical network.
- Select the check boxes to enable a VM Network, Enable VLAN tagging, and Override MTU.
- Select the cluster(s) you want to assign the network to. Note that the network is added as required Network to the selected clusters.
- Click OK to create the logical network.
Note
Procedure 4.5. Removing a Cluster
- Use the resource tabs, tree mode, or the search function to find and select the cluster in the results list.
- Ensure there are no hosts in the cluster.
- Click to open the Remove Cluster(s) confirmation window.
- Click
Procedure 4.6. Assigning or UnAssigning a Logical Network to a Cluster
- Use the Clusters resource tab, tree mode, or the search function to find and select the cluster in the results list.
- Select the Logical Networks tab in the details pane to list the logical networks assigned to the cluster.
- Click to open the Assign/UnAssign Networks window.
- Select appropriate check boxes.
- Click to save the changes and close the window.
Table 4.5. Assign/UnAssign Networks Settings
|
Field
|
Description/Action
|
|---|---|
Assign
|
Assigns the logical network to all hosts in the cluster.
|
Required
|
All hosts in the cluster require the logical network to be attached to an active NIC for the logical network to be operational.
|
VM Network
| The logical network carries the virtual machine network traffic. |
Display Network
| The logical network carries the virtual machine SPICE and virtual network controller traffic. |
- Create and remove associated clusters;
- Add and remove hosts, virtual machines, and pools associated with the cluster; and
- Edit user permissions for virtual machines associated with the cluster.
Note
Table 4.6. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all physical and virtual resources in a specific cluster, including hosts, templates and virtual machines. |
| NetworkAdmin | Network Administrator | Can configure and manage the network of a particular cluster. A network administrator of cluster inherits network permissions for virtual machines within the cluster as well. |
Procedure 4.7. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 4.8. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
rhevm. The rhevm network carries all traffic, until another logical network is created. It is meant especially for management communication between the Red Hat Enterprise Virtualization Manager and hosts.
Warning
Important
Non-operational.
Note
- 5.4.1. Creating a New Logical Network in a Data Center or Cluster
- 5.4.2. Explanation of Settings and Controls in the New Logical Network and Edit Logical Network Windows
- 5.4.3. Editing a Logical Network
- 5.4.4. Designate a Specific Traffic Type for a Logical Network with the Assign/UnAssign Window
- 5.4.5. Explanation of Settings in the Assign/UnAssign Window
- 5.4.6. Adding Multiple VLANs to a Single Network Interface using Logical Networks
Procedure 5.1. Defining Logical Networks in a Cluster
- Use the Data Centers or Clusters resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Logical Networks tab of the details pane to list the existing logical networks.
- Click in the Data Centers details pane to open the New Logical Network window.Click in the Clusters details pane to open the New Logical Network window.
- Enter the Name and Description of the logical network.
- Select the check boxes to enable a VM Network, Enable VLAN tagging, and Override MTU.
- Select the cluster(s) you want to assign the network to. Note that the network is added as required Network to the selected clusters.
- Click OK to create the logical network.
Table 5.1. New Logical Network Settings
|
Field Name
|
Description
|
|---|---|
Name
|
The name of the logical network. This text field has a 15-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Description
|
The description of the logical network. This field is recommended but not mandatory.
|
VM Network
|
Select this option if only virtual machines use this network. If the network is used for traffic that does not involve virtual machines, like storage communications for example, do not select VM Network
|
Enable VLAN tagging
|
VLAN tagging is a security feature that gives all network traffic carried on the logical network a special characteristic. VLAN-tagged traffic cannot be read by interfaces that do not also have that characteristic. Use of VLANs on logical networks also allows a single network interface to be associated with multiple, differently VLAN-tagged logical networks. Enter a numeric value in the text entry field if VLAN tagging is enabled.
|
Override MTU
|
Set a custom maximum transmission unit for the logical network. You can use this to match the MTU supported by your new logical network to the MTU supported by the hardware it interfaces with. Enter a numeric value in the text entry field if MTU override is enabled.
|
Attach/Detach Network to/from Cluster(s)
|
Select the clusters that use the logical network.
Logical networks are added to clusters as Required networks by default. You can change this later using the button.
|
Procedure 5.2. Editing a Logical Network
- Use the Data Centers resource tab, tree mode, or the search function to find and select the data center of the logical network in the results list.
- Click the Logical Networks tab in the details pane to list the logical networks in the data center.
- Select a logical network and click to open the Edit Logical Network window.
- You are required to detach all clusters before editing the logical network settings. Clear the cluster check boxes in the Attach/Detach Network to/from Cluster(s) area and click to open the Attach/Detach Network to/from Clusters confirmation window.Select the Approve operation check box and click OK to detach the clusters and enable editing of the logical network.
- Edit the necessary settings.
- Attach the necessary clusters.
- Click OK to save the changes.
Procedure 5.3. Assigning or UnAssigning a Logical Network to a Cluster
- Use the Clusters resource tab, tree mode, or the search function to find and select the cluster in the results list.
- Select the Logical Networks tab in the details pane to list the logical networks assigned to the cluster.
- Click to open the Assign/UnAssign Networks window.
- Select appropriate check boxes.
- Click to save the changes and close the window.
Table 5.2. Assign/UnAssign Networks Settings
|
Field
|
Description/Action
|
|---|---|
Assign
|
Assigns the logical network to all hosts in the cluster.
|
Required
|
All hosts in the cluster require the logical network to be attached to an active NIC for the logical network to be operational.
|
VM Network
| The logical network carries the virtual machine network traffic. |
Display Network
| The logical network carries the virtual machine SPICE and virtual network controller traffic. |
Important
Procedure 5.4. Adding Multiple VLANs to a Network Interface using Logical Networks
- Use the Hosts resource tab, tree mode, or the search function to find and select in the results list a host associated with the cluster to which your VLAN-tagged logical networks are assigned.
- Click the Network Interfaces tab in the details pane to list the physical network interfaces attached to the data center.
- Click to open the Setup Host Networks window.
- Drag your VLAN-tagged logical networks into the Assigned Logical Networks area next to the physical network interface. The physical network interface can have multiple logical networks assigned due to the VLAN tagging.
- Edit the logical networks by hovering your cursor over an assigned logical network and clicking the pencil icon to open the Edit Network window.If your logical network definition is not synchronized with the network configuration on the host, select the Sync network check box.Select a Boot Protocol from:Click OK.
- None,
- DHCP, or
- Static,Provide the IP and Subnet Mask.
- Select the Verify connectivity between Host and Engine check box to run a network check; this will only work if the host is in maintenance mode.
- Select the Save network configuration check box
- Click .
Important
- Must belong to only one cluster in the system.
- Must have CPUs that support the AMD-V or Intel VT hardware virtualization extensions.
- Must have CPUs that support all functionality exposed by the virtual CPU type selected upon cluster creation.
- Has a minimum of 2 GB RAM.
- Can have an assigned system administrator with system permissions.
- 6.4.1. Adding a Red Hat Enterprise Linux Host
- 6.4.2. Explanation of Settings and Controls in the New Host and Edit Host Windows
- 6.4.3. Configuring Host Power Management Settings
- 6.4.4. Configuring Host Storage Pool Manager (SPM) Settings
- 6.4.5. Editing a Resource
- 6.4.6. Approving Newly Added Red Hat Enterprise Virtualization Hypervisor Hosts
- 6.4.7. Moving a Host to Maintenance Mode
- 6.4.8. Activating a host from maintenance mode
- 6.4.9. Removing a Host
- 6.4.10. Customizing Hosts with Tags
Procedure 6.1. Adding a Red Hat Enterprise Linux Host
- Click the Hosts resource tab to list the hosts in the results list.
- Click to open the New Host window.
- Use the drop-down menus to select the Data Center and Host Cluster for the new host.
- Enter the Name, Address, and Root Password of the new host.
- If applicable, clear the Automatically configure host firewall check box.
- You can configure the Power Management and SPM using the applicable tabs now; however, as these are not fundamental to adding a Red Hat Enterprise Linux host, they are not covered in this procedure.
- Click to add the host and close the window.
Installing. Once installation is complete, the status will update to Reboot. The host must be activated for the status to change to Up.
Note
Table 6.1. General settings
|
Field Name
|
Description
|
|---|---|
|
Name
|
The name of the cluster. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
|
Address
|
The IP address, or resolvable hostname of the host.
|
|
Data Center
|
The data center to which the host belongs.
|
|
Host Cluster
|
The cluster to which the host belongs.
|
|
Root password
|
The password of the host's root user. This can only be given when you add the host, it cannot be edited afterwards.
|
Table 6.2. Power Management Settings
|
Field Name
|
Description
|
|---|---|
Address
|
The address to access your host's power management device. Either a resolvable hostname or and IP address.
|
User Name
|
User account to access the power management device with. You may have to set up a user on the device, or use the default user.
|
Password
|
Password for the user accessing the power management device.
|
Type
|
The type of power management device in your host.
Choose one of the following:
|
Options
|
Power management device specific options. Give these as 'key=value' or 'key', refer to the documentation of your host's power management device for the options available.
|
Procedure 6.2. Configuring Power Management Settings
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Edit Host window.
- Click the Power Management tab to display the Power Management settings.
- Select the Enable Power Management check box to enable the fields
- Enter the Address, User Name, and Password of the power management device into the appropriate fields.
- Use the drop-down menu to select the Type of power management device.
- Enter the Options for the power management device. Please use a comma-separated list of 'key=value' or 'key'.
- Click to ensure the settings are correct.
- Click to save your settings and close the window.
Procedure 6.3. Configuring SPM settings
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Edit Host window.
- Click the SPM tab to display the SPM Priority settings.
- Use the radio buttons to select the appropriate SPM priority for the host.
- Click to save the settings and close the window.
Procedure 6.4. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Procedure 6.5. Approving newly added Red Hat Enterprise Virtualization Hypervisor hosts
- In the Hosts tab, select the host you recently installed using the Red Hat Enterprise Virtualization Hypervisor host installation media. This host shows a status of
Pending Approval. - Click the button.
Up and it can be used to run virtual machines.
Note
Procedure 6.6. Moving a Host to Maintenance Mode
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Maintenance Host(s) confirmation window.
- Click to initiate maintenance mode.
Preparing for Maintenance, and finally Maintenance when the operation completes successfully.
Procedure 6.7. Activating a Host from Maintenance Mode
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click .
Unassigned, and finally Up when the operation is complete. Virtual machines can now run on the host.
Procedure 6.8. Removing a host
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Place the host into maintenance mode.
- Click to open the Remove Host(s) confirmation window.
- Click .
Procedure 6.9. Customizing hosts with tags
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Assign Tags window.
- The Assign Tags window lists all available tags. Select the check boxes of applicable tags.
- Click to assign the tags and close the window.
rhevm management logical network between interfaces, and adding a newly created logical network to a network interface are common reasons to edit host networking.
Procedure 6.10. Editing Host Network Interfaces and Adding Logical Networks to Hosts
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results.
- Click the Network Interfaces tab in the details pane to list the network interfaces attached to the host and their configurations.
- Attach a logical network to a network interface by selecting and dragging a logical network into the Assigned Logical Networks area next to the network interface.Alternatively, right-click the logical network and select a network interface from the drop-down menu.
- Edit the logical networks by hovering your cursor over an assigned logical network and clicking the pencil icon to open the Edit Network window.If your logical network definition is not synchronized with the network configuration on the host, select the Sync network check box.Select a Boot Protocol from:Click OK.
- None,
- DHCP, or
- Static.If you have chosen Static, provide the IP and Subnet Mask.
- Select the Verify connectivity between Host and Engine check box to run a network check; this will only work if the host is in maintenance mode.
- Select the Save network configuration check box if you want these network changes to be made persistent when the environment is rebooted.
- Click to implement the changes and close the window.
Procedure 6.11. Creating a Bond Device using the Administration Portal
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click the Network Interfaces tab in the details pane to list the physical network interfaces attached to the host.
- Click to open the Setup Host Networks window.
- Select and drag one of the interfaces over the top of another interface and drop it to open the Create New Bond window.Alternatively, right-click the interface and select another interface from the drop-down menu.
- Select the Bond Name and Bonding Mode from the drop-down menus.Bonding modes 1, 2, 4, and 5 can be selected. Any other mode can be configured using the Custom option.
- Click to create the bond and close the Create New Bond window.
- Assign a logical network to the newly created bonded interface.
- Optionally choose to Verify connectivity between Host and Engine and Save network configuration.
- Click accept the changes and close the Setup Host Networks window.
Procedure 6.12. Saving a host network configuration
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click the tab on the Details pane to list the NICs on the host, their address, and other specifications.
- Click the button.
- The host network configuration is saved and the following message is displayed on the task bar: "Network Changes were saved on host
<Hostname>."
Procedure 6.13. Setting fencing parameters on a host
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Edit Host window.
- Select the Enable Power Management check box to enable the fields.
- Enter the Address, User Name, and Password of the power management device.
- Select the power management device Type from the drop-down menu.
- Enter the specific options of the power management device. Use a comma-separated list of 'key=value' or 'key' entries.
- Click the button to test the power management device. Test Succeeded, Host Status is: on will display upon successful verification.
Warning
Power management parameters (userid, password, options, etc) are tested by Red Hat Enterprise Virtualization Manager only during setup and manually after that. If you choose to ignore alerts about incorrect parameters, or if the parameters are changed on the power management hardware without the corresponding change in Red Hat Enterprise Virtualization Manager, fencing is likely to fail when most needed. - Click to save the changes and close the window.
Procedure 6.14. Using Host Power Management Functions
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click the Power Management drop-down menu.
- Select one of the following options:
- Restart: This option stops the host and waits until the host's status changes to
Down. When the agent has verified that the host is down, the highly available virtual machines are restarted on another host in the cluster. The agent then restarts this host. When the host is ready for use its status displays asUp. - Start: This option starts the host and lets it join a cluster. When it is ready for use its status displays as
Up. - Stop: This option powers off the host. Before using this option, ensure that the virtual machines running on the host have been migrated to other hosts in the cluster. Otherwise the virtual machines will crash and only the highly available virtual machines will be restarted on another host. When the host has been stopped its status displays as
Non-Operational.
- Selecting one of the above options opens a confirmation window. Click OK to confirm and proceed.
Warning
Procedure 6.15. Manually fencing or isolating a non-responsive host
- On the Hosts tab, select the host. The status must display as
non-responsive. - Manually reboot the host. This could mean physically entering the lab and rebooting the host.
- On the Administration Portal, right-click the host entry and select the button.
- A message displays prompting you to ensure that the host has been shut down or rebooted. Select the Approve Operation check box and click OK.
- Edit the configuration of the host;
- Set up the logical networks; and
- Remove the host.
Table 6.4. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| HostAdmin | Host Administrator | Can configure, manage, and remove a specific host. |
| NetworkAdmin | Network Administrator | Can configure, manage, and remove networks on a host. A network administrator of host inherits network permissions for virtual machines on the host as well. |
Procedure 6.16. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 6.17. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 7.1. Introduction to Storage in Red Hat Enterprise Virtualization
- 7.2. Understanding Storage Domains
- 7.3. Storage Metadata Versions in Red Hat Enterprise Virtualization
- 7.4. Preparing and Adding File-based Storage
- 7.5. Adding POSIX Compliant File System Storage
- 7.6. Adding Block-based Storage
- 7.7. Storage Tasks
- 7.8. Red Hat Storage Volumes
- 7.9. Storage and Permissions
- Network File System (NFS).
- Other POSIX compliant file systems.
- Internet Small Computer System Interface (iSCSI).
- Local storage attached directly to the virtualization hosts.
- Fibre Channel Protocol (FCP).
- Data Domain: A data domain holds the virtual hard disks and OVF files of all the virtual machines and templates in a data center. In addition, snapshots of the virtual machines are also stored in the data domain.The data domain cannot be shared across data centers, and the data domain must be of the same type as the data center. For example, a data center of a iSCSI type, must have an iSCSI data domain.You must attach a data domain to a data center before you can attach domains of other types to it.
- ISO Domain: ISO domains store ISO files (or logical CDs) used to install and boot operating systems and applications for the virtual machines. An ISO domain removes the data center's need for physical media. An ISO domain can be shared across different data centers. ISO storage domains use NFS storage.
- Export Domain: Export domains are temporary storage repositories that are used to copy and move images between data centers and Red Hat Enterprise Virtualization environments. Export domains can be used to backup virtual machines. An export domain can be moved between data centers, however, it can only be active in one data center at a time.
Important
Support for export storage domains backed by storage on anything other than NFS is being deprecated. While existing export storage domains imported from Red Hat Enterprise Virtualization 2.2 environments remain supported new export storage domains must be created on NFS storage.
Important
Up.
- V1 metadata (Red Hat Enterprise Virtualization 2.x series)Each storage domain contains metadata describing its own structure, and all of the names of physical volumes that are used to back virtual machine disk images.Master domains additionally contain metadata for all the domains and physical volume names in the storage pool. The total size of this metadata is limited to 2 kb, limiting the number of storage domains that can be in a pool.Template and virtual machine base images are read only.V1 metadata is applicable to NFS, iSCSI, and FC storage domains.
- V2 metadata (Red Hat Enterprise Virtualization 3.0)All storage domain and pool metadata is stored as logical volume tags rather than written to a logical volume. Metadata about virtual machine disk volumes is still stored in a logical volume on the domains.Physical volume names are no longer included in the metadata.Template and virtual machine base images are read only.V2 metadata is applicable to iSCSI, and FC storage domains.
- V3 metadata (Red Hat Enterprise Virtualization 3.1)All storage domain and pool metadata is stored as logical volume tags rather than written to a logical volume. Metadata about virtual machine disk volumes is still stored in a logical volume on the domains.Virtual machine and template base images are no longer read only. This change enables live snapshots, live storage migration, and clone from snapshot.Support for unicode metadata is added, for non-English volume names.V3 metadata is applicable to NFS, POSIX, iSCSI, and FC storage domains.
Note
Procedure 7.1. Preparing NFS Storage
Install nfs-utils
NFS functionality is provided by the nfs-utils package. Before file shares can be created, check that the package is installed by querying the RPM database for the system:$
rpm -qi nfs-utilsIf the nfs-utils package is installed then the package information will be displayed. If no output is displayed then the package is not currently installed. Install it usingyumwhile logged in as therootuser:#
yum install nfs-utilsConfigure Boot Scripts
To ensure that NFS shares are always available when the system is operational both thenfsandrpcbindservices must start at boot time. Use thechkconfigcommand while logged in asrootto modify the boot scripts.#
chkconfig --add rpcbind#chkconfig --add nfs#chkconfig rpcbind on#chkconfig nfs onOnce the boot script configuration has been done, start the services for the first time.#
service rpcbind start#service nfs startCreate Directory
Create the directory you wish to share using NFS.#
mkdir/exports/isoReplace/exports/isowith the name, and path of the directory you wish to use.Export Directory
To be accessible over the network using NFS the directory must be exported. NFS exports are controlled using the/etc/exportsconfiguration file. Each export path appears on a separate line followed by a tab character and any additional NFS options. Exports to be attached to the Red Hat Enterprise Virtualization Manager must have the read, and write, options set.To grant read, and write access to/exports/isousing NFS for example you add the following line to the/etc/exportsfile./exports/iso*(rw)Again, replace/exports/isowith the name, and path of the directory you wish to use.Reload NFS Configuration
For the changes to the/etc/exportsfile to take effect the service must be told to reload the configuration. To force the service to reload the configuration run the following command asroot:#
service nfs reloadSet Permissions
The NFS export directory must be configured for read write access and must be owned by vdsm:kvm. If these users do not exist on your external NFS server use the following command, assuming thatis the directory to be used as an NFS share./exports/iso#
chown -R 36:36/exports/isoThe permissions on the directory must be set to allow read and write access to both the owner and the group. The owner should also have execute access to the directory. The permissions are set using thechmodcommand. The following command arguments set the required permissions on thedirectory./exports/iso#
chmod 0755/exports/iso
Procedure 7.2. Attaching NFS Storage
- Click the resource tab to list the existing storage domains.
- Click to open the New Domain window.
- Enter the Name of the storage domain.
- Select the Data Center, Domain Function / Storage Type, and Use Host from the drop-down menus.If applicable, select the Format from the drop-down menu.
- Enter the Export Path to be used for the storage domain.The export path should be in the format of
192.168.0.10:/data or domain.example.com:/data - Click to enable further configurable settings. It is recommended that the values of these parameters not be modified.
Important
All communication to the storage domain is from the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must be attached to the chosen Data Center before the storage is configured. - Click OK to create the storage domain and close the window.
Locked while the disk prepares. It is automatically attached to the data center upon completion.
Important
/data/images. This directory already exists with the correct permissions on Hypervisor installations. The steps in this procedure are only required when preparing local storage on Red Hat Enterprise Linux virtualization hosts.
Procedure 7.3. Preparing Local Storage
- On the virtualization host, create the directory to be used for the local storage.
# mkdir -p /data/images
- Ensure that the directory has permissions allowing read/write access to the
vdsmuser (UID 36) andkvmgroup (GID 36).# chown 36:36 /data /data/images
# chmod 0755 /data /data/images
Procedure 7.4. Adding Local Storage
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click Maintenance to place the host into maintenance mode.
- Click to open the Configure Local Storage window.
- Click the buttons next to the Data Center, Cluster, and Storage fields to configure and name the local storage domain.
- Set the path to your local storage in the text entry field.
- If applicable, select the Memory Optimization tab to configure the memory optimization policy for the new local storage cluster.
- Click to save the settings and close the window.
Important
Procedure 7.5. Attaching POSIX Compliant File System Storage
- Click the Storage resource tab to list the existing storage domains in the results list.
- Click New Domain to open the New Domain window.
- Enter the Name for the storage domain.
- Select the Data Center to be associated with the storage domain. The Data Center selected must be of type POSIX (POSIX compliant FS). Alternatively, select
(none). - Select
Data / POSIX compliant FSfrom the Domain Function / Storage Type drop-down menu.If applicable, select the Format from the drop-down menu. - Select a host from the Use Host drop-down menu. Only hosts within the selected data center will be listed. The host that you select will be used to connect the storage domain.
- Enter the Path to the POSIX file system, as you would normally provide it to the
mountcommand. - Enter the VFS Type, as you would normally provide it to the
mountcommand using the-targument. Seeman mountfor a list of valid VFS types. - Enter additional Mount Options, as you would normally provide them to the
mountcommand using the-oargument. The mount options should be provided in a comma-separated list. Seeman mountfor a list of valid mount options. - Click OK to attach the new Storage Domain and close the window.
Warning
Note
Procedure 7.6. Adding iSCSI Storage
- Click the Storage resource tab to list the existing storage domains in the results list.
- Click the button to open the New Domain window.
- Enter the Name of the new storage domain.
- Use the Data Center drop-down menu to select an iSCSI data center.If you do not yet have an appropriate iSCSI data center, select
(none). - Use the drop-down menus to select the Domain Function / Storage Type and the Format. The storage domain types that are not compatible with the chosen data center are not available.
- Select an active host in the Use Host field. If this is not the first data domain in a data center, you must select the data center's SPM host.
Important
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - The Red Hat Enterprise Virtualization Manager is able to map either iSCSI targets to LUNs, or LUNs to iSCSI targets. The New Domain window automatically displays known targets with unused LUNs when iSCSI is selected as the storage type. If the target that you are adding storage from is not listed then you can use target discovery to find it, otherwise proceed to the next step.
iSCSI Target Discovery
- Click Discover Targets to enable target discovery options. When targets have been discovered and logged in to, the New Domain window automatically displays targets with LUNs unused by the environment.
Note
LUNs used externally to the environment are also displayed.You can use the Discover Targets options to add LUNs on many targets, or multiple paths to the same LUNs. - Enter the fully qualified domain name or IP address of the iSCSI host in the Address field.
- Enter the port to connect to the host on when browsing for targets in the Port field. The default is
3260. - If the Challenge Handshake Authentication Protocol (CHAP) is being used to secure the storage, select the User Authentication check box. Enter the CHAP username and CHAP password.
- Click the button.
- Select the target you want to use from the discovery results and click the button.Alternatively, click the to log in to all of the discovered targets.
- Click the + button next to the desired target. This will expand the entry and display all unused LUNs attached to the target.
- Select the check box for each LUN that you are using to create the storage domain.
- Click to create the storage domain and close the window.
Note
Procedure 7.7. Adding FCP Storage
- Click the resource tab to list all storage domains in the virtualized environment.
- Click to open the New Domain window.
- Enter the Name of the storage domain
- Use the Data Center drop-down menu to select an FCP data center.If you do not yet have an appropriate FCP data center, select
(none). - Use the drop-down menus to select the Domain Function / Storage Type and the Format. The storage domain types that are not compatible with the chosen data center are not available.
- Select an active host in the Use Host field. If this is not the first data domain in a data center, you must select the data center's SPM host.
Important
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - The New Domain window automatically displays known targets with unused LUNs when Data / Fibre Channel is selected as the storage type. Select the LUN ID check box to select all of the available LUNs.Alternatively, select the Add LUN check boxes for individual LUNs to use them with the FCP data domain.
- Click OK to create the storage domain and close the window.
Locked status while it is being prepared for use. When ready, it is automatically attached to the data center. Select either Build New Domain or Use Existing Volume Group.
- LUNs that are already being used by the SPM host will also display as in use. You can choose to forcefully over ride the contents of these LUNs, but the operation is not guaranteed to succeed.
- 7.7.1. Importing existing ISO or export storage domains
- 7.7.2. Populating the ISO Storage Domain
- 7.7.3. Moving storage domains to maintenance mode
- 7.7.4. Editing a Resource
- 7.7.5. Activating storage domains
- 7.7.6. Removing a storage domain
- 7.7.7. Destroying a storage domain
- 7.7.8. Detaching the Export Domain
- 7.7.9. Attaching an Export Domain to a Data Center
Procedure 7.8. Importing an Existing ISO or Export Storage Domain
- Click the resource tab to list all the available storage domains in the results list.
- Select the appropriate Domain Function / Storage Type from the following:
- ISO
- Export
The Domain Function / Storage Type determines the availability of the Format field. - Select the SPM host from the Use host drop-down menu.
Important
All communication to the storage domain is via the selected host and not from the Red Hat Enterprise Virtualization Manager. At least one host must be active and have access to the storage before the storage can be configured. - Enter the Export path of the storage. The export path can be either a static IP address or a resolvable hostname. For example,
192.168.0.10:/Images/ISOorstorage.demo.redhat.com:/exports/iso. - Click to import the domain and close the window.
- The storage domain is imported and displays on the Storage tab. The next step is to attach it to a data center. This is described later in this chapter, .
Procedure 7.9. Populating the ISO Storage Domain
- Copy the required ISO image to a temporary directory on the system running Red Hat Enterprise Virtualization Manager.
- Log in to the system running Red Hat Enterprise Virtualization Manager as the
rootuser. - Use the
rhevm-iso-uploadercommand to upload the ISO image. This action will take some time, the amount of time varies depending on the size of the image being uploaded and available network bandwidth.Example 7.1. ISO Uploader Usage
In this example the ISO imageRHEL6.isois uploaded to the ISO domain calledISODomainusing NFS. The command will prompt for an administrative username and password. The username must be provided in the formusername@domain.#
rhevm-iso-uploader--iso-domain=ISODomainuploadRHEL6.iso
Important
Procedure 7.10. Moving storage domains to maintenance mode
- Use the Storage resource tab, tree mode, or the search function to find and select the storage domain in the results list.
- Shut down and move all the virtual machines running on the storage domain.
- Click the Data Centers tab in the details pane.
- Click . The storage domain is deactivated and has an
Inactivestatus in the results list.
Note
Procedure 7.11. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
- Use the Storage resource tab, tree mode, or the search function to find and select the inactive storage domain in the results list.
- Click the Data Centers tab in the details pane.
- Select the appropriate data center and click .
Important
If you attempt to activate the ISO domain before activating the data domain, an error message displays and the domain is not activated.
Procedure 7.12. Removing a Storage Domain
- Use the Storage resource tab, tree mode, or the search function to find and select the appropriate storage domain in the results list.
- Move the domain into maintenance mode to deactivate it.
- Detach the domain from the data center.
- Click to open the Remove Storage confirmation window.
- Select a host from the list.
- Click to remove the storage domain and close the window.
Procedure 7.13. Destroying a Storage Domain
- Use the Storage resource tab, tree mode, or the search function to find and select the appropriate storage domain in the results list.
- Right-click the storage domain and select to open the Destroy Storage Domain confirmation window.
- Select the Approve operation check box and click to destroy the storage domain and close the window.
Procedure 7.14. Detaching an Export Domain from the Data Center
- Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list.
- Click the Data Centers tab in the details pane and select the export domain.
- Click to put the export domain into maintenance mode.
- Click to open the Detach Storage confirmation window.
- Click to detach the export domain.
Procedure 7.15. Attaching an Export Domain to a Data Center
- Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list.
- Click the Data Centers tab in the details pane.
- Click to open the Attach to Data Center window.
- Select the radio button of the appropriate data center.
- Click to attach the export domain.
- Select the newly attached data center in the details pane and click .
- 7.8.1. Introduction to Red Hat Storage Volumes
- 7.8.2. Gluster Storage Terminology
- 7.8.3. Creating A Storage Volume
- 7.8.4. Adding Bricks to a Volume
- 7.8.5. Explanation of Settings in the Add Bricks window
- 7.8.6. Starting Volumes
- 7.8.7. Tuning Volumes
- 7.8.8. Editing Volume Options
- 7.8.9. Reset Volume Options
- 7.8.10. Removing Bricks from a Volume
- 7.8.11. Stopping Red Hat Storage Volumes
- 7.8.12. Deleting Red Hat Storage Volumes
Note
Table 7.1. Data Center Properties
|
Term
|
Definition
|
|---|---|
|
Brick
|
A brick is the GlusterFS basic unit of storage, represented by an export directory on a server in the trusted storage pool. A Brick is expressed by combining a server with an export directory in the following format:
SERVER:EXPORT
For example:
myhostname:/exports/myexportdir/
|
|
Block Storage
|
Block special files or block devices correspond to devices through which the system moves data in the form of blocks. These device nodes often represent addressable devices such as hard disks, CD-ROM drives, or memory-regions. Red Hat Storage supports XFS file system with extended attributes.
|
|
Cluster
|
A trusted pool of linked computers, working together closely thus in many respects forming a single computer. In Red Hat Storage terminology a cluster is called as trusted storage pool.
|
|
Client
|
The machine which mounts the volume (this may also be a server)
|
|
Distributed File System
|
A file system that allows multiple clients to concurrently access data spread across multiple servers/bricks in a trusted storage pool. Data sharing among multiple locations is fundamental to all distributed file system.
|
|
Geo-Replication
|
Geo-replication provides a continuous, asynchronous, and incremental replication service from site to another over Local Area Networks (LAN), Wide Area Network (WAN), and across the Internet.
|
|
glusterd
|
The Gluster management daemon that needs to run on all servers in the trusted storage pool.
|
|
Metadata
|
Metadata is data providing information about one or more other pieces of data.
|
|
N-way Replication
|
Local synchronous data replication typically deployed across campus or Amazon Web Services Availability Zones.
|
|
Namespace
|
Namespace is an abstract container or environment created to hold a logical grouping of unique identifiers or symbols. Each Red Hat Storage trusted storage pool exposes a single namespace as a POSIX mount point that contains every file in the trusted storage pool.
|
|
POSIX
|
Portable Operating System Interface (for Unix) is the name of a family of related standards specified by the IEEE to define the application programming interface (API), along with shell and utilities interfaces for software compatible with variants of the UNIX operating system. Red Hat Storage exports a fully POSIX compatible file system.
|
|
RAID
|
Redundant Array of Inexpensive Disks (RAID) is a technology that provides increased storage reliability through redundancy, combining multiple low-cost, less-reliable disk drives components into a logical unit where all drives in the array are interdependent.
|
|
RRDNS
|
Round Robin Domain Name Service (RRDNS) is a method to distribute load across application servers. RRDNS is implemented by creating multiple A records with the same name and different IP addresses in the zone file of a DNS server.
|
|
Server
|
The machine (virtual or bare metal) which hosts the actual file system in which data will be stored.
|
|
Scale-Up Storage
|
Increases the capacity of the storage device, but only in a single dimension. An example might be adding additional disk capacity to a single computer in a trusted storage pool.
|
|
Scale-Out Storage
|
Increases the capability of a storage device in multiple dimensions. For example adding a server to a trusted storage pool increases CPU, disk capacity, and throughput for the trusted storage pool.
|
|
Subvolume
|
A brick after being processed by at least one translator.
|
|
Translator
|
A translator connects to one or more subvolumes, does something with them, and offers a subvolume connection.
|
|
Trusted Storage Pool
|
A storage pool is a trusted network of storage servers. When you start the first server, the storage pool consists of that server alone.
|
|
User Space
|
Applications running in user space don’t directly interact with hardware, instead using the kernel to moderate access. User Space applications are generally more portable than applications in kernel space. Gluster is a user space application.
|
|
Virtual File System (VFS)
|
VFS is a kernel software layer that handles all system calls related to the standard Linux file system. It provides a common interface to several kinds of file systems
|
|
Volfile
|
Volfile is a configuration file used by glusterfs process. Volfile will be usually located at
/var/lib/glusterd/vols/VOLNAME.
|
|
Volume
|
A volume is a logical collection of bricks. Most of the gluster management operations happen on the volume.
|
Procedure 7.16. Creating A Storage Volume
- Click the Volumes tab. The Volumes tab displays a list of all volumes in the system.
- Click the button. The Create Volume dialog box displays.
- Select the cluster from the Volume Cluster drop-down list.
- In the Name field, enter the name of the volume.
- Select the type of the volume from the Type drop-down list. You can choose the volume type as Distribute, Replicate, or Stripe.
- Add bricks to your volume. Bricks must be created externally on the Red Hat Storage nodes. Click Add Bricks.
- Select the Access Protocol for the new volume by selecting GlusterFS,or NFS, or both checkboxes.
- In the Allow Access From field, specify the volume access control as a comma-separated list of IP addresses or hostnames.You can use wildcards to specify ranges of addresses such as an asterisk (*) which specifies all IP addresses or hostnames. You need to use IP-based authentication for Gluster Filesystem and NFS exports.
- Click to create the volume. The new volume is added and displays on the Volume tab.
Procedure 7.17. Adding Bricks to a Volume
- On the Volumes tab on the navigation pane, select the volume to which you want to add bricks.
- Select the volume to add new bricks. Click the tab from the Details pane.
- Click to open the Add Bricks window.
- A list of available bricks appears, with server addresses and brick directory names. Tick the checkbox of the bricks you wish to use.
- Click .
Table 7.2. Add Bricks Tab Properties
|
Field Name
|
Description
|
|---|---|
Volume Type
|
Displays the type of volume. This field cannot be changed, it was set when you created the volume.
|
Server
|
The selected server to add new bricks.
|
Brick Directory
|
The directory in the server.
|
Procedure 7.18. Starting Volumes
- In the Volumes tab, select the volume to be started.You can select multiple volumes to start by using
ShiftorCtrlkey. - Click the button.
Up.
Procedure 7.19. Tuning Volumes
- Click the Volumes tab.A list of volumes displays.
- Select the volume that you want to tune, and click the tab from the Details pane.The Volume Options tab displays a list of options set for the volume.
- Click to set an option. The Add Option dialog box displays. Select the Option Key from the drop down list and enter the option value.
- Click .The option is set and displays in the Volume Options tab.
Procedure 7.20. Editing Volume Options
- Click the Volumes tab.A list of volumes displays.
- Select the volume that you want to edit, and click the Volume Options tab from the Details pane.The Volume Options tab displays a list of options set for the volume.
- Select the option you wish to edit. Click . The Edit Option dialog box displays. Enter a new value for the option.
- Click .The edited option displays in the Volume Options tab.
- Click the Volumes tab.A list of volumes displays.
- Select the volume and click the tab from the Details pane.The Volume Options tab displays a list of options set for the volume.
- Select the option you wish to reset. Click . A dialog box displays, prompting to confirm the reset option.
- Click .The selected option is reset.
Note
Procedure 7.21. Removing Bricks from a Volume
- On the Volumes tab on the navigation pane, select the volume from which you wish to remove bricks.
- Click the tab from the Details pane.
- Select the bricks you wish to remove. Click .
- A window opens, prompting to confirm the deletion. Click OK to confirm.
- Edit the configuration of the storage domain;
- Move the storage domain into maintenance mode; and
- Remove the storage domain.
Note
Table 7.3. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| StorageAdmin | Storage Administrator | Can create, delete, configure and manage a specific storage domain. |
| GlusterAdmin | Gluster Storage Administrator | Can create, delete, configure and manage Gluster storage volumes. |
Procedure 7.23. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 7.24. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 8.1. Introduction to Virtual Machines
- 8.2. Supported Virtual Machine Operating Systems
- 8.3. Virtual Machine Performance Parameters
- 8.4. Creating Virtual Machines
- 8.5. Using Virtual Machines
- 8.6. Shutting Down or Pausing Virtual Machines
- 8.7. Managing Virtual Machines
- 8.8. Virtual Machines and Permissions
- 8.9. Backing Up and Restoring Virtual Machines with Snapshots
- 8.10. Importing and Exporting Virtual Machines
- 8.11. Migrating Virtual Machines Between Hosts
- 8.12. Improving Uptime with Virtual Machine High Availability
- 8.13. Other Virtual Machine Tasks
- Red Hat Enterprise Linux 3 (32 bit and 64 bit)
- Red Hat Enterprise Linux 4 (32 bit and 64 bit)
- Red Hat Enterprise Linux 5 (32 bit and 64 bit)
- Red Hat Enterprise Linux 6 (32 bit and 64 bit)
- Windows XP Service Pack 3 and newer (32 bit only)
- Windows 7 (32 bit and 64 bit)
- Windows Server 2003 Service Pack 2 and newer (32 bit and 64 bit)
- Windows Server 2008 (32 bit and 64 bit)
- Windows Server 2008 R2 (64 bit only)
Table 8.1. Supported virtual machine parameters
| Parameter | Number | Note |
|---|---|---|
| Virtualized CPUs | 160 | per virtual machine |
| Virtualized RAM | 2TB | For a 64 bit virtual machine |
| Virtualized RAM | 4GB | per 32 bit virtual machine. Note, the virtual machine may not register the entire 4GB. The amount of RAM that the virtual machine recognizes is limited by its operating system. |
| Virtualized storage devices | 8 | per virtual machine |
| Virtualized network interface controllers | 8 | per virtual machine |
| Virtualized PCI devices | 32 | per virtual machine |
- 8.4.1. Creating a New Virtual Machine from an Existing Template
- 8.4.2. Creating a New Virtual Machine from a Blank Template
- 8.4.3. Explanation of Settings and Controls in the New Virtual Machine and Edit Virtual Machine Windows
- 8.4.4. Creating a Cloned Virtual Machine from an Existing Template
- 8.4.5. Completing the Configuration of a Virtual Machine by Defining Network Interfaces and Hard Disks
- 8.4.6. Installing a Guest Operating System onto a Virtual Machine
- 8.4.7. Virtual Machine Run Once Settings Explained
Procedure 8.1. Creating a New Virtual Machine from an Existing Template
- Click the Virtual Machines resource tab to list all the virtual machines in the results list.
- Click the New Server button to open the New Server Virtual Machine window, or the New Desktop button to open the New Desktop Virtual Machine window.
- Select the Data Center and Host Cluster on which the desktop is to run. Select an existing template from the Based on Template drop-down menu.
- Enter a suitable Name and Description, and accept the default values inherited from the template. You can change the rest of the fields if needed.
- Click OK.
Procedure 8.2. Creating a New Virtual Machine from a Blank Template
- Click the resource tab to list all the virtual machines in the results list.The icon to the right of the virtual machine name indicates whether it is a virtual server, a virtual machine, or a part of a virtual machine pool.
- Click the button to open the New Server Virtual Machine window, or the button to open the New Desktop Virtual Machine window.
- On the General tab, you only need to fill in the Name and Operating System fields. You can accept the default settings for other fields, or change them if required.
- Alternatively, click the Initial Run, Console, Host, Resource Allocation, Boot Options, and Custom Properties tabs in turn to define options for your virtual machine.
- Click to create the virtual machine and close the window.
- The New Virtual Machine - Guide Me window opens. Use the Guide Me buttons to complete configuration or click to close the window.
Down. Before you can use this virtual machine, add at least one network interface and one virtual disk, and install an operating system.
Table 8.2. Virtual Machine: General Settings
|
Field Name
|
Description
|
|---|---|
|
Data Center
|
The data center to which the virtual machine is attached.
|
|
Host Cluster
|
The name of the host cluster to which the virtual machine is attached. It can be hosted on any physical machine in the cluster depending on the policy rules.
|
|
Quota (Server only)
|
A policy that limits the virtual machine from using more CPU, memory, or storage resources than are allocated.
|
|
Name
|
The name of virtual machine. Names must not contain any spaces, and must contain at least one character from A-Z. The maximum length of a virtual machine name is 15 characters.
|
|
Description
|
A meaningful description of the new virtual machine.
|
|
Based on Template
|
Templates can be used to create a virtual machines from existing models. This field is set to Blank by default, which enables creating a virtual machine from scratch.
|
|
Memory Size
|
The amount of memory assigned to the virtual machine. When allocating memory, consider the processing and storage needs of the applications that are intended to run on the virtual machine.
Maximum guest memory is constrained by the selected guest architecture and the cluster compatibility level.
|
|
Total Virtual CPUs
|
The processing power allocated to the virtual machine as CPU Cores. Do not assign more cores to a virtual machine than are present on the physical host.
|
|
Cores per Virtual Socket
|
The number of cores assigned to each virtual socket.
|
|
Virtual Sockets
|
The number of CPU sockets for the virtual machine. Do not assign more sockets to a virtual machine than are present on the physical host.
|
|
Operating System
|
The operating system. Valid values include a range of Red Hat Enterprise Linux and Windows variants.
|
|
Stateless (Desktop only)
|
Select this check box if the virtual machine is to run in stateless mode. The stateless mode is used primarily for desktop virtual machines. Running a stateless desktop or server creates a new COW layer on the virtual machine hard disk image where new and changed data is stored. Shutting down the stateless virtual machine deletes the new COW layer, returning the virtual machine to its original state. This type of virtual machine is useful when creating virtual machines that need to be used for a short time, or by temporary staff.
|
Table 8.3. Virtual Machine: Initial Run Settings
|
Field Name
|
Description
|
|---|---|
|
General - Time Zone
|
The time zone in which the virtual machine is to run. It is not necessarily the time zone for the physical host on which the virtual machine is running.
|
|
Windows - Domain
|
The domain in which the virtual machine is to run. This option is only available when Windows is selected as the operating system on the Virtual Machine - General tab.
|
Table 8.4. Virtual Machine: Console Settings
|
Field Name
|
Description
|
|---|---|
|
Protocol
|
Defines the display protocol to be used. SPICE is the recommended protocol for Linux and Windows virtual machines. Optionally, select VNC for Linux virtual machines. A VNC client is required to connect to a virtual machine using the VNC protocol.
|
|
USB Support
|
Defines whether USB devices can be used on the virtual machine. This option is only available for virtual machines using the SPICE protocol. Select either:
|
|
Monitors
|
The number of monitors for the virtual machine. This option is only available for virtual desktops using the SPICE display protocol. You can choose 1, 2 or 4.
|
|
Disable strict user checking
|
Click the Advanced Parameters arrow and select the checkbox to use this option. With this option selected, the virtual machine does not need to be rebooted when a different user connects to it.
By default, strict checking is enabled so that only one user can connect to the console of a virtual machine. No other user is able to open a console to the same virtual machine until it has been rebooted. The exception is that a superuser can connect at any time and replace a existing connection. When a superuser has connected, no normal user can connect again until the VM is re-booted.
Disable strict checking with caution, because you can expose the previous user's session to the new user
|
Table 8.5. Virtual Machine: Host Settings
|
Field Name
|
Description
|
|---|---|
|
Run On
|
Defines the host on which the virtual machine is to run. Select either:
|
|
Run/Migration Options
|
Defines options to run and migrate the virtual machine. If the options here are not used, the virtual machine will run or migrate according to its cluster's policy.
|
|
CPU Pinning topology
|
Enables the virtual machine's virtual CPU (vCPU) to run on a specific physical CPU (pCPU) in a specific host. This option is not supported if the virtual machine's cluster compatibility version is set to 3.0. The syntax of CPU pinning is
v#p[_v#p], for example:
|
Table 8.6. Virtual Machine: High Availability Settings
|
Field Name
|
Description
|
|---|---|
|
Highly Available
|
Select this check box if the virtual machine is to be highly available. For example, in cases of host maintenance or failure, the virtual machine will be automatically re-run on another host. If the host is manually shut down by the system administrator, the virtual machine is not automatically moved to another host.
|
|
Priority for Run/Migration queue
|
Sets the priority level for the virtual machine to be migrated or restarted on another host.
|
Table 8.7. Virtual Machine: Resource Allocation Settings
|
Field Name
|
Description
|
|---|---|
|
Memory Allocation
|
The amount of physical memory guaranteed for this virtual machine.
|
|
Storage Allocation
|
The Template Provisioning option is only available when the virtual machine is created from a template. Select either:
|
Table 8.8. Virtual Machine: Boot Options Settings
|
Field Name
|
Description
|
|---|---|
|
First Device
|
After installing a new virtual machine, the new virtual machine must go into Boot mode before powering up. Select the first device that the virtual machine must try to boot:
|
|
Second Device
|
Select the second device for the virtual machine to use to boot if the first device is not available. The first device selected in the previous option does not appear in the options.
|
|
Attach CD
|
If you have selected CD-ROM as a boot device, tick this check box and select a CD-ROM image from the drop-down menu. The images must be available in the ISO domain.
|
|
Boot Options
|
Defines the virtual machine's boot sequence, running options, and source images for installing the operating system and required drivers.
|
|
Linux Boot Options
|
The following options boot a Linux kernel directly instead of through the BIOS bootloader.
|
Table 8.9. Virtual Machine: Custom Properties Settings
|
Field Name
|
Description
|
|---|---|
|
sap_agent
|
Enables SAP monitoring on the virtual machine. Set to true or false.
|
|
sndbuf
|
Enter the size of the buffer for sending the virtual machine's outgoing data over the socket. Default value is 0.
|
|
vhost
|
Enter the name of the virtual host on which this virtual machine should run. The name can contain any combination of letters and numbers.
|
|
viodiskcache
|
Caching mode for the virtio disk. writethrough writes data to the cache and the disk in parallel, writeback does not copy modifications from the cache to the disk, and none disables caching.
|
|
memory
|
|
|
smartcard
|
|
Warning
Procedure 8.3. Creating a Cloned Virtual Machine from an Existing Template
- Click the Virtual Machines resource tab to list all the virtual machines in the results list.
- Click the button to open the New Server Virtual Machine window, or the button to open the New Desktop Virtual Machine window.
- Select an existing template from the Based on Template drop-down menu.
- Enter a Name and appropriate Description, and accept the default values inherited from the template in the rest of the fields. You can change them if needed.
- Click the Resource Allocation tab. The template you selected is displayed on the Template Provisioning field. Select Clone.
Select the disk provisioning mode in the Allocation field. This selection impacts both the speed of the clone operation and the amount of disk space it requires.- Selecting
Thin Provisionresults in a faster clone operation and provides optimized usage of storage capacity. Disk space is allocated only as it is required. This is the default selection. - Selecting
Preallocatedresults in a slower clone operation and is optimized for the speed of guest read and write operations. All disk space requested in the template is allocated at the time of the clone operation.
- Select the Target storage domain for the virtual machine.
- Click OK.
Note
It may take some time for the virtual machine to be created because a new copy of the template's disk. During this time, the status of the virtual machine displays asImage Locked, followed byDown.
Procedure 8.4. Completing the Configuration of a Virtual Machine by Defining Network Interfaces and Hard Disks
- On the New Virtual Machine - Guide Me window, click the button to open the New Network Interface window. You can accept the default values or change them as necessary.
Enter the Name of the network interface. - Use the drop-down menus to select the Network and the Type of network interface for the new virtual machine.
Note
The options on the Network and Type fields are populated by the networks available to the cluster, and the NICs available to the virtual machine. - If applicable, select the Port Mirroring and Specify custom MAC address check boxes.
- Select the Activate check box to immediately activate the network interface.
- Click to close the New Network Interface window and open the New Virtual Machine - Guide Me window.
- Click the button to open the New Virtual Disk window.
- Click to close the New Virtual Disk window. The New Virtual Machine - Guide Me window opens with changed context. There is no further mandatory configuration.
- Click to close the window.
Procedure 8.5. Installing an operating system onto a virtual machine
- Select the created virtual machine. It has a status of
Down. - Click the tab to define the boot sequence and source images for installing the operating system.
- Click the tab to define additional boot options specific to Linux virtual machines.
- Click the tab to join the virtual machine to a domain on the initial run.
- Click the tab and select a suitable protocol to connect to the virtual machine. SPICE is the recommended protocol.
- Click the tab to enter additional running options for virtual machines.
- Click .
Table 8.10. Virtual Machine: Run Once Settings
|
Field Name
|
Description
|
|---|---|
|
Boot Options
|
Defines the virtual machine's boot sequence, running options, and source images for installing the operating system and required drivers.
|
|
Linux Boot Options
|
The following options boot a Linux kernel directly instead of through the BIOS bootloader.
|
|
Initial Run
|
Defines the virtual machine's domain and user log in credentials.
|
|
Display Protocol
|
Defines the protocol to connect to virtual machines.
|
|
Custom Properties
|
Additional VDSM options for running virtual machines.
|
- video at more than 30 frames per second
- bi-directional audio (for soft-phones/IP phones)
- bi-directional video (for video telephony/video conferencing)
- connection to multiple monitors with a single virtual machine
- USB redirection from the client's USB port into the virtual machine
Procedure 8.6. Powering on a Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list with a status of
Down. - Click the
icon.
Alternatively, right-click and select .
Up. The display protocol of the selected virtual machine is displayed. If the virtual machine has the rhev-guest-agent installed, its IP address is also displayed.
Procedure 8.7. Installing SPICE Plugins
- If you are using Mozilla Firefox on a Red Hat Enterprise Linux client, manually install the spice-xpi plugin. Open a terminal and run the following command as root:
yum install spice-xpi
Restart Mozilla Firefox for changes to take effect. - If you are using Internet Explorer on a Windows client, you will be prompted to install the SPICE ActiveX component the first time you open a SPICE connection to a virtual machine. Follow the prompts to complete the installation.
Procedure 8.8. Logging in to a virtual machine
- On the Virtual Machines resource tab, select a running virtual machine.
- Click the Console button or right-click the virtual machine and select Console from the menu.
- If the virtual machine's display protocol is set to SPICE, a console window to the virtual machine opens. Log in to the virtual machine's guest operating system.
- If the virtual machine's display protocol is set to VNC, a window containing connection details including the IP address, port number and password required opens. Use the details with your VNC client to connect to the virtual machine.
Powering Off status in the Administration Portal. The virtual machine requires manual intervention to shut it down completely because the following Windows message is displayed on the virtual machine:
Warning
Procedure 8.9. Shutting Down a Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Click the (
) button.
Alternatively, right-click the virtual machine and select Shut down.
Down.
Procedure 8.10. Pausing a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Click the (
) button.
Alternatively, right-click the virtual machine and select Suspend
Paused.
- 8.7.1. Editing a Resource
- 8.7.2. Removing a Virtual Machine
- 8.7.3. Adding and Editing Virtual Machine Disks
- 8.7.4. Adding and Editing Virtual Machine Network Interfaces
- 8.7.5. Explanation of Settings in the Virtual Machine Network Interface Window
- 8.7.6. Hot Plugging Virtual Machine Disks and Network Interfaces
- 8.7.7. Removing Disks and Network Interfaces from Virtual Machines
Procedure 8.11. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Procedure 8.12. Removing a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Shut down the virtual machine. The Remove button is only enabled for a virtual machine that has a status of
Down. - Click to open the Remove Virtual Machine(s) confirmation window.Click to remove the virtual machine and close the window.
Procedure 8.13. Adding Disks to Virtual Machines
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Click the Disks tab in the details pane to display a list of virtual disks currently associated with the virtual machine.
- Click to open the Add Virtual Disk window.
- Use the appropriate radio buttons to switch between Internal and the External (Direct Lun) disks.
- Select the Attach Disk check box to choose an existing disk from the list and select the Activate check box.Alternatively, enter the Size, Alias, and Description of a new disk and use the drop-down menus and check boxes to configure the disk.
- Click to add the disk and close the window.
Procedure 8.14. Adding network interfaces to virtual machines
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Select the Network Interfaces tab in the details pane to display a list of network interfaces that are currently associated with the virtual machine.
- Click to open the New Network Interface window.
- Enter the Name of the network interface.
- Use the drop-down menus to select the Network and the Type of network interface for the new network interface.
Note
The options on the Network and Type fields are populated by the networks available to the cluster, and the NICs available to the virtual machine. - If applicable, select the Port Mirroring and Specify custom MAC address check boxes.
- Select the Activate check box to immediately activate the network interface.
- Click to close the New Network Interface window.
Table 8.11. Add a network interface to a virtual machine entries
|
Field Name
|
Description
|
|---|---|
Name
|
The name of the network interface. This text field has a 21-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Network
|
Logical network that the network interface is placed on. By default, all network interfaces are put on the
rhevm management network.
|
Type
|
The virtual interface the network interface presents to virtual machines. VirtIO is faster but requires VirtIO drivers. Red Hat Enterprise Linux 5 and higher includes VirtIO drivers. Windows does not include VirtIO drivers, but they can be installed from the guest tools ISO or virtual floppy disk. rtl8139 and e1000 device drivers are included in most operating systems.
|
Port Mirroring
|
A security feature that allows all network traffic going to or leaving from virtual machines on a given logical network and host to be copied (mirrored) to the network interface. If the host also uses the network, then traffic going to or leaving from the host is also copied.
Port mirroring only works on network interfaces with IPv4 IP addresses.
|
Specify custom MAC address
|
Choose this option to set a custom MAC address. The Red Hat Enterprise Virtualization Manager automatically generates a MAC address that is unique to the environment to identify the network interface. Having two devices with the same MAC address online in the same network causes networking conflicts.
|
Activate
|
Makes the network interface available to the virtual machine.
|
Procedure 8.15. Hot plugging virtual machine disks and network interfaces
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Select either the Virtual Disks or Network Interfaces tab from the details pane of the virtual machine.
- Select the device you would like to hot plug.
- Click the or button.
Procedure 8.16. Removing disks and network interfaces from virtual machines
- Select the virtual machine with virtual hardware you'd like to remove.
- Select the relevant tab, either Network Interfaces or Disks, from the virtual machine details pane.
- Select the disk or network interface you'd like to remove. To remove it, you must have first Deactivated it.
- Click the button. Click in the confirmation window. If you are removing a disk, select the Remove Permanently option to completely remove it from the environment. If you don't select this option, for example because the disk is a shared disk, it will remain in the Disks resource tab.
- Create, edit, and remove virtual machines; and
- Run, suspend, shutdown, and stop virtual machines.
Note
Table 8.12. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| DataCenterAdmin | Data Center Administrator | Can use, create, delete, manage all virtual machines within a specific data center. |
| ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all virtual machines within a specific cluster. |
Table 8.13. Red Hat Enterprise Virtualization System User Roles
| Role | Privileges | Notes |
|---|---|---|
| UserRole | Can access and use virtual machines and pools. | Can log in to the User Portal and use virtual machines and pools. |
| PowerUserRole | Can create and manage virtual machines and templates. | Apply this role to a user for the whole environment with the Configure window, or for specific data centers or clusters. For example, if a PowerUserRole is applied on a data center level, the PowerUser can create virtual machines and templates in the data center. |
| UserVmManager | System administrator of a virtual machine. | Can manage virtual machines, create and use snapshots, and migrate virtual machines. A user who creates a virtual machine in the User Portal is automatically assigned the UserVmManager role on the machine. |
| UserTemplateBasedVm | Limited privileges to only use Templates. | Level of privilege to create a virtual machine by means of a template. |
| VmCreator | Can create virtual machines in the User Portal. | This role is not applied to a specific virtual machine; apply this role to a user for the whole environment with the Configure window. When applying this role to a cluster, you must also apply the DiskCreator role on an entire data center, or on specific storage domains. |
Note
Procedure 8.17. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 8.18. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Procedure 8.19. Creating a snapshot of a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Select the Snapshots tab in the details pane.
- Click in the left side-pane of the details pane to open the Create Snapshot window.
- Enter a description for the snapshot.
- Click to create the snapshot and close the window.
Locked, which changes to Ok. When you click on the snapshot, its details are shown on the General, Disks, Network Interfaces, and Installed Applications tabs in the right side-pane of the details pane.
Procedure 8.20. Using a snapshot to restore a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select the virtual machine in the results list. Ensure the status is
Powered Down. - Click the Snapshots tab in the details pane to list the available snapshots.
- Select a snapshot to restore in the left side-pane. The snapshot details display in the right side-pane.
- Click to preview the snapshot. The status of the virtual machine briefly changes to
Image Lockedbefore returning toDown. - Start the virtual machine and it will run with the disk image of the snapshot.
- Click Commit to permanently restore the virtual machine to the condition of the snapshot. Any subsequent snapshots are erased.Alternatively, click the Undo button to deactivate the snapshot and return the virtual machine to its previous state.
Procedure 8.21. Creating a virtual machine from a snapshot
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select the virtual machine in the results list. Ensure the status is
Powered Down. - Click the Snapshots tab in the details pane to list the available snapshots for the virtual machines.
- Select a snapshot in the list displayed and click to open the Clone VM from Snapshot window.
- Enter the Name and Description of the virtual machine to be created.
- Click to create the virtual machine and close the window.
Image Locked. The virtual machine will remain in this state until Red Hat Enterprise Virtualization completes the creation of the virtual machine. A virtual machine with a preallocated 20GB hard drive takes about fifteen minutes to create. Sparsely-allocated virtual disks take less time to create than do preallocated virtual disks.
Image Locked to Down in the Virtual Machines tab in the navigation pane.
Procedure 8.22. Deleting a Snapshot
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Click the Snapshots tab in the details pane to list available snapshots for the virtual machine.
- Select the snapshot to delete.
- Click to open the Delete Snapshot confirmation window.
- Click to delete the snapshot and close the window.
- Moving virtual resources between Red Hat Enterprise Virtualization environments.
- Move virtual machines and templates between data centers in a single Red Hat Enterprise Virtualization environment.
- Backing up virtual machines and templates.
- First you export your virtual machines and templates to an export domain.
- Second, you detach the export domain from one data center, and attach it to another. You can attach it to a different data center in the same Red Hat Enterprise Virtualization environment, or attach it to a data center in a separate Red Hat Enterprise Virtualizaiton environment that is managed by another installation of the Red Hat Enterprise Virtualization Manager.
- Third, you import your virtual machines and template into the data center you attached the expord domain to.
Note
- an export domain exists, and is attached to the source data center.
- the virtual machine is shut down.
- if the virtual machine was created from a template, the template resides on the destination data center, or is exported alongside the virtual machine.
Procedure 8.23. Performing an export-import of virtual resources
- Attach the export domain to the source data center.
- Export the virtual resource to the export domain.
- Detach the export domain from the source data center.
- Attach the export domain to the destination Data center.
- Import the virtual resource into the destination data center.
Procedure 8.24. Exporting a Virtual Machine to the Export Domain
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list. Ensure the virtual machine has a status of
Down. - Click to open the Export Virtual Machine window.
- Select the Force Override check box to override existing images of the virtual machine on the export domain.Select the Collapse Snapshots check box to create a single export volume per disk. Selecting this option will remove snapshot restore points and include the template in a template-based virtual machine. This removes any dependencies a virtual machine has on a template.
- Click to export the virtual machine and close the window.
Image Locked status as it is exported. This can take some time. Use the Events tab to view the progress.
Procedure 8.25. Importing a Virtual Machine into the Destination Data Center
- Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list. The export domain must have a status of
Active - Select the VM Import tab in the details pane to list the available virtual machines to import.
- Select one or more virtual machines to import and click to open the Import Virtual Machine(s) window.
- Use the drop-down menus to select the Default Storage Domain, Cluster, and Cluster Quota in the data center.
- Select the Collapse All Snapshots check box to remove snapshot restore points and include templates in template-based virtual machines.
- Click to import the virtual machines.The Import Conflict window opens if the virtual machine exists in the virtualized environment.
- Choose one of the following radio buttons:
- Don't import
- Clone and enter a unique name for the virutal machine in the New Name: field.
Or select the Apply to all check box to import all duplicated virtual machines with the same suffix. - Click OK to import the virtual machines and close the window.
- The source and destination host must both be members of the same cluster, ensuring CPU compatibility between them.
- The source and destination host must have a status of
Up. - The source and destination host must have access to the same virtual networks and VLANs.
- The source and destination host must have access to the data storage domain on which the virtual machine resides.
- There must be enough CPU capacity on the destination host to support the virtual machine's requirements.
- There must be enough RAM on the destination host that is not in use to support the virtual machine's requirements.
Procedure 8.26. Preventing automatic migration of a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine or virtual server in the results list.
- Click Edit to open the Edit Desktop Virtual Machine or Edit Server Virtual Machine window.
- Click the Host tab.
- Use the Run On radio buttons to designate the virtual machine to run on Any Host in Cluster or a Specific host. If applicable, select a specific host from the drop-down menu.
Warning
Explicitly assigning a virtual machine to a specific host and disabling migration is mutually exclusive with Red Hat Enterprise Virtualization high availability. Virtual machines that are assigned to a specific host can only be made highly available using third party high availability products like Red Hat High Availability. - Select the appropriate check boxes to affect the Run/Migration Options.
- Enter any relevant CPU Pinning topology commands in the text field.
- Click to save the changes and close the window.
Procedure 8.27. Manually migrating virtual machines
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.Click Migrate to open the Migrate Virtual Machine(s) window.
- Use the radio buttons to select whether to Select Host Automatically or to Select Destination Host, specifying the host using the drop-down menu.
Note
Virtual Machines migrate within their designated host cluster. When the Select Host Automatically option is selected, the system determines the host to which the virtual is migrated according to the load balancing and power management rules set up in the cluster policy. - Click to commence migration and close the window.
Note
Procedure 8.28. Setting Migration Priority
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual server in the results list.
- Click to open the Edit Server Virtual Machine window.
- Select the High Availability tab.
- Use the radio buttons to set the Priority for Run/Migrate Queue of the virtual machine to one of Low, Medium, or High.
- Click to save changes and close the window.
Procedure 8.29. Cancelling ongoing virtual machine migrations
- Select the migrating virtual machine. It is displayed in the Virtual Machines resource tab with a status of Migrating from.
- Click the button at the top of the results list. Alternatively, right-click on the virtual machine and select Cancel Migration from the context menu.
- When a host becomes non-operational due to hardware failure.
- When a host is put into maintenance mode for scheduled downtime.
- When a host becomes unavailable because it has lost communication with an external storage resource.
- When a virtual machine fails due to an operating system crash.
- Power management must be configured for the hosts running the highly available virtual machines.
- The host running the highly available virtual machine must be part of a cluster which has other available hosts.
- The destination host must be running.
- The source and destination host must have access to the data domain on which the virtual machine resides.
- The source and destination host must have access to the same virtual networks and VLANs.
- There must be enough CPUs on the destination host that are not in use to support the virtual machine's requirements.
- There must be enough RAM on the destination host that is not in use to support the virtual machine's requirements.
Note
Procedure 8.30. Configuring a Highly Available Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual server in the results list.
- Click to open the Edit Server Virtual Machine window.
- Click the High Availability tab.
- Select the Highly Available check box to enable high availability for the virtual server.
- Use the radio buttons to set the Priority for Run/Migrate Queue of the virtual machine to one of Low, Medium, or High. When migration is triggered, a queue is created in which the high priority virtual machines are migrated first. If a cluster is running low on resources, only the high priority virtual machines are migrated.
- Click to save changes and close the window.
Procedure 8.31. Enabling SAP monitoring for a Virtual Machine from the Administration Portal
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine with a status of
Downin the results list. - Click button to open the Edit Virtual Machine window.
- Select the Custom Properties tab.
- Use the drop-down menu to select
sap_agent. Ensure the secondary drop-down menu is set to True.If previous properties have been set, select the plus sign to add a new property rule and selectsap_agent. - Click to save changes and close the window.
Note
Procedure 8.32. Installing qxl drivers on a virtual machine
- Log in to a Red Hat Enterprise Linux virtual machine.
- Open a terminal.
- Run the following command as root:
#
yum install xorg-x11-drv-qxl
Procedure 8.33. Configuring qxl drivers in GNOME
- Click System.
- Click Administration.
- Click Display.
- Click the Hardware tab.
- Click Video Cards Configure.
- Select qxl and click OK.
- Restart X-Windows by logging out of the virtual machine and logging back in.
Procedure 8.34. Configuring qxl drivers on the command line:
- Back up
/etc/X11/xorg.conf:#
cp /etc/X11/xorg.conf /etc/X11/xorg.conf.$$.backup - Make the following change to the Device section of
/etc/X11/xorg.conf:Section "Device" Identifier "Videocard0" Driver "qxl" Endsection
/etc/X11/xorg.conf file to enable SPICE for your virtual machine's tablet devices.
Procedure 8.35. Configuring a virtual machine's tablet and mouse to use SPICE
- Verify that the tablet device is available on your guest:
#
If there is no output from the command, do not continue configuring the tablet./sbin/lsusb -v | grep 'QEMU USB Tablet' - Back up
/etc/X11/xorg.confby running this command:#
cp /etc/X11/xorg.conf /etc/X11/xorg.conf.$$.backup - Make the following changes to /etc/X11/xorg.conf:
Section "ServerLayout" Identifier "single head configuration" Screen 0 "Screen0" 0 0 InputDevice "Keyboard0" "CoreKeyboard" InputDevice "Tablet" "SendCoreEvents" InputDevice "Mouse" "CorePointer" EndSection Section "InputDevice" Identifier "Mouse" Driver "void" #Option "Device" "/dev/input/mice" #Option "Emulate3Buttons" "yes" EndSection Section "InputDevice" Identifier "Tablet" Driver "evdev" Option "Device" "/dev/input/event2" Option "CorePointer" "true" EndSection
- Log out and log back into the virtual machine to restart X-Windows.
pvclock provides a stable source of timing for KVM guests that support it.
- Clocks can fall out of synchronization with the actual time which invalidates sessions and affects networks.
- Virtual machines with slower clocks may have issues migrating.
Important
ntpd service:
# service ntpd start
# chkconfig ntpd on
ntpd service should minimize the affects of clock skew in all cases.
constant_tsc flag is present. To determine if your CPU has the constant_tsc flag run the following command:
$ cat /proc/cpuinfo | grep constant_tsc
constant_tsc bit. If no output is given follow the instructions below.
Important
constant_tsc bit, disable all power management features (BZ#513138). Each system has several timers it uses to keep time. The TSC is not stable on the host, which is sometimes caused by cpufreq changes, deep C state, or migration to a host with a faster TSC. Deep C sleep states can stop the TSC. To prevent the kernel using deep C states append "processor.max_cstate=1" to the kernel boot options in the grub.conf file on the host:
term Red Hat Enterprise Linux Server (2.6.18-159.el5)
root (hd0,0)
kernel /vmlinuz-2.6.18-159.el5 ro root=/dev/VolGroup00/LogVol00 rhgb quiet processor.max_cstate=1cpufreq (only necessary on hosts without the constant_tsc) by editing the /etc/sysconfig/cpuspeed configuration file and change the MIN_SPEED and MAX_SPEED variables to the highest frequency available. Valid limits can be found in the /sys/devices/system/cpu/cpu*/cpufreq/scaling_available_frequencies files.
rhevm-config tool to recive alerts when hosts drift out of sync.rhevm-config tool to configure alerts when your hosts drift out of sync.
EnableHostTimeDrift and HostTimeDriftInSec. EnableHostTimeDrift, with a default value of false, can be enabled to recieve alert notifications of host time drift. The HostTimeDriftInSec parameter is used to set the maximum allowable drift before alerts start being sent.
Note
ktune package
ktune package provides an interactive Bourne shell script, fix_clock_drift.sh. When run as the superuser, this script inspects various system parameters to determine if the virtual machine on which it is run is susceptible to clock drift under load. If so, it then creates a new grub.conf.kvm file in the /boot/grub/ directory. This file contains a kernel boot line with additional kernel parameters that allow the kernel to account for and prevent significant clock drift on the KVM virtual machine. After running fix_clock_drift.sh as the superuser, and once the script has created the grub.conf.kvm file, then the virtual machine's current grub.conf file should be backed up manually by the system administrator, the new grub.conf.kvm file should be manually inspected to ensure that it is identical to grub.conf with the exception of the additional boot line parameters, the grub.conf.kvm file should finally be renamed grub.conf, and the virtual machine should be rebooted.
| Red Hat Enterprise Linux | Additional virtual machine kernel parameters |
|---|---|
| 5.4 AMD64/Intel 64 with the para-virtualized clock | Additional parameters are not required |
| 5.4 AMD64/Intel 64 without the para-virtualized clock | notsc lpj=n |
| 5.4 x86 with the para-virtualized clock | Additional parameters are not required |
| 5.4 x86 without the para-virtualized clock | clocksource=acpi_pm lpj=n |
| 5.3 AMD64/Intel 64 | notsc |
| 5.3 x86 | clocksource=acpi_pm |
| 4.8 AMD64/Intel 64 | notsc |
| 4.8 x86 | clock=pmtmr |
| 3.9 AMD64/Intel 64 | Additional parameters are not required |
| 3.9 x86 | Additional parameters are not required |
boot.ini file:
/use pmtimer
Note
Sysprep (or a similar tool) to seal the virtual machine and remove "specific" personalization. Failure to do so will cause conflicts when running multiple virtual machines from an unsealed Windows template. In general, templates of Linux virtual machines do not require sealing.
Procedure 9.1. Creating a Template from an Existing Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select the virtual machine in the results list.
- Ensure that the virtual machine is powered down and has a status of
Down.Note
Take a snapshot of the virtual machine at this stage if you wish to use the virtual machine (as a virtual machine) after using it to create a template. - Click to open the New Template window.
- Enter the Name and Description of the template.
- Select the Host Cluster and storage Target from the drop-down menus; by default, these are set the same as the source virtual machine.
- The Allow all users to access this Template check box is selected by default, which makes it public.
- Click to create the template. The virtual machine displays a status of
Image Lockedwhile the template is being created; this may take up to an hour, depending on the virtual machine disk image size and your storage hardware.
Table 9.1. New and Edit Template Properties
|
Field
|
Description/Action
|
|---|---|
Name
|
The name of the template. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Description
|
The description of the template. This field is recommended but not mandatory.
|
Host Cluster
|
The cluster with which the template will be associated. This is the same as the original virtual machines by default; you can select from any cluster in the data center.
|
Target
|
The storage domain with which the template will be associated. This is the same as the original virtual machines by default; you can select from any storage domain in the data center.
|
Allow all users to access the Template
|
A public template can be accessed by all users.
A private template can only be accessed by TemplateAdmin and the SuperUser.
|
Procedure 9.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Warning
Procedure 9.3. Deleting a Template
- Use the resource tabs, tree mode, or the search function to find and select the template in the results list.
- Click to open the Remove Template(s) window.
- Click to remove the template.
Procedure 9.4. Exporting Individual Templates to the Export Domain
- Use the Templates resource tab, tree mode, or the search function to find and select the template in the results list.
- Click to open the Export Template window.
Note
Select the Force Override check box to replace any earlier version of the template on the export domain. - Click to begin exporting the template; this may take up to an hour, depending on the virtual machine disk image size and your storage hardware.
- Repeat these steps until the export domain contains all the templates to migrate before you start the import process.Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list and click the Template Import tab in the details pane to view all exported templates in the export domain.
Procedure 9.5. Importing a Template into a Data Center
- Use the resource tabs, tree mode, or the search function to find and select the newly attached export domain in the results list.
- Select the Template Import tab of the details pane to display the templates that migrated across with the export domain.
- Select a template and click to open the Import Template(s) window.
- Select the templates to import.
- Use the drop-down menus to select the Destination Cluster and Storage domain. Alter the Suffix if applicable.Alternatively, clear the Clone All Templates check box.
- Click OK to import templates and open a notification window. Click to close the notification window.
Procedure 9.6. Sealing a Linux Virtual Machine
- Log in to the virtual machine. Flag the system for re-configuration by running the following command as root:
# touch /.unconfigured - Remove ssh host keys. Run:
# rm -rf /etc/ssh/ssh_host_* - Set
HOSTNAME=localhost.localdomainin/etc/sysconfig/network - Remove /etc/udev/rules.d/70-*. Run:
# rm -rf /etc/udev/rules.d/70-* - Remove the
HWADDR=line from/etc/sysconfig/network-scripts/ifcfg-eth*. - Optionally delete all the logs from
/var/logand build logs from/root. - Shut down the virtual machine. Run:
# poweroff
Important
Sysprep process, verify the following settings are configured:
- The Windows Sysprep parameters have been correctly defined.If not, click and enter the required information in the Operating System and Domain fields.
- The correct product key has been entered in the
rhevm-configconfiguration tool.If not, run the configuration tool on the Manager as the root user, and enter the required information. The configuration keys that you need to set areProductKeyandSysPrepPath. For example, the Windows 7 configuration value isProductKeyWindow7andSysPrepWindows7Path. Set these values with this command:# rhevm-config --set ProductKeyWindow7=<validproductkey> --cver=general
Note
Procedure 9.7. Sealing a Windows XP Template
- Download
sysprepto the virtual machine to be used as a template.The Windows XP Sysprep tool is available at http://www.microsoft.com/download/en/details.aspx?id=11282 - Create a new directory:
c:\sysprep. - Open the
deploy.cabfile and add its contents toc:\sysprep. - Execute
sysprep.exefrom within the folder and click on the welcome message to display the Sysprep tool. - Select the following check boxes:
- Don't reset grace period for activation
- Use Mini-Setup
- Ensure that the shutdown mode is set to
Shut downand click . - Acknowledge the pop-up window to complete the sealing process; the virtual machine shuts down automatically upon completion.
Procedure 9.8. Sealing a Windows 7 or Windows 2008 Template
- In the virtual machine to be used as a template, open a command line terminal and type
regedit. - The Registry Editor window opens. On the left pane, expand → → .
- On the main window, right-click to add a new string value using → .
- Right-click on the file and select Modify to open the Edit String window.
- Enter the following information in the provided fields:
- Value name:
UnattendFile - Value data:
a:\sysprep.inf
- Launch Sysprep from
C:\Windows\System32\sysprep\sysprep.exe. - Enter the following information into the Sysprep tool:
- Under System Cleanup Action, select Enter System Out-of-Box-Experience (OOBE).
- Select the Generalize check box if you need to change the computer's system identification number (SID).
- Under Shutdown Options, select Shutdown.
Click to complete the sealing process; the virtual machine shuts down automatically upon completion.
- Create, edit, export, and remove associated templates; and
- import and export templates.
Note
Table 9.2. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| TemplateAdmin | Can perform all operations on templates. | Has privileges to create, delete and configure templates' storage domains and network details, and to move templates between domains. |
Table 9.3. Red Hat Enterprise Virtualization Template User Roles
| Role | Privileges | Notes |
|---|---|---|
| TemplateCreator | Can create, edit, manage and remove virtual machine templates within assigned resources. | The TemplateCreator role is not applied to a specific template; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers, clusters, or storage domains. |
| TemplateOwner | Can edit and delete the template, assign and manage user permissions for the template. | The TemplateOwner role is automatically assigned to the user who creates a template. |
| UserTemplateBasedVm | Can use the template to create virtual machines. | Cannot edit template properties. |
Procedure 9.9. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 9.10. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Procedure 10.1. Creating a Virtual Machine Pool
- In flat mode, click the Pools resource tab to display a list of virtual machine pools.
- Click the button to open the New Pool window.
- Use the drop-down menus to select the Data Center and Host Cluster.
- Enter the Name, Description, and Number of VMs for the pool.
- If applicable, use the drop-down menu to select a template.
- Enter the Memory Size to be used for each virtual machine in the pool and the Total Virtual CPUs.
- If applicable, click the Advanced Parameters expansion button and use the drop-down menus to select the Cores per Virtual Socket and Virtual Sockets.
- Use the drop-down menu to select the Operating System to be used for the virtual machines in the pool.
- In the Pool tab, select one of the following pool types:
- Manual - The administrator is responsible for explicitly returning the virtual machine to the pool. The virtual machine reverts to the original base image after the administrator returns it to the pool.
- Automatic - When the virtual machine is shut down, it automatically reverts to its base image and is returned to the virtual machine pool.
- The Initial Run, Console, Host, Resource Allocation, Boot Options, and Custom Properties tabs are not mandatory but define options for your pool. These tabs feature identical settings and controls as the New Virtual Machines window.
- Click to create the pool.
Procedure 10.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Procedure 10.3. Prestarting Virtual Machines in a Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Click to open the Edit Pool window.
- Enter the number of virtual machines to be prestarted in the Prestarted VMs field.
- Select the Pool tab. Ensure that the Pool Type is set to Automatic.
- Click .
Procedure 10.4. Adding Virtual Machines to a Virtual Machine Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Click to open the Edit Pool window.
- Enter the number of additional virtual machines to add in the Increase number of VMs in pool by field.
- Click .The total number of virtual machines in the pool has increased.
Procedure 10.5. Detaching Virtual Machines from a Virtual Machine Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Ensure the virtual machine has a status of
Downas you cannot detach a running virtual machine.Click the Virtual Machines tab in the details pane to list the virtual machines in the pool. - Select the virtual machine that you want to remove and click to open the Detach Virtual Machine(s) confirmation window.
- Click to detach the virtual machine from the pool.
Note
The virtual machine still exists in the environment and can be viewed and accessed from the Virtual Machines resource tab. Note that the icon changes to denote that the detached virtual machine is an independent virtual machine.
Procedure 10.6. Removing a Virtual Machine Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Click to open the Remove Pool(s) confirmation window.
- Click to remove the pool.
- Create, edit, and remove pools; and
- Add and detach virtual machines from the pool.
Note
Table 10.1. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| VmPoolAdmin | System Administrator role of a virtual pool. | Can create, delete, and configure a virtual pool, assign and remove virtual pool users, and perform basic operations on a virtual machine. |
| ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all virtual machine pools in a specific cluster. |
Procedure 10.7. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 10.8. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 11.1. Understanding Virtual Machine Storage
- 11.2. Understanding Virtual Disks
- 11.3. Shareable Disks in Red Hat Enterprise Virtualization
- 11.4. Creating Unassociated Virtual Machine Hard Disks
- 11.5. Explanation of Settings in the New Virtual Machine Disk and Edit Virtual Machine Disk Windows
- 11.6. Moving a Virtual Machine Hard Disk Between Data Domains
- 11.7. Virtual Disks and Permissions
kpartx, vgscan, vgchange and mount to investigate the virtual machine's processes or problems.
- PreallocatedA preallocated virtual disk has reserved storage of the same size as the virtual disk itself. The backing storage device (file/block device) is presented as is to the virtual machine with no additional layering in between. This results in better performance because no storage allocation is required during runtime.On SAN (iSCSI, FCP) this is achieved by creating a block device with the same size as the virtual disk. On NFS this is achieved by filling the backing hard disk image file with zeros. Preallocating storage on an NFS storage domain presumes that the backing storage is not Qcow2 formatted and zeroes will not be deduplicated in the hard disk image file. (If these assumptions are incorrect, do not select Preallocated for NFS virtual disks).
- Thin ProvisionedFor sparse virtual disks backing storage is not reserved and is allocated as needed during runtime. This allows for storage over commitment under the assumption that most disks are not fully utilized and storage capacity can be utilized better. This requires the backing storage to monitor write requests and can cause some performance issues. On NFS backing storage is achieved simply by using files. On SAN this is achieved by creating a block device smaller than the virtual disk's defined size and communicating with the hypervisor to monitor necessary allocations. This does not require support from the underlying storage devices.
Table 11.1. Permitted Storage Combinations
| Storage | Format | Type | Note |
|---|---|---|---|
| NFS or iSCSI/FCP | RAW or Qcow2 | Sparse or Preallocated | |
| NFS | RAW | Preallocated | A file with an initial size which equals the amount of storage defined for the virtual disk, and has no formatting. |
| NFS | RAW | Sparse | A file with an initial size which is close to zero, and has no formatting. |
| NFS | Qcow2 | Sparse | A file with an initial size which is close to zero, and has RAW formatting. Subsequent layers will be Qcow2 formatted. |
| SAN | RAW | Preallocated | A block device with an initial size which equals the amount of storage defined for the virtual disk, and has no formatting. |
| SAN | Qcow2 | Preallocated | A block device with an initial size which equals the amount of storage defined for the virtual disk, and has Qcow2 formatting. |
| SAN | Qcow2 | Sparse | A block device with an initial size which is much smaller than the size defined for the VDisk (currently 1GB), and has Qcow2 formatting for which space is allocated as needed (currently in 1GB increments). |
Procedure 11.1. Creating Unassociated Virtual Machine Hard Disks
- Select the Disks resource tab.
- Click to open the Add Virtual Disk window.
- Use the radio buttons to select Internal or External(Direct Lun).
- Enter the Size(GB), Alias, and Description of the virtual disk.
- Use the drop-down menus to select the Interface, Format, Data Center, and Storage Domain of the virtual disk.
- Select the appropriate check boxes to wipe the disk after delete, make the disk bootable, and make the disk shareable.
- Click OK to create the virtual disk and close the window.
Table 11.2. Add a disk settings: Internal
|
Field Name
|
Description
|
|---|---|
Size(GB)
|
Size of new virtual disk in GB.
|
Alias
|
The name of the template, limited to 40 characters.
|
Description
|
Optionally describe the new virtual disk.
|
Interface
|
The virtual interface the disk presents to virtual machines. VirtIO is faster but requires VirtIO drivers. Red Hat Enterprise Linux 5 and higher includes VirtIO drivers. Windows does not include VirtIO drivers, but they can be installed from the guest tools ISO or virtual floppy disk. IDE devices do not require special drivers.
|
Format
|
The provisioning policy for the new virtual disk. Preallocated allots the entire size of the disk on the data domain at creation time. Thin provision starts at 1 GB and sets a maximum limit on the size the disk can grow to. Preallocated disks take more time to create than thin provisioned ones, but have better read and write performance. Preallocated is the recommended format for server disks. Thin provisioned disks are faster to create and allow for storage over-commitment. Thin provisioned is the recommended format for desktop disks.
|
Data Center
|
The data center in which this disk is available.
|
Storage Domain
|
The data domain that the disk is stored on.
|
Wipe after delete
|
Enhanced security for deletion of sensitive material when the disk is deleted.
|
Is bootable
|
Sets the bootable flag on the disk.
|
Is shareable
|
This disk can be attached to more than one virtual machine at a time.
|
Size(GB) and some additional entries.
Table 11.3. Add a disk settings: External(Direct LUN)
|
Field Name
|
Description
|
|---|---|
Use Host
|
The host to use to mount the LUN.
|
Storage Type
|
Type of external LUN to add. Either iSCSI or Fibre Channel targets are allowed.
|
Discover Targets
|
Can be expanded when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
Address
|
The hostname or IP address of the target server. The
Address field is visible when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
Port
|
The port that has been opened on the target server. The default is 3260. The
Port field is visible when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
User Authentication
|
The iSCSI server requires User Authentication.The
User Authentication field is visible when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
CHAP username and password
|
The username and password of a user with permission to login to LUNs. The
CHAP username and password fields are accessible when you are using password protected iSCSI external LUNs and Targets > LUNs is selected.
|
Fill in all the fields correctly and your external LUNs are displayed to be used as virtual disks.
Procedure 11.2. Moving a Virtual Machine Hard Disk Between Data Domains
- Select the Disks resource tab.
- Select the virtual disk or disks to move.
- Click Move to open the Move Disk(s) window.
- Use the drop-down menu or menus to select the Target data domain.
- Click to move the disks and close the window.
Locked status while being moved. Upon completion, the virtual disk has been moved from the source domain to the target domain.
- Create, edit, and remove virtual disks associated with a virtual machine or other resources; and
- Edit user permissions for virtual disks.
Note
Table 11.4. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| DiskOperator | Virtual disk user. | Can use, view and edit virtual disks. Inherits permissions to use the virtual machine to which the virtual disk is attached. |
| DiskCreator | Can create, edit, manage and remove virtual machine disks within assigned clusters or data centers. | This role is not applied to a specific virtual disk; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers, clusters, or storage domains. |
Procedure 11.3. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 11.4. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Table of Contents
- 12. Users and Roles
- 13. Quotas
- 13.1. Introduction to Quota
- 13.2. Shared Quota and Individually-defined Quota
- 13.3. Quota Accounting
- 13.4. Enabling and Changing a Quota Mode in a Data Center
- 13.5. Creating a New Quota Policy
- 13.6. Explanation of Quota Threshold Settings
- 13.7. Assigning a Quota to an Object
- 13.8. Using Quota to Limit Resources by User
- 13.9. Editing Quotas
- 13.10. Removing Quotas
- 14. Event Notifications
- 15. Updating the Red Hat Enterprise Virtualization Environment
- 16. Reports, History Database Reports, and Dashboards
admin user which resides in the internal domain created during installation.
User roles and admin roles can be assigned to RHEVM users for individual resources like virtual machines and hosts, or on a hierarchy of objects like clusters and data centers.
admin. This account is intended for use when initially configuring the environment, and for troubleshooting. To add other users to Red Hat Enterprise Virtualization you will need to attach a directory server to the Manager using the Domain Management Tool, rhevm-manage-domains.
user@domain. Attachment of more than one directory server to the Manager is also supported.
- Active Directory;
- Identity, Policy, Audit (IPA); and
- Red Hat Directory Server 9 (RHDS 9).
- A valid pointer record (PTR) for the directory server's reverse look-up address.
- A valid service record (SRV) for LDAP over TCP port
389. - A valid service record (SRV) for Kerberos over TCP port
88. - A valid service record (SRV) for Kerberos over UDP port
88.
rhevm-manage-domains.
- Active Directory - http://technet.microsoft.com/en-us/windowsserver/dd448614.
- Identity, Policy, Audit (IPA) - http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/index.html
- Red Hat Directory Server (RHDS) - http://docs.redhat.com/docs/en-US/Red_Hat_Directory_Server/index.html
Important
Important
Important
sysprep in the creation of Templates and Virtual Machines, then the Red Hat Enterprise Virtualization administrative user must be delegated control over the Domain to:
- Join a computer to the domain
- Modify the membership of a group
Note
- Configure the
memberOfplug-in for RHDS to allow group membership. In particular ensure that the value of thememberofgroupattrattribute of thememberOfplug-in is set touniqueMember.Consult the Red Hat Directory Server 9.0 Plug-in Guide for more information on configuring thememberOfplug-in. - Define the directory server as a service of the form
ldap/in the Kerberos realm. Replacehostname@REALMNAMEhostnamewith the fully qualified domain name associated with the directory server andREALMNAMEwith the fully qualified Kerberos realm name. The Kerberos realm name must be specified in capital letters. - Generate a
keytabfile for the directory server in the Kerberos realm. Thekeytabfile contains pairs of Kerberos principals and their associated encrypted keys. These keys will allow the directory server to authenticate itself with the Kerberos realm.Consult the documentation for your Kerberos principle for more information on generating akeytabfile. - Install the
keytabfile on the directory server. Then configure RHDS to recognize thekeytabfile and accept Kerberos authentication using GSSAPI.Consult the Red Hat Directory Server 9.0 Administration Guide for more information on configuring RHDS to use an externalkeytabfile. - Test the configuration on the directory server by using the
kinitcommand to authenticate as a user defined in the Kerberos realm. Once authenticated run theldapsearchcommand against the directory server. Use the-Y GSSAPIparameters to ensure the use of Kerberos for authentication.
- The user performing the action
- The type of action being performed
- The object on which the action is being performed
user must have the appropriate permission for the object being acted upon. Each type of action corresponds to a permission. There are many different permissions in the system, so for simplicity:
Important
- Administrator Role: Allows access to the Administration Portal for managing physical and virtual resources. An administrator role does not confer any permissions for the User Portal.
- User Role: Allows access to the User Portal for managing and accessing virtual machines and templates. A user role does not confer any permissions for the Administration Portal.
administrator role on a cluster, you can manage all virtual machines in the cluster using the Administration Portal. However, you cannot access any of these virtual machines in the User Portal; this requires a user role.
Table 12.1. Red Hat Enterprise Virtualization User Roles - Basic
| Role | Privileges | Notes |
|---|---|---|
| UserRole | Can access and use virtual machines and pools. | Can log in to the User Portal, use assigned virtual machines and pools, view virtual machine state and details. |
| PowerUserRole | Can create and manage virtual machines and templates. | Apply this role to a user for the whole environment with the Configure window, or for specific data centers or clusters. For example, if a PowerUserRole is applied on a data center level, the PowerUser can create virtual machines and templates in the data center. |
| UserVmManager | System administrator of a virtual machine. | Can manage virtual machines, create and use snapshots, and migrate virtual machines. A user who creates a virtual machine in the User Portal is automatically assigned the UserVmManager role on the machine. |
Note
Table 12.2. Red Hat Enterprise Virtualization User Roles - Advanced
| Role | Privileges | Notes |
|---|---|---|
| UserTemplateBasedVm | Limited privileges to only use Templates. | Can use templates to create virtual machines. |
| DiskOperator | Virtual disk user. | Can use, view and edit virtual disks. Inherits permissions to use the virtual machine to which the virtual disk is attached. |
| VmCreator | Can create virtual machines in the User Portal. | This role is not applied to a specific virtual machine; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers or clusters. When applying this role to a cluster, you must also apply the DiskCreator role on an entire data center, or on specific storage domains. |
| TemplateCreator | Can create, edit, manage and remove virtual machine templates within assigned resources. | This role is not applied to a specific template; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers, clusters, or storage domains. |
| DiskCreator | Can create, edit, manage and remove virtual machine disks within assigned clusters or data centers. | This role is not applied to a specific virtual disk; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers or storage domains. |
| TemplateOwner | Can edit and delete the template, assign and manage user permissions for the template. | This role is automatically assigned to the user who creates a template. |
Table 12.3. Red Hat Enterprise Virtualization System Administrator Roles - Basic
| Role | Privileges | Notes |
|---|---|---|
| SuperUser | System Administrator of the Red Hat Enterprise Virtualization environment. | Has full permissions across all objects and levels, can manage all objects across all data centers. |
| ClusterAdmin | Cluster Administrator. | Can use, create, delete, manage all resources in a cluster, including hosts, templates and virtual machines. |
| DataCenterAdmin | Data Center Administrator. | Can use, create, delete, manage all resources in a data center, including clusters, hosts, templates and virtual machines. |
Table 12.4. Red Hat Enterprise Virtualization System Administrator Roles - Advanced
| Role | Privileges | Notes |
|---|---|---|
| TemplateAdmin | Administrator of a virtual machine template. | Can create, delete, and configure the storage domains and network details of templates, and move templates between domains. |
| StorageAdmin | Storage Administrator. | Can create, delete, configure, and manage an assigned storage domain. |
| HostAdmin | Host Administrator. | Can attach, remove, configure, and manage a specific host. |
| NetworkAdmin | Network Administrator. | Can configure and manage the network of a particular data center, cluster, or host. A network administrator of a data center or cluster inherits network permissions for virtual pools within the cluster. |
| VmPoolAdmin | System Administrator of a virtual pool. | Can create, delete, and configure a virtual pool; assign and remove virtual pool users; and perform basic operations on a virtual machine in the pool. |
| GlusterAdmin | Gluster Storage Administrator. | Can create, delete, configure, and manage Gluster storage volumes. |
Procedure 12.1. Adding Users to Red Hat Enterprise Virtualization
- Click the Users tab to display the list of authorized users.
- Click . The Add Users and Groups window opens.
- In the Search drop down menu, select the appropriate domain. Enter a name or part of a name in the search text field, and click . Alternatively, click to view a list of all users and groups.
- Select the check boxes for the appropriate users or groups.
- Click .
Procedure 12.2. Viewing User Information
- Click the Users tab to display the list of authorized users.
- Select the user, or perform a search if the user is not visible on the results list.
- The details pane displays for the selected user, usually with the General tab displaying general information, such as the domain name, email and status of the user.
- The other tabs allow you to view groups, permissions, quotas, and events for the user.For example, to view the groups to which the user belongs, click the Directory Groups tab.
Procedure 12.3. Viewing User Permissions on Resources
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Permissions tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
Procedure 12.4. Removing Users
- Select the user to be removed. Ensure the user is not running any virtual machines.
- Click the button. A message displays prompting you to confirm the removal. Click .
Procedure 12.5. Creating a New Role
- On the header bar, click the Configure button to open the Configure window. The window shows a list of default User and Administrator roles, and any custom roles.
- Click New. The New Role dialog box displays.
- Enter the Name and Description of the new role.
- Select either Admin or User as the Account Type.
- Use the or buttons to view more or fewer of the permissions for the listed objects in the Check Boxes to Allow Action list. You can also expand or collapse the options for each object.
- For each of the objects, select or deselect the actions you wish to permit or deny for the role you are setting up.
- Click to apply the changes you have made. The new role displays on the list of roles.
Procedure 12.6. Editing or Copying a Role
- On the header bar, click the Configure button to open the Configure window. The window shows a list of default User and Administrator roles, and any custom roles.
- Select the role you wish to change. Click Edit to open the Edit Role window, or click Copy to open the Copy Role window.
- If necessary, edit the Name and Description of the role.
- Use the or buttons to view more or fewer of the permissions for the listed objects. You can also expand or collapse the options for each object.
- For each of the objects, select or deselect the actions you wish to permit or deny for the role you are editing.
- Click to apply the changes you have made.
Example 12.1. Cluster Permissions
cluster called Accounts. She is assigned the ClusterAdmin role on the accounts cluster. This enables her to manage all virtual machines in the cluster, since the virtual machines are child objects of the cluster. Managing the virtual machines includes editing, adding, or removing virtual resources such as disks, and taking snapshots. It does not allow her to manage any resources outside this cluster. Because ClusterAdmin is an administrator role, it allows her to use the Administration Portal to manage these resources, but does not give her any access via the User Portal.
Example 12.2. VM PowerUser Permissions
johndesktop for him. John is assigned the UserVmManager role on the johndesktop virtual machine. This allows him to access this single virtual machine using the User Portal. Because he has UserVmManager permissions, he can modify the virtual machine and add resources to it, such as new virtual disks. Because UserVmManager is a user role, it does not allow him to use the Administration Portal.
Example 12.3. Data Center Power User Role Permissions
PowerUserRole permissions for the data center in which her new virtual machine will reside. This is because to create a new virtual machine, she needs to make changes to several components within the data center, including creating the virtual machine disk image in the storage domain.
DataCenterAdmin privileges to Penelope. As a PowerUser for a data center, Penelope can log in to the User Portal and perform virtual machine-specific actions on virtual machines within the data center. She cannot perform data center-level operations such as attaching hosts or storage to a data center.
Example 12.4. Custom Role Permissions
The custom role shown above allows manipulation of users, permissions and roles. These actions are organized under
System - the top level object of the hierarchy shown in Figure 12.7, “UserManager Custom Role”. This means they apply to all other objects in the system. The role is set to have an Account Type of Admin. This means that when she is assigned this role, Rachel can only use the Administration Portal, not the User Portal.
- 13.1. Introduction to Quota
- 13.2. Shared Quota and Individually-defined Quota
- 13.3. Quota Accounting
- 13.4. Enabling and Changing a Quota Mode in a Data Center
- 13.5. Creating a New Quota Policy
- 13.6. Explanation of Quota Threshold Settings
- 13.7. Assigning a Quota to an Object
- 13.8. Using Quota to Limit Resources by User
- 13.9. Editing Quotas
- 13.10. Removing Quotas
Table 13.1. The Two Different Kinds of Quota
| Quota type | Definition |
|---|---|
| Run-time Quota | This quota limits the consumption of run time resources, like CPU and memory. |
| Storage Quota | This quota limits the amount of storage available. |
Table 13.2. Quota Modes
| Quota Mode | Function |
|---|---|
| Enforced | This mode puts into effect the Quota that you have set in audit mode, limiting resources to the group or user affected by the Quota. |
| Audit | This mode allows you to change Quota settings. Choose this mode to increase or decrease the amount of run-time quota and the amount of storage quota available to users affected by the Quota. |
| Disabled | This mode turns off the run-time and storage limitations defined by the Quota. |
Important
Example 13.1. Accounting example
Procedure 13.1. Enabling and Changing Quota in a Data Center
- Click the Data Center tab in the Navigation Pane.
- From the list of data centers displayed in the Navigation Pane, choose the data center whose Quota policy you plan to edit.
- Click in the top left of the Navigation Pane.
- In the Quota drop-down, change Quota mode to
Audit. - Click the OK button.
Procedure 13.2. Creating a New Quota Policy
- In tree mode, select the data center. The Quota tab appears in the Navigation Pane.
- Click the Quota tab at the top of the Navigation Pane.
- Click in the top left of the Navigation Pane. The New Quota window opens.
- Fill in the Name field with a meaningful name.Fill in the Description field with a meaningful name.
- In the Memory & CPU section of the New Quota window, use the green slider to set
Cluster Threshold. - In the Memory & CPU section of the New Quota window, use the blue slider to set
Cluster Grace. - Click on the bottom-right of the
Memory & CPUfield. - Under the
Memory:field, select either theUnlimitedradio button (to allow limitless use of Memory resources in the cluster), or select thelimit toradio button to set the amount of memory set by this quota. If you select thelimit toradio button, input a memory quota in megabytes (MB) in theMBfield. - Under the
CPUfield, select either theUnlimitedradio button or thelimit toradio button to set the amount of CPU set by this quota. If you select thelimit toradio button, input a number of vCPUs in thevCpusfield. - Click in the bottom-right of the
Edit Quotawindow. - In the
Quotasection of theNew Quotawindow, use the green slider to setStorage Threshold. - In the
Quotasection of theNew Quotawindow, use the blue slider to setStorage Grace. - Click on the bottom-right of the
Storagefield. - Under the
Storage Quotafield, select either theUnlimitedradio button (to allow limitless use of Storage) or thelimit toradio button to set the amount of storage to which Quota will limit users. If you select thelimit toradio button, input a storage quota size in gigabytes (GB) in theGBfield. - Click in the bottom-right of the
Edit Quotawindow. You are returned to theNew Quotawindow. - Click in the bottom-right of the
New Quotawindow.
Table 13.3. Quota thresholds and grace
| Setting | Definition |
|---|---|
| Cluster Threshold | The amount of cluster resources available per data center |
| Cluster Grace | The amount of the cluster available for the data center after exhausting the data center's Cluster Threshold. |
| Storage Threshold | The amount of storage resources available per data center. |
| Storage Grace | The amount of storage available for the data center after exhausting the data center's Storage Threshold. |
Procedure 13.3. Assigning a Quota to a Virtual Machine
- In the navigation pane, select the Virtual Machine to which you plan to add a quota.
- Click . The Edit Desktop Virtual Machine window appears.
- Select the quota you want the virtual machine to consume. Use the Quota drop-down to do this.
- Click .
Procedure 13.4. Assigning a Quota to a Virtual Disk
- In the navigation pane, select the Virtual Machine whose disk(s) you plan to add a quota.
- In the details pane, select the disk you plan to associate with a quota.
- Click . The Edit Virtual Disk window appears.
- Select the quota you want the virtual disk to consume.
- Click .
Important
Procedure 13.5. Assigning a User to a Quota
- In the tree, click the Data Center associated with the Quota you want to associate with a User.

- Click the Quota tab in the Navigation Pane.

- Select the target Quota in the list in the Navigation Pane.

- Click the
Consumerstab in the Details Pane.
- Click at the top of the Details Pane.

- In the Search field, type the name of the user you want to associate with the Quota.
- Click .
- Select the check box at the left side of the row containing the name of the target user.
- Click in the bottom right of the Assign Users and Groups to Quota window.
Procedure 13.6. Editing Quotas
- On the tree pane, click on the data center whose quota you want to edit.

- Click on the Quota tab in the Navigation Pane.

- Click the name of the Quota you want to edit.

- Click Edit at the top left of the Navigation pane, under the row of tabs.
- In the Edit Quota window that opens, enter a meaningful name in the Name field.
- Enter a meaningful description in the Description field.
- Select either the All Clusters radio button or the Specific Clusters radio button.
- Select either the All Storage Domains radio button or the Specific Storage Domains radio button.
Procedure 13.7. Removing Quotas
- On the tree pane, click on the data center whose quota you want to edit.
- Click on the Quota tab in the Navigation Pane.
- Click the name of the Quota you want to remove.
- Click at the top of the Navigation pane, under the row of tabs.
Procedure 14.1. Configuring Event Notifications
- Ensure that you have set up the MTA agent with the appropriate variables.
- Use the Users resource tab, tree mode, or the search function to find and select the user.
- Click the Event Notifier tab in the details pane to list events for which the user will be notified. This list will be blank if the user does not have event notification configured.
- Click to open the Add Event Notification window.
- Use the button, or the subject-specific expansion buttons, to view the events.
- Select the appropriate check boxes.
- Enter an email address in the Mail Recipient: field.
- Click to save changes and close the window.
- Restart the rhevm-notifierd service on the Red Hat Enterprise Virtualization Manager. This activates the changes you have just made:
# rhevm-notifierd restart
Table 14.1. notifier.conf variables
| Variable name | Default | Remarks |
|---|---|---|
| INTERVAL_IN_SECONDS | 120 | The interval in seconds between instances of dispatching messages to subscribers. |
| MAIL_SERVER | none | The SMTP mail server address. Required. |
| MAIL_PORT | 25 | The default port of a non-secured SMTP server is 25. The default port of a secured SMTP server (one with SSL enabled) is 465. |
| MAIL_USER | none | If SSL is enabled to authenticate the user, then this variable must be set. This variable is also used to specify the "from" user address when the MAIL_FROM variable is not set. Some mail servers do not support this functionality. The address is in RFC822 format. |
| MAIL_PASSWORD | none | This variable is required to authenticate the user if the mail server requires authentication or if SSL is enabled. |
| MAIL_ENABLE_SSL | false | This indicates whether SSL should be used to communicate with the mail server. |
| HTML_MESSAGE_FORMAT | false | The mail server sends messages in HTML format if this variable is set to "true". |
| MAIL_FROM | none | This variable specifies a "from" address in RFC822 format, if supported by the mail server. |
| MAIL_REPLY_TO | none | This variable specifies "reply-to" addresses in RFC822 format on sent mail, if supported by the mail server. |
| DAYS_TO_KEEP_HISTORY | none | This variable sets the number of days dispatched events will be preserved in the history table. If this variable is not set, events remain on the history table indefinitely. |
Procedure 14.2. Canceling Event Notifications
- In the Users tab, select the user or the user group.
- Select the Event Notifier tab in the details pane to list events for which the user receives notifications.
- Click to open the Add Event Notification window.
- Use the button, or the subject-specific expansion buttons, to view the events.
- Clear the appropriate check boxes to remove notification for that event.
- Click to save changes and close the window.
- 15.1.1. Checking for Red Hat Enterprise Virtualization Manager Updates
- 15.1.2. Updating Red Hat Enterprise Virtualization Manager
- 15.1.3. Updating Red Hat Enterprise Virtualization Manager Reports
- 15.1.4. Updating Red Hat Enterprise Virtualization Hypervisors
- 15.1.5. Updating Red Hat Enterprise Linux Virtualization Hosts
rhevm-check-update command, included in Red Hat Enterprise Virtualization Manager, to check for updates.
Procedure 15.1. Checking for Red Hat Enterprise Virtualization Manager Updates
- Run
rhevm-check-updateas therootuser.#
rhevm-check-update - Where no updates are available the command will output the text
No updates available.# rhevm-check-update Loaded plugins: product-id, versionlock Checking for updates... (This may take several minutes) No updates available
- Where updates are available the command will list the packages to be updated.
# rhevm-check-update Loaded plugins: product-id Checking for updates... (This may take several minutes) 12 Updates available: * rhevm-3.1.0-15.el6ev.noarch * rhevm-backend-3.1.0-15.el6ev.noarch * rhevm-config-3.1.0-15.el6ev.noarch * rhevm-dbscripts-3.1.0-15.el6ev.noarch * rhevm-genericapi-3.1.0-15.el6ev.noarch * rhevm-notification-service-3.1.0-15.el6ev.noarch * rhevm-restapi-3.1.0-15.el6ev.noarch * rhevm-setup-3.1.0-15.el6ev.noarch * rhevm-tools-common-3.1.0-15.el6ev.noarch * rhevm-userportal-3.1.0-15.el6ev.noarch * rhevm-webadmin-portal-3.1.0-15.el6ev.noarch * vdsm-bootstrap-4.9.6-32.0.el6_3.noarch
- stopping the
ovirt-engineservice, - downloading and installing the updated packages,
- backing up and updating the database,
- performing post installation configuration, and
- restarting the
ovirt-engineservice.
root user.
Procedure 15.2. Updating Red Hat Enterprise Virtualization Manager
- Run the
yumcommand to update the rhevm-setup package.# yum update rhevm-setup
- Run the
rhevm-upgradecommand to update the Red Hat Enterprise Virtualization Manager.# rhevm-upgrade
Note
Be aware that the upgrade process may take some time. Allow time for the upgrade process to complete and do not stop it once initiated. Once the upgrade has been completed you will also be instructed to separately upgrade the data warehouse and reports functionality. These additional steps are only required if these optional packages are installed.
root user.
Procedure 15.3. Updating Red Hat Enterprise Virtualization Manager Reports
- Use the
yumcommand to update the rhevm-reports and rhevm-dwh packages.# yum update -y rhevm-reports rhevm-dwh
- Run the
rhevm-dwh-setupcommand to update therhevm_historydatabase.# rhevm-dwh-setup
- Run the
rhevm-reports-setupcommand to update the reporting engine.# rhevm-reports-setup
Warning
Important
Procedure 15.4. Updating Red Hat Enterprise Virtualization Hypervisors
- Log in to the system hosting Red Hat Enterprise Virtualization Manager as the
rootuser. - Ensure that:
- the system is subscribed to the
Red Hat Enterprise Virtualizationentitlement — if using certificate-based Red Hat Network; or - the system is subscribed to the
Red Hat Enterprise Virtualization Hypervisor (v.6 x86-64)(labeledrhel-x86_64-server-6-rhevh) — if using classic Red Hat Network.
- Run the
yumcommand with theupdaterhev-hypervisorparameters to ensure that you have the most recent version of the rhev-hypervisor package installed.# yum update rhev-hypervisor
- Use your web browser to log in to the Administration Portal as a Red Hat Enterprise Virtualization administrative user.
- Click the Hosts tab, and then select the host that you intend to upgrade. If the host is not displayed, or the list of hosts is too long to filter visually, perform a search to locate the host.
- With the host selected, click the General tab on the Details pane.
- If the host requires updating, an alert message indicates that a new version of the Red Hat Enterprise Virtualization Hypervisor is available.
- If the host does not require updating, no alert message is displayed and no further action is required.
- Ensure the host remains selected and click the Maintenance button, if the host is not already in maintenance mode. This will cause any virtual machines running on the host to be migrated to other hosts. If the host is the SPM, this function will be moved to another host. The status of the host changes as it enters maintenance mode. When the host status is
Maintenance, the message in the general tab changes, providing you with a link which when clicked will re-install or upgrade the host. - Ensure that the host remains selected, and that you are on the General tab of the the Details pane. Click the Upgrade link. The Install Host dialog box displays.
- Select
rhev-hypervisor.iso, which is symbolically linked to the most recent hypervisor image. - Click OK to update and re-install the host. The dialog closes, the details of the host are updated in the Hosts tab, and the status changes.The host status will transition through these stages:These are all expected, and each stage will take some time.
Installing,Reboot,Non Responsive, andUp.
- Once successfully updated, the host displays a status of
Up. Any virtual machines that were migrated off the host, are at this point able to be migrated back to it.
yum. It is highly recommended that you use yum to update your systems regularly, to ensure timely application of security and bug fixes. All steps in this task must be run while logged into the Red Hat Enterprise Linux virtualization host as the root user.
Procedure 15.5. Updating Red Hat Enterprise Linux Virtualization Hosts
- Run the
yumcommand with theupdateparameter on the Red Hat Enterprise Linux virtualization host to update all installed packages.# yum update
rhevm-upgrade command. Virtualization hosts, and the virtual machines running upon them, will continue to operate independently while the Manager is being upgraded. Once the Manager upgrade is complete you will be able to upgrade your hosts, if you haven't already, to the latest versions of Red Hat Enterprise Linux and Red Hat Enterprise Virtualization Hypervisor.
Important
Important
Note
rhevm-upgrade command will attempt to roll your Red Hat Enterprise Virtualization Manager installation back to its previous state. Where this also fails detailed instructions for manually restoring the installation are displayed.
Procedure 15.6. Upgrading to Red Hat Enterprise Virtualization Manager 3.1
Add JBoss Enterprise Application Platform 6 Subscription
Ensure that the system is subscribed to the required channels and entitlements to recieve JBoss Enterprise Application Platform 6 packages. JBoss Enterprise Application Platform 6 is a required dependency of Red Hat Enterprise Virtualization Manager 3.1.Certificate-based Red Hat NetworkThe JBoss Enterprise Application Platform 6 packages are provided by theJBoss Enterprise Application Platformentitlement in certificate-based Red Hat Network.Use thesubscription-managercommand to ensure that the system is subscribed to theJBoss Enterprise Application Platformentitlement.# subscription-manager list
Red Hat Network ClassicThe JBoss Enterprise Application Platform 6 packages are provided by theJBoss Application Platform (v 6) for 6Server x86_64channel, also referred to asjbappplatform-6-x86_64-server-6-rpm, in Red Hat Network Classic. The Channel Entitlement Name for this channel isJBoss Enterprise Application Platform (v 4, zip format).Use therhn-channelcommand, or the Red Hat Network Web Interface, to subscribe to theJBoss Application Platform (v 6) for 6Server x86_64channel.Add Red Hat Enterprise Virtualization 3.1 Subscription
Ensure that the system is subscribed to the required channels and entitlements to recieve Red Hat Enterprise Virtualization Manager 3.1 packages. This procedure assumes that the system is already subscribed to required channels and entitlements to receive Red Hat Enterprise Virtualization 3.0 packages. These must also be available to complete the upgrade process.Certificate-based Red Hat NetworkThe Red Hat Enterprise Virtualization 3.1 packages are provided by therhel-6-server-rhevm-3.1-rpmsrepository associated with theRed Hat Enterprise Virtualizationentitlement. Use theyum-config-managercommand to enable the repository in youryumconfiguration. Theyum-config-managercommand must be run while logged in as therootuser.# yum-config-manager --enablerepo=rhel-6-server-rhevm-3.1-rpms
Red Hat Network ClassicThe Red Hat Enterprise Virtualization 3.1 packages are provided by theRed Hat Enterprise Virtualization Manager (v.3.1 x86_64)channel, also referred to asrhel-x86_64-server-6-rhevm-3.1in Red Hat Network Classic.Use therhn-channelcommand, or the Red Hat Network Web Interface, to subscribe to theRed Hat Enterprise Virtualization Manager (v.3.1 x86_64)channel.Update the rhevm-setup Package
To ensure that you have the most recent version of therhevm-upgradecommand installed you must update the rhevm-setup package. Log in as therootuser and useyumto update the rhevm-setup package.# yum update rhevm-setup
Run the
rhevm-upgradeCommandTo upgrade Red Hat Enterprise Virtualization Manager run therhevm-upgradecommand. You must be logged in as therootuser to run this command.# rhevm-upgrade Loaded plugins: product-id, rhnplugin Info: RHEV Manager 3.0 to 3.1 upgrade detected Checking pre-upgrade conditions...(This may take several minutes)
- If the ipa-server package is installed then an error message is displayed. Red Hat Enterprise Virtualization Manager 3.1 does not support installation on the same machine as Idenity, Policy, Audit (IPA).
Error: IPA was found to be installed on this machine. Red Hat Enterprise Virtualization Manager 3.1 does not support installing IPA on the same machine. Please remove ipa packages before you continue.
To resolve this issue you must migrate the IPA configuration to another system before re-attempting the upgrade. For further information see https://access.redhat.com/knowledge/articles/233143. - A list of packages that depend on JBoss Enterprise Application Platform 5 is displayed. These packages must be removed to install JBoss Enterprise Application Platform 6, required by Red Hat Enterprise Virtualization Manager 3.1.
Warning: the following packages will be removed if you proceed with the upgrade: * objectweb-asm Would you like to proceed? (yes|no):You must enteryesto proceed with the upgrade, removing the listed packages.
- Ensure that all of your virtualization hosts are up to date and running the most recent Red Hat Enterprise Linux packages or Hypervisor images.
- Change all of your clusters to use compatibility version 3.1.
- Change all of your data centers to use compatibility version 3.1.
Procedure 15.7. Changing the Cluster Compatibility Version
- Log in to the Administration Portal as the administrative user. By default this is the
adminuser. - Click the Clusters tab.
- Select the cluster that you wish to change from the list displayed. If the list of clusters is too long to filter visually then perform a search to locate the desired cluster.
- Click the button.
- Change the Compatibility Version to the desired value.
- Click .
Procedure 15.8. Changing the Data Center Compatibility Version
- Log in to the Administration Portal as the administrative user. By default this is the
adminuser. - Click the Data Centers tab.
- Select the data center that you wish to change from the list displayed. If the list of data centers is too long to filter visually then perform a search to locate the desired data center.
- Click the button.
- Change the Compatibility Version to the desired value.
- Click .
- 16.1.1. Reports
- 16.1.2. JasperReports and JasperServer in Red Hat Enterprise Virtualization
- 16.1.3. Online Help for JasperReports
- 16.1.4. Jasper Reports System Requirements
- 16.1.5. Users in the Red Hat Enterprise Virtualization Reports Portal
- 16.1.6. Logging in to Access the Reports Portal
- 16.1.7. Accessing the Red Hat Enterprise Virtualization Reports User Management Menu
- 16.1.8. Reports Portal User Roles
- 16.1.9. Navigating Reports and Dashboards
- 16.1.10. Report Parameters
- 16.1.11. Right-click Reporting Integration with the Red Hat Enterprise Virtualization Administration Portal
- 16.1.12. Executive Reports
- 16.1.13. Inventory Reports
- 16.1.14. Service Level Reports
- 16.1.15. Trend Reports
- 16.1.16. Ad Hoc Reports
- 16.1.17. Reports Schema: Tag History and ENUM Views
Warning
SELECT statement. The result of the SELECT statement populates the virtual table that the view returns. A user references the view name in PL/PGSQL statements the same way a table is referenced.
- In Red Hat Enterprise Linux 5.7 - Firefox 10 or later
- In Red Hat Enterprise Linux 6 - Firefox 10 or later
- In Windows 7 - Internet Explorer 9
- In Windows Server 2008 - Internet Explorer 9
rhevm-admin and superuser. The passwords for these users were set during the installation of Red Hat Enterprise Virtualization Reports. Generally, additional users must be added manually.
superuser and rhevm-admin accounts when you installed Red Hat Enterprise Virtualization Reports. Red Hat Enterprise Virtualization Reports does not provide default passwords.
https://YOUR.MANAGER.URL/rhevm-reports/login.html. A login screen for Red Hat Enterprise Virtualization Reports is displayed.
Note
ovirt-user. Click the button.
rhevm-admin and superuser. Generally, additional users need to be created within the Reports Portal.
rhevm-admin.
- In to Red Hat Enterprise Virtualization reports portal, hover over the Manage button on the top menu bar.
- Click on Users in the drop-down menu that appears to access the Manage Users interface. It contains three panes:
- Organizations
- Users
- Properties
- Select a user in the Users pane by clicking on the name of the user. Information about the user displays in the Properties pane.
- Click the button at the bottom of the user's Properties pane.The Properties pane contains these fields:
- User name,
- User ID,
- Email,
- Password (required),
- Confirm Password (required),
- A User is enabled check box,
- A The user is defined externally check box,
- A list of Roles Available to the user, and
- A list of Roles Assigned to the user.
- Click the button.
- ROLE_ADMINISTRATOR - Can create/edit/delete reports, dashboards, ad hoc reports, and manage the server.
- ROLE_USER - Can create/edit/delete ad hoc reports and view reports and dashboards.
- ROLE_ANONYMOUS - Can log in and look at reports and dashboards.
) button in the navigation bar at the top of the reports portal to return to this page.
Table 16.1. Navigation Filters
| Filter | Description |
|---|---|
Available Resources
| Select from All, Modified by me, or Viewed by me. |
Resource type
| Choose from the types of available resources including Reports, Ad Hoc views, Dashboards, and more. |
Timeframe
| Choose a time frame you'd like to see information from. |
Schedule
| Filter by data collection schedule. |
Note
Active Virtual Machines by OS report shows a summary of the number of active virtual machines in a given time period, broken down by operating system. The following parameters are provided to run this report:
Table 16.2. Active Virtual Machines by OS Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
| The report includes only virtual machines in the selected data center. The options list shows only data centers that contain virtual machines. |
Cluster
|
The report only includes virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report only includes virtual machines of the selected type. Possible types are Server and Desktop. The options list shows only types that exist in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Cluster Capacity Vs Usage report shows the relationship between system capacity and usage (workload) over a given time period. Capacity is expressed in terms of CPU cores and physical memory, while usage is expressed as vCPUs and virtual machine memory. The following parameters must be provided to run this report:
Table 16.3. Cluster Capacity Vs Usage Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list contains only data centers that contain clusters.
|
Cluster
|
The report only includes the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all clusters in the selected data center.
|
Host OS Break Down report indicates the number of hosts running each operating system version over a given time period. The following parameters must be provided to run this report:
Table 16.4. Host OS Break Down Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Summary of Host Usage Resources report shows a scatter plot of average host resource utilization for a given time period in terms of CPU and memory usage. The following parameters must be provided to run this report:
Table 16.5. Summary of Host Usage Resources Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Hosts Inventory report shows a list of all hosts in the selected data center and cluster. The following parameters must be provided to run this report:
Table 16.6. Hosts Inventory Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Storage Domain Size Over Time report shows a line graph contrasting the total available and total used space for a single storage domain over time for a given period. The following parameters must be provided to run this report:
Table 16.7. Storage Domain Size Over Time Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
|
The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. The list of options for the Storage Domain name parameter includes only storage domains that were attached during the specified period.
|
Data Center
|
The options list for the Storage Domain Name parameter shows only storage domains in this selected data center.
|
Storage Type
|
The options list for the Storage Domain Name parameter shows only storage domains of this selected type.
|
Storage Domain Name
| The report refers to the storage domain selected. A report is only for a single storage domain and the user must select a storage domain. The list of options shows only storage domains that were attached to the data center during the selected period. |
Virtual Machines Inventory report shows a list of all virtual machines in the selected data center and cluster. The following parameters must be provided to run this report:
Table 16.8. Virtual Machines Inventory Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Cluster Host Uptime report shows the weighted average uptime of hosts within a cluster for a given period of time. This report also provides a table listing the total planned (maintenance) and unplanned down time for each host. The following parameters must be provided to run this report:
Table 16.9. Cluster Host Uptime Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Cluster Quality of Services - Hosts report shows the amount of time hosts sustain load above a specified threshold for a given time period. Load is defined in terms of CPU usage percent and memory usage percent. The following parameters must be provided to run this report:
Table 16.10. Cluster Quality of Service - Hosts Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
CPU Threshold
|
The report measures the quality of service as the amount of time hosts sustain load above a given threshold. The CPU Threshold defines a load threshold as a percentage of total CPU usage on the host. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A CPU Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Memory Threshold
|
The report measures the quality of service as the amount of time hosts sustain load above a given threshold. The Memory Threshold defines a load threshold as a percentage of total memory usage on the host. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A Memory Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Cluster Quality of Service - Virtual Machines report shows the amount of time virtual machines sustain load above a specified threshold for a given time period. Load is defined in terms of CPU usage percent and memory usage percent. The following parameters must be provided to run this report:
Table 16.11. Cluster Quality of Service - Virtual Machines Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
CPU Threshold
|
The report measures quality of service as the amount of time virtual machines sustain load above a given threshold. The CPU Threshold defines a load threshold as a percentage of total CPU usage on the virtual machine. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A CPU Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Memory Threshold
|
The reports measures quality of service as the amount of time virtual machines sustain load above a given threshold. The Memory Threshold defines a load threshold as a percentage of total memory usage on the virtual machine. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A Memory Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Single Host Uptime report shows the total proportion of uptime, planned downtime and unplanned downtime for a single host. The following parameters must be provided to run this report:
Table 16.12. Single Host Uptime Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host Name parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and a user must select a host. |
Top 10 Downtime Hosts report shows the total proportion of uptime, planned downtime and unplanned downtime for the 10 hosts with the greatest amount of downtime. The following parameters must be provided to run this report:
Table 16.13. Top 10 Downtime Hosts Parameters
Parameter
| Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list contains only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
High Availability Virtual Servers Uptime report shows the weighted average uptime of high availability virtual servers within a cluster for a given period of time. The report also provides a table listing the total uptime and unplanned down time for each virtual server. The following parameters must be provided to run this report:
Table 16.14. High Availability Virtual Servers Uptime Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual servers in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual servers in the selected data center.
|
Five Least Utilized Hosts (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five hosts with the lowest load factor for a given period of time. The following parameters must be provided to run this report:
Table 16.15. Five Least Utilized Hosts (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Five Least Utilized Virtual Machines (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five virtual machines with the lowest load factor for a given period of time. The following parameters must be provided to run this report:
Table 16.16. Five Least Utilized Virtual Machines (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Five Most Utilized Hosts (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five hosts with the highest load factor for a given period of time. The following parameters must be provided to run this report:
Table 16.17. Five Most Utilized Hosts (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Five Most Utilized Virtual Machines (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five virtual machines with the highest load factor for a given period of time. The following parameters must be provided to run this report:
Table 16.18. Five Most Utilized Virtual Machines (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers which contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
VM Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Multiple Hosts Resource Usage (Over Time) report shows the daily peak load, in terms of CPU and memory usage, for up to five selected hosts over a given period of time. The following parameters must be provided to run this report:
Table 16.19. Multiple Hosts Resource Usage (Over Time) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host List parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host List parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host List parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host List parameter includes all host types.
|
Host List
| The report includes all hosts selected in the host list. Select any number of hosts up to a maximum of five. |
Multiple Virtual Machines Resource Usage (Over Time) report shows the daily peak load, in terms of CPU and memory usage, for up to five selected virtual machines over a given period of time. The following parameters must be provided to run this report:
Table 16.20. Multiple Virtual Machines Resource Usage (Over Time) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM List parameter include only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM List parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM List parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM List parameter includes all virtual machine types.
|
VM List
| The report includes all virtual machines selected in the virtual machine list. Select any number of virtual machines up to a maximum of five. |
Single Host Resource Usage (Days of Week) report shows various resource utilization metrics for a single host over a given period of time and broken down by day of the week. The metrics include CPU usage, memory usage, number of active virtual machines and network usage. The following parameters must be provided to run this report:
Table 16.21. Single Host Resource Usage (Days of Week) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host Name parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and the user must select a host. |
Single Host Resource Usage (Hour of Day) report shows a variety of resource utilization metrics for a single host over a given period of time, broken down by hour of the day (0-23). The metrics include CPU usage, memory usage, number of active virtual machines and network usage. The following parameters must be provided to run this report:
Table 16.22. Single Host Resource Usage (Hour of Day) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
Only hosts of the selected type will be included in the list of options for the Host Name parameter. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and the user must select a host. |
Single Virtual Machine Resources (Days of Week) report shows a variety of resource utilization metrics for a single virtual machine over a given period of time, broken down by day of the week. The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 16.23. Single Virtual Machine Resources (Days of Week) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM Name parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
VM Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Single Virtual Machine Resources (Hour of Day) report shows a variety of resource utilization metrics for a single virtual machine over a given period of time, broken down by hour of the day (0-23). The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 16.24. Single Virtual Machine Resources (Hour of Day) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers which contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM Name parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
VM Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Single Virtual Machine Resources (Over Time) report shows a variety of resource utilization metrics for a single virtual machine over a given period of time. The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 16.25. Single Virtual Machine Resources (Over Time) Parameters
| Parameter | Description |
|---|---|
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
VM Type
|
The list of options for the VM Name parameter lists only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
VM Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Working with the Ad Hoc Editor section of the online help explains the ad hoc report interface in detail.
delete_date and detach_date do not appear for living entities
delete_date and detach_date do not appear in latest views because these views provide the latest configuration of living entities, which, by definition, have not been deleted.
Table 16.26. tag_and_ENUM_Views_table_v3_1_tag_relations_history_view\v3_1_latest_tag_relations_history_view"
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| entity_id | uuid | Unique ID of the entity or tag in the system. |
| entity_type | smallint |
|
| parent_id | uuid | Unique ID of the entity or tag in the system. |
| attach_date | timestamp with time zone | The date the entity or tag was attached to the entity or tag. |
| detach_date | timestamp with time zone | The date the entity or tag was detached from the entity or tag. |
Table 16.27. v3_1_tag_details_view\v3_1_latest_tag_details_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| tag_id | uuid | Unique ID of the tag in the system. |
| tag_name | varchar(50) | Name of the tag, as displayed in the tag tree. |
| tag_description | varchar(4000) | Description of the tag, as displayed in the edit dialog. |
| tag_path | varchar(4000) | The path to the tag in the tree. |
| tag_level | smallint | The tag level in the tree. |
| create_date | timestamp with time zone | The date this tag was added to the system. |
| update_date | timestamp with time zone | The date this tag was changed in the system. |
| delete_date | timestamp with time zone | The date this tag was deleted from the system. |
Table 16.28. v3_1_enum_translator_view
| Name | Type | Description |
|---|---|---|
| enum_type | varchar(40) | The type of ENUM. |
| enum_key | smallint | The key of the ENUM. |
| value | varchar(40) | The value of the ENUM. |
- 16.2.1. Red Hat Enterprise Virtualization History Database
- 16.2.2. Tracking Configuration History
- 16.2.3. Recording Statistical History
- 16.2.4. Tracking Tag History
- 16.2.5. Connecting to the History Database
- 16.2.6. History Database Report Examples
- 16.2.7. Statistics History Views
- 16.2.8. Configuration History Views
ovirt_engine_history) which tracks the engine database over time.
Important
ovirt-engine-dwhd, tracks three types of changes:
- A new entity is added to the engine database - the ETL Service replicates the change to the ovirt_engine_history database as a new entry.
- An existing entity is updated - the ETL Service replicates the change to the ovirt_engine_history database as a new entry.
- An entity is removed from the engine database - A new entry in the ovirt_engine_history database flags the corresponding entity as removed. Removed entities are only flagged as removed. To maintain correctness of historical reports and representations, they are not physically removed.
- a
history_idto indicate the configuration version of the entity; - a
create_datefield to indicate when the entity was added to the system; - an
update_datefield to indicate when the entity was changed; and - a
delete_datefield to indicate the date the entity was removed from the system.
- A tag is created in the Administration Portal - the ETL Service copies the tag details, position in the tag tree and relation to other objects in the tag tree.
- A entity is attached to the tag tree in the Administration Portal - the ETL Service replicates the addition to the ovirt_engine_history database as a new entry.
- A tag is updated - the ETL Service replicates the change of tag details to the ovirt_engine_history database as a new entry.
- An entity or tag branch is removed from the Administration Portal - the ovirt_engine_history database flags the corresponding tag and relations as removed in new entries. Removed tags and relations are only flagged as removed or detached. In order to maintain correctness of historical reports and representations, they are not physically removed.
- A tag branch is moved - the corresponding tag and relations are updated as new entries. Moved tags and relations are only flagged as updated. In order to maintain correctness of historical reports and representations, they are not physically updated.
ovirt_engine_history database resides within the instance of PostgreSQL that the installer creates during Red Hat Enterprise Virtualization Manager installation.
where clause are substituted with the appropriate values for your environment and that the latest configuration is in use.
Example 16.1. Report query for resource utilization on a single host
select history_datetime as DateTime, cpu_usage_percent as CPU, memory_usage_percent as Memory from v3_1_host_configuration_view, v3_1_host_samples_history_view where v3_1_host_configuration_view.host_id = v3_1_host_samples_history_view.host_id and host_name = 'example.labname.abc.company.com' and v3_1_host_configuration_view.history_id in (select max(a.history_id) from v3_1_host_configuration_view as a where v3_1_host_configuration_view.host_id = a.host_id) and history_datetime >= '2011-07-01 18:45' and history_datetime <= '2011-07-31 21:45'
Table 16.29. Resource Utilization for a Single Host Example Data
| DateTime | CPU | Memory |
|---|---|---|
| 2010-07-01 18:45 | 42 | 0 |
| 2010-07-01 18:46 | 42 | 0 |
| 2010-07-01 18:47 | 42 | 1 |
| 2010-07-01 18:48 | 33 | 0 |
| 2010-07-01 18:49 | 33 | 0 |
| 2010-07-01 18:50 | 25 | 1 |
where clause are substituted with appropriate values for your environment.
Example 16.2. Report query for resource utilization across all hosts
select extract(hour from history_datetime) as Hour, avg(cpu_usage_percent) as CPU, avg(memory_usage_percent) as Memory
from v3_1_host_hourly_history_view
where history_datetime >= '2011-07-01' and history_datetime < '2011-07-31'
group by extract(hour from history_datetime)
order by extract(hour from history_datetime)
Table 16.30. Resource utilization across all hosts example data
| Hour | CPU | Memory |
|---|---|---|
| 0 | 39 | 40 |
| 1 | 38 | 38 |
| 2 | 37 | 32 |
| 3 | 35 | 45 |
| 4 | 35 | 37 |
| 5 | 36 | 37 |
where clause are substituted with appropriate values for your environment.
Example 16.3.
SELECT vm_name FROM v3_1_latest_vm_configuration_view inner join v3_1_latest_tag_relations_history_view on (v3_1_latest_vm_configuration_view.vm_id = v3_1_latest_tag_relations_history_view.entity_id) inner join v3_1_latest_tag_details_view on (v3_1_latest_tag_details_view.tag_id = v3_1_latest_tag_relations_history_view.parent_id) WHERE getpathinnames(v3_1_latest_tag_details_view.history_id) like '/root/tlv%'
Table 16.31. Tag Filtering of Latest VM Configuration
| vm_name |
|---|
| RHEL6-Pool-67 |
| RHEL6-Pool-5 |
| RHEL6-Pool-6 |
| RHEL6-23 |
Example 16.4.
SELECT vm_name, vm_type_value.value as vm_type, os_value.value as operating_system FROM v3_1_latest_vm_configuration_view inner join v3_1_enum_translator_view as vm_type_value on (vm_type_value.enum_type = 'VM_TYPE' and v3_1_latest_vm_configuration_view.vm_type = vm_type_value.enum_key) inner join v3_1_enum_translator_view as os_value on (os_value.enum_type = 'OS_TYPE' and v3_1_latest_vm_configuration_view.operating_system = os_value.enum_key)
Table 16.32. Current Virtual Machines' Names, Types, and Operating Systems
| vm_name | vm_type | operating_system |
|---|---|---|
| RHEL6-Pool-2 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-1 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-3 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-4 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-5 | Desktop | RHEL 6 x64 |
Note
Table 16.33. v3_1_datacenter_samples_history_view\v3_1_datacenter_hourly_history_view\v3_1_datacenter_daily_history_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| datacenter_id | uuid | The unique ID of the data center. |
| datacenter_status | smallint |
|
| minutes_in_status | decimal |
The total number of minutes that the data center was in the status shown in the datacenter_status column for the aggregation period. For example, if a data center was up for 55 minutes and in maintenance mode for 5 minutes during an hour, two rows will show for this hour. One will have a datacenter_status of Up and minutes_in_status of 55, the other will have a datacenter_status of Maintenance and a minutes_in_status of 5.
|
| datacenter_configuration_version | integer | The data center configuration version at the time of sample. |
Table 16.34. Storage domain hourly history, daily history, and samples history view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| storage_domain_id | uuid | Unique ID of the storage domain in the system. |
| available_disk_size_gb | integer | The total available (unused) capacity on the disk, expressed in gigabytes (GB). |
| used_disk_size_gb | integer | The total used capacity on the disk, expressed in gigabytes (GB). |
| storage_configuration_version | integer | The storage domain configuration version at the time of sample. |
Table 16.35. v3_1_host_samples_history_view\v3_1_host_hourly_history_view\v3_1_host_daily_history_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| host_id | uuid | Unique ID of the host in the system. |
| host_status | smallint |
|
| minutes_in_status | decimal |
The total number of minutes that the host was in the status shown in the status column for the aggregation period. For example, if a host was up for 55 minutes and down for 5 minutes during an hour, two rows will show for this hour. One will have a status of Up and minutes_in_status of 55, the other will have a status of Down and a minutes_in_status of 5.
|
| memory_usage_percent | smallint | Percentage of used memory on the host. |
| max_memory_usage | smallint | Percentage of used memory on the host. |
| cpu_usage_percent | smallint | Used CPU percentage on the host. |
| max_cpu_usage | smallint | The maximum CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| ksm_cpu_percent | smallint | CPU percentage ksm on the host is using. |
| max_ksm_cpu_percent | smallint | The maximum KSM usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| active_vms | smallint | The average number of active virtual machines for this aggregation. |
| max_active_vms | smallint | The maximum active number of virtual machines for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| total_vms | smallint | The average number of all virtual machines on the host for this aggregation. |
| max_total_vms | smallint | The maximum total number of virtual machines for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| total_vms_vcpus | smallint | Total number of VCPUs allocated to the host. |
| max_total_vms_vcpus | smallint | The maximum total virtual machine VCPU number for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| cpu_load | smallint | The CPU load of the host. |
| max_cpu_load | smallint | The maximum CPU load for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| system_cpu_usage_percent | smallint | Used CPU percentage on the host. |
| max_cpu_usage_percent | smallint | The maximum system CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| user_cpu_usage_percent | smallint | Used user CPU percentage on the host. |
| max_user_cpu_usage_percent | smallint | The maximum user CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| swap_used_mb | integer | Used swap size usage of the host in megabytes (MB). |
| max_swap_used_mb | integer | The maximum user swap size usage of the host for the aggregation period in megabytes (MB), expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| host_configuration_version | integer | The host configuration version at the time of sample. |
Table 16.36. v3_1_host_interface_samples_history_view\v3_1_host_interface_hourly_history_view\v3_1_host_interface_daily_history_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history view (rounded to minute, hour, day as per the aggregation level). |
| host_interface_id | uuid | Unique identifier of the interface in the system. |
| receive_rate_percent | smallint | Used receive rate percentage on the host. |
| max_receive_rate_percent | smallint | The maximum receive rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| transmit_rate_percent | smallint | Used transmit rate percentage on the host. |
| max_transmit_rate_percent | smallint | The maximum transmit rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| host_interface_configuration_version | integer | The host interface configuration version at the time of sample. |
Table 16.37. v3_1_vm_samples_history_view\v3_1_vm_hourly_history_view\v3_1_vm_daily_history_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| vm_id | uuid | Unique ID of the virtual machine in the system. |
| vm_status | smallint |
|
| minutes_in_status | decimal | The total number of minutes that the virtual machine was in the status shown in the status column for the aggregation period. For example, if a virtual machine was up for 55 minutes and down for 5 minutes during an hour, two rows will show for this hour. One will have a status of Up and minutes_in_status, the other will have a status of Down and a minutes_in_status of 5. |
| cpu_usage_percent | smallint | The percentage of the CPU in use by the virtual machine. |
| max_cpu_usage | smallint | The maximum CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| memory_usage_percent | smallint | Percentage of used memory in the virtual machine. The guest tools must be installed on the virtual machine for memory usage to be recorded. |
| max_memory_usage | smallint | The maximum memory usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. The guest tools must be installed on the virtual machine for memory usage to be recorded. |
| user_cpu_usage_percent | smallint | Used user CPU percentage on the host. |
| max_user_cpu_usage_percent | smallint | The maximum user CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregation, it is the maximum hourly average value. |
| system_cpu_usage_percent | smallint | Used system CPU percentage on the host. |
| max_system_cpu_usage_percent | smallint | The maximum system CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| vm_ip | varchar(255) | The IP address of the first NIC. Only shown if the guest agent is installed. |
| current_user_name | varchar(255) | Name of user logged into the virtual machine console, if a guest agent is installed. |
| currently_running_on_host | uuid | The unique ID of the host the virtual machine is running on. |
| vm_configuration_version | integer | The virtual machine configuration version at the time of sample. |
| current_host_configuration_version | integer | The current host the virtual machine is running on. |
Table 16.38. v3_1_vm_interface_samples_history_view\v3_1_vm_interface_hourly_history_view\v3_1_vm_interface_daily_history_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| vm_interface_id | uuid | Unique identifier of the interface in the system. |
| receive_rate_percent | smallint | Used receive rate percentage on the host. |
| max_receive_rate_percent | smallint | The maximum receive rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| transmit_rate_percent | smallint | Used transmit rate percentage on the host. |
| max_transmit_rate_percent | smallint | The maximum transmit rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average rate. |
| vm_interface_configuration_version | integer | The virtual machine interface configuration version at the time of sample. |
Table 16.39. v3_1_vm_disk_daily_history_view\v3_1_vm_disk_hourly_history_view\v3_1_vm_disk_samples_history_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| vm_disk_id | uuid | Unique ID of the disk in the system. |
| vm_disk_status | integer |
|
| minutes_in_status | decimal |
The total number of minutes that the virtual machine disk was in the status shown in the status column for the aggregation period. For example, if a virtual machine disk was locked for 55 minutes and OK for 5 minutes during an hour, two rows will show for this hour. One will have a status of Locked and minutes_in_status of 55, the other will have a status of OK and a minutes_in_status of 5.
|
| vm_actual_disk_size_mb | integer | The actual size allocated to the disk. |
| read_rate_bytes_per_second | integer | Read rate to disk in bytes per second. |
| max_read_rate_bytes_per_second | integer | The maximum read rate for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| write_rate_bytes_per_second | integer | Write rate to disk in bytes per second. |
| max_write_rate_bytes_per_second | integer | The maximum write rate for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| read_latency_seconds | decimal | The virtual machine disk read latency measured in seconds. |
| max_read_latency_seconds | decimal | The maximum write latency for the aggregation period, measured in seconds. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| write_latency_seconds | decimal | The virtual machine disk write latency measured in seconds. |
| max_write_latency_seconds | decimal | The maximum write latency for the aggregation period, measured in seconds. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| flush_latency_seconds | decimal | The virtual machine disk flush latency measured in seconds. |
| max_flush_latency_seconds | decimal | The maximum flush latency for the aggregation period, measured in seconds. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| vm_disk_configuration_version | integer | The virtual machine disk configuration version at the time of sample. |
Note
delete_date does not appear in latest views because these views provide the latest configuration of living entities, which, by definition, have not been deleted.
Table 16.40. v3_1_datacenter_configuration_view\v3_1_latest_datacenter_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| datacenter_id | uuid | The unique ID of the data center in the system. |
| datacenter_name | varchar(40) | Name of the data center, as displayed in the edit dialog. |
| datacenter_description | varchar(4000) | Description of the data center, as displayed in the edit dialog. |
| storage_type | smallint |
|
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.41. v3_1_datacenter_storage_domain_map_view\v3_1_latest_datacenter_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| storage_domain_id | uuid | The unique ID of this storage domain in the system. |
| datacenter_id | uuid | The unique ID of the data center in the system. |
| attach_date | timestamp with time zone | The date the storage domain was attached to the data center. |
| detach_date | timestamp with time zone | The date the storage domain was detached from the data center. |
Table 16.42. v3_1_storage_domain_configuration_view\v3_1_latest_storage_domain_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| storage_domain_id | uuid | The unique ID of this storage domain in the system. |
| storage_domain_name | varchar(250) | Storage domain name. |
| storage_domain_type | smallint |
|
| storage_type | smallint |
|
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.43. v3_1_cluster_configuration_view\v3_1_latest_cluster_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| cluster_id | uuid | The unique identifier of the datacenter this cluster resides in. |
| cluster_name | varchar(40) | Name of the cluster, as displayed in the edit dialog. |
| cluster_description | varchar(4000) | As defined in the edit dialog. |
| datacenter_id | uuid | The unique identifier of the datacenter this cluster resides in. |
| cpu_name | varchar(255) | As displayed in the edit dialog. |
| compatibility_version | varchar(40) | As displayed in the edit dialog. |
| datacenter_configuration_version | integer | The data center configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.44. v3_1_host_configuration_view\v3_1_latest_host_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| host_id | uuid | The unique ID of the host in the system. |
| host_unique_id | varchar(128) | This field is a combination of the host physical UUID and one of its MAC addresses, and is used to detect hosts already registered in the system. |
| host_name | varchar(255) | Name of the host (same as in the edit dialog). |
| cluster_id | uuid | The unique ID of the cluster that this host belongs to. |
| host_type | smallint |
|
| fqn_or_ip | varchar(255) | The host's DNS name or its IP address for Red Hat Enterprise Virtualization Manager to communicate with (as displayed in the edit dialog). |
| memory_size_mb | integer | The host's physical memory capacity, expressed in megabytes (MB). |
| swap_size_mb | integer | The host swap partition size. |
| cpu_model | varchar(255) | The host's CPU model. |
| number_of_cores | smallint | Total number of CPU cores in the host. |
| host_os | varchar(255) | The host's operating system version. |
| pm_ip_address | varchar(255) | Power Management server IP address. |
| kernel_version | varchar(255) | The host's kernel version. |
| kvm_version | varchar(255) | The host's KVM version. |
| vdsm_version | varchar(40) | The host's VDSM version. |
| vdsm_port | integer | As displayed in the edit dialog. |
| cluster_configuration_version | integer | The cluster configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.45. v3_1_host_configuration_view\v3_1_latest_host_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| host_interface_id | uuid | The unique ID of this interface in the system. |
| host_interface_name | varchar(50) | The interface name as reported by the host. |
| host_id | uuid | Unique ID of the host this interface belongs to. |
| host_interface_type | smallint |
|
| host_interface_speed_bps | integer | The interface speed in bits per second. |
| mac_address | varchar(20) | The interface MAC address. |
| network_name | varchar(50) | The logical network associated with the interface. |
| ip_address | varchar(50) | As displayed in the edit dialog. |
| gateway | varchar(20) | As displayed in the edit dialog. |
| bond | Boolean | A flag to indicate if this interface is a bonded interface. |
| bond_name | varchar(50) | The name of the bond this interface is part of (if it is part of a bond). |
| vlan_id | integer | As displayed in the edit dialog. |
| host_configuration_version | integer | The host configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.46. v3_1_vm_configuration_view\v3_1_latest_vm_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_id | uuid | The unique ID of this VM in the system. |
| vm_name | varchar(255) | The name of the VM. |
| vm_description | varchar(4000) | As displayed in the edit dialog. |
| vm_type | smallint |
|
| cluster_id | uuid | The unique ID of the cluster this VM belongs to. |
| template_id | uuid | The unique ID of the template this VM is derived from. The field is for future use, as the templates are not synchronized to the history database in this version. |
| template_name | varchar(40) | Name of the template from which this VM is derived. |
| cpu_per_socket | smallint | Virtual CPUs per socket. |
| number_of_sockets | smallint | Total number of virtual CPU sockets. |
| memory_size_mb | integer | Total memory allocated to the VM, expressed in megabytes (MB). |
| operating_system | smallint |
|
| ad_domain | varchar(40) | As displayed in the edit dialog. |
| default_host | uuid | As displayed in the edit dialog, the ID of the default host in the system. |
| high_availability | Boolean | As displayed in the edit dialog. |
| initialized | Boolean | A flag to indicate if this VM was started at least once for Sysprep initialization purposes. |
| stateless | Boolean | As displayed in the edit dialog. |
| fail_back | Boolean | As displayed in the edit dialog. |
| auto_suspend | Boolean | As displayed in the edit dialog. |
| usb_policy | smallint | As displayed in the edit dialog. |
| time_zone | varchar(40) | As displayed in the edit dialog. |
| cluster_configuration_version | integer | The cluster configuration version at the time of creation or update. |
| default_host_configuration_version | integer | The host configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.47. v3_1_vm_configuration_view\latest_vm_interface_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_interface_id | uuid | The unique ID of this interface in the system. |
| vm_interface_name | varchar(50) | As displayed in the edit dialog. |
| vm_id | uuid | The ID of the virtual machine this interface belongs to. |
| vm_interface_type | smallint |
The type of the virtual interface.
|
| vm_interface_speed_bps | integer | The average speed of the interface during the aggregation in bits per second. |
| mac_address | varchar(20) | As displayed in the edit dialog. |
| network_name | varchar(50) | As displayed in the edit dialog. |
| vm_configuration_version | integer | The virtual machine configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 16.48. v3_1_disks_vm_map_view\v3_1_latest_disks_vm_map_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_disk_id | uuid | The unique ID of this virtual disk in the system. |
| vm_id | uuid | The unique ID of the virtual machine in the system. |
| attach_date | timestamp with time zone | The date the virtual disk was attached to the virtual machine. |
| detach_date | timestamp with time zone | The date the virtual disk was detached from the virtual machine. |
Table 16.49. v3_1_vm_disk_configuration_view\v3_1_latest_vm_disk_configuration_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_disk_id | uuid | The unique ID of this disk in the system. |
| storage_domain_id | uuid | The ID of the storage domain this disk image belongs to. |
| vm_internal_drive_mapping | varchar | The virtual machine internal drive mapping. |
| vm_disk_description | varchar(4000) | As displayed in the edit dialog. |
| vm_disk_space_size_mb | integer | The defined size of the disk in megabytes (MB). |
| disk_type | integer |
As displayed in the edit dialog. Only System and data are currently used.
|
| vm_disk_format | integer |
As displayed in the edit dialog.
|
| vm_disk_interface | integer |
|
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Designer, in the Reports Portal. For more information on dashboards, consult the JasperReports documentation by clicking the in the top menu bar of the Reports Portal.
Inventory Dashboard provides an executive summary of the inventory of a data center over a given period of time. The dashboard includes average disk use, number of active virtual machines, and a breakdown of host operating systems. The following parameters can be modified for this dashboard:
Table 16.50. Inventory Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Cluster
|
The report refers to the cluster selected. If All is selected, the report refers to the entire data center.
|
Trends Dashboard provides an executive summary of the trends in a data center over a given period of time. The dashboard includes graphs of CPU and memory usage over time for the most highly utilized hosts and virtual machines in the data center. The following parameters can be modified for this dashboard:
Table 16.51. Trends Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Cluster
|
The report refers to the cluster selected. If All is selected, the report refers to the entire data center.
|
Uptime Dashboard provides an executive summary of the service level and uptime for a data center over a given period of time. The dashboard includes details on total uptime for each cluster in the data center for the period. The following parameters can be modified for this dashboard:
Table 16.52. Uptime Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
System Overview Dashboard provides an executive summary of the hosts in a data center over a given period of time. The dashboard includes:
- A quality of service (QoS) view for each cluster, which shows the proportion of period where CPU and memory exceeded thresholds on the hosts in the cluster;
- A break down of host operating systems; and
- A summary of average host resource utilization over the period.
Table 16.53. System Overview Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Cluster
|
The report refers to the cluster selected. If All is selected, the report refers to the entire data center.
|
Datacenter Dashboard, Cluster Dashboard, and System Dashboard.
rhevm-setup script is able to configure the firewall automatically, but this will overwrite any pre-existing firewall configuration.
rhevm-setup command will save a list of the iptables rules required in the /usr/share/ovirt-engine/conf/iptables.example file.
80 and 443) listed here.
Table A.1. Red Hat Enterprise Virtualization Manager Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| - | ICMP |
|
| When registering to the Red Hat Enterprise Virtualization Manager, virtualization hosts send an ICMP ping request to the Manager to confirm that it is online. |
| 22 | TCP |
|
| SSH (optional) |
| 80, 443 | TCP |
|
|
Provides HTTP and HTTPS access to the Manager.
|
Important
NFSv4
- TCP and UDP port
2049for NFS. - TCP and UDP port
111(rpcbind/sunrpc).
NFSv3
- TCP and UDP port
2049for NFS. - TCP and UDP port
111(rpcbind/sunrpc). - TCP and UDP port specified with
MOUNTD_PORT="port" - TCP and UDP port specified with
STATD_PORT="port" - TCP port specified with
LOCKD_TCPPORT="port" - UDP port specified with
LOCKD_UDPPORT="port"
MOUNTD_PORT, STATD_PORT, LOCKD_TCPPORT, and LOCKD_UDPPORT ports are configured in the /etc/sysconfig/nfs file.
Table A.2. Virtualization Host Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| 22 | TCP |
|
| Secure Shell (SSH) access. |
| 5634 - 6166 | TCP |
|
|
Remote guest console access via VNC and SPICE. These ports must be open to facilitate client access to virtual machines.
|
| 5989 | TCP, UDP |
|
|
Used by Common Information Model Object Managers (CIMOM) to monitor virtual machines running on the virtualization host. If you wish to use a CIMOM to monitor the virtual machines in your virtualization environment then you must ensure that this port is open.
|
| 16514 | TCP |
|
|
Virtual machine migration using
libvirt.
|
| 49152 - 49216 | TCP |
|
|
Virtual machine migration and fencing using VDSM. These ports must be open facilitate both automated and manually initiated migration of virtual machines.
|
| 54321 | TCP |
|
|
VDSM communications with the Manager and other virtualization hosts.
|
Example A.1. Option Name: IPTablesConfig
*filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A INPUT -p icmp -j ACCEPT -A INPUT -i lo -j ACCEPT # vdsm -A INPUT -p tcp --dport 54321 -j ACCEPT # libvirt tls -A INPUT -p tcp --dport 16514 -j ACCEPT # SSH -A INPUT -p tcp --dport 22 -j ACCEPT # guest consoles -A INPUT -p tcp -m multiport --dports 5634:6166 -j ACCEPT # migration -A INPUT -p tcp -m multiport --dports 49152:49216 -j ACCEPT # snmp -A INPUT -p udp --dport 161 -j ACCEPT # Reject any other input traffic -A INPUT -j REJECT --reject-with icmp-host-prohibited -A FORWARD -m physdev ! --physdev-is-bridged -j REJECT --reject-with icmp-host-prohibited COMMIT
Table A.3. Host Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| 88, 464 | TCP, UDP |
|
| Kerberos authentication. |
| 389, 636 | TCP |
|
| Lightweight Directory Access Protocol (LDAP) and LDAP over SSL. |
Table A.4. Host Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| 5432 | TCP, UDP |
|
| Default port for PostgreSQL database connections. |
/usr/libexec/vdsm/hooks/nn_event-name/ on the host in alphanumeric order. By convention each hook script is assigned a two digit number, included at the front of the file name, to ensure that the order in which the scripts will be run in is clear. You are able to create hook scripts in any programming language, Python will however be used for the examples contained in this chapter.
Warning
Table B.1. Supported VDSM Events
| Name | Description |
|---|---|
| before_vm_start | Before virtual machine starts. |
| after_vm_start | After virtual machine starts. |
| before_vm_cont | Before virtual machine continues. |
| after_vm_cont | After virtual machine continues. |
| before_vm_pause | Before virtual machine pauses. |
| after_vm_pause | After virtual machine pauses. |
| before_vm_hibernate | Before virtual machine hibernates. |
| after_vm_hibernate | After virtual machine hibernates. |
| before_vm_dehibernate | Before virtual machine de-hibernates. |
| after_vm_dehibernate | After virtual machine de-hibernates. |
| before_vm_migrate_source | Before virtual machine migration, run on the source hypervisor host from which the migration is occurring. |
| after_vm_migrate_source | After virtual machine migration, run on the source hypervisor host from which the migration is occurring. |
| before_vm_migrate_destination | Before virtual machine migration, run on the destination hypervisor host to which the migration is occurring. |
| after_vm_migrate_destination | After virtual machine migration, run on the destination hypervisor host to which the migration is occurring. |
| after_vm_destroy | After virtual machine destruction. |
| before_vdsm_start |
Before VDSM is started on the hypervisor host. before_vdsm_start hooks are executed as the user root, and do not inherit the environment of the VDSM process.
|
| after_vdsm_stop |
After VDSM is stopped on the hypervisor host. after_vdsm_stop hooks are executed as the user root, and do not inherit the environment of the VDSM process.
|
vdsm user and inherit the environment of the VDSM process. The exceptions are hook scripts triggered by the before_vdsm_start and after_vdsm_stop events. Hook scripts triggered by these events run as the root user and do not inherit the environment of the VDSM process.
_hook_domxml variable is appended to the environment. This variable contains the path of the libvirt domain XML representation of the relevant virtual machine. The libvirt domain XML format is used by VDSM to define virtual machines. Details on the libvirt domain XML format can be found at http://libvirt.org/formatdomain.html. The uuid of the virtual machine may be deduced from the domain XML, but it is also available as the environment variable vmId.
Important
before_migration_destination and before_dehibernation hooks currently receive the XML of the domain from the source host. The XML of the domain at the destination will have various differences.
rhevm-config. Run this command as the root user on the host where Red Hat Enterprise Virtualization Manager is installed.
UserDefinedVMProperties is used to store the names of the custom properties supported. Regular expressions defining the valid values for each named custom property are also contained in this configuration key.
ovirt-engine service must be restarted for it to take effect.
Example B.1. Defining smartcard Custom Property
- Check the existing custom properties defined by the
UserDefinedVMPropertiesconfiguration key usingrhevm-config -g UserDefinedVMProperties.In this case the custom propertymemoryis already defined. The regular expression^[0-9]+$ensures that the custom property will only ever contain numeric characters.# rhevm-config -g UserDefinedVMProperties UserDefinedVMProperties : version: general UserDefinedVMProperties : version: 2.2 UserDefinedVMProperties : memory=^[0-9]+$ version: 3.1
- As the
memorycustom property is already defined in theUserDefinedVMPropertiesconfiguration key the new custom property must be appended to it. The additional custom property,smartcard, is added to the configuration key's value. The new custom property is able to hold a value oftrueorfalse.# rhevm-config -s UserDefinedVMProperties='memory=^[0-9]+$;smartcard=^(true|false)$' --cver=3.1
- Verify that the custom properties defined by the
UserDefinedVMPropertiesconfiguration key now match your expectations.# rhevm-config -g UserDefinedVMProperties UserDefinedVMProperties : version: general UserDefinedVMProperties : version: 2.2 UserDefinedVMProperties : memory=^[0-9]+$;smartcard=^(true|false)$ version: 3.1
- Finally, the
ovirt-engineservice must be restarted for the configuration change to take effect.# service ovirt-engine restart
Example B.2. Evaluating Custom Properties
key1. If the custom property is set then the value is printed to standard error. If the custom property is not set then no action is taken.
#!/usr/bin/python
import os
import sys
if os.environ.has_key('key1'):
sys.stderr.write('key1 value was : %s\n' % os.environ['key1'])
else:
sys.exit(0)
xml.dom library (http://docs.python.org/release/2.6/library/xml.dom.html) to manipulate the object.
Table B.2. Hooking module functions
| Name | Argument | Description |
|---|---|---|
tobool
| string | Converts a string "true" or "false" to a Boolean value |
read_domxml
| - | Reads the virtual machine's libvirt XML into a DOM object |
write_domxml
| DOM object | Writes the virtual machine's libvirt XML from a DOM object |
before_vm_start scripts may edit the domain XML in order to change VDSM's definition of a virtual machine before it reaches libvirt. Caution must be exercised in doing so. Hook scripts have the potential to disrupt the operation of VDSM, and buggy scripts can result in outages to the Red Hat Enterprise Virtualization environment. In particular, ensure you never change the uuid of the domain, and do not attempt to remove a device from the domain without sufficient background knowledge.
before_vdsm_start and after_vdsm_stop hook scripts are run as the root user. Other hook scripts that require root access to the system must be written to use the sudo command for privilege escalation. To support this the /etc/sudoers must be updated to allow the vdsm user to use sudo without reentering a password. This is required as hook scripts are executed non-interactively.
Example B.3. Configuring sudo for VDSM Hooks
sudo command will be configured to allow the vdsm user to run the /bin/chown command as root.
- Log into the virtualization host as
root. - Open the
/etc/sudoersfile in a text editor. - Add this line to the file:
vdsm ALL=(ALL) NOPASSWD: /bin/chown
This specifies that thevdsmuser has the ability to run the/bin/chowncommand as therootuser. TheNOPASSWDparameter indicates that the user will not be prompted to enter their password when callingsudo.
sudo command to run /bin/chown as root. This Python code uses sudo to execute /bin/chown as root on the file /my_file.
retcode = subprocess.call( ["/usr/bin/sudo", "/bin/chown", "/my_file"] )
Table B.3. Hook Return Codes
| Code | Description |
|---|---|
| 0 | The hook script ended successfully |
| 1 | The hook script failed, other hooks should be processed |
| 2 | The hook script failed, no further hooks should be processed |
| >2 | Reserved |
Example B.4. NUMA Node Tuning
numaset custom property. Where the custom property is not set no action is taken.
numaset=^(interleave|strict|preferred):[\^]?\d+(-\d+)?(,[\^]?\d+(-\d+)?)*$
numaset custom property for a given virtual machine to specify both the allocation mode (interleave, strict, preferred) and the node to use. The two values are separated by a colon (:). The regular expression allows specification of the nodeset as:
- that a specific node (
numaset=strict:1, specifies that only node 1 be used), or - that a range of nodes be used (
numaset=strict:1-4, specifies that nodes 1 through 4 be used), or - that a specific node not be used (
numaset=strict:^3, specifies that node 3 not be used), or - any comma-separated combination of the above (
numaset=strict:1-4,6, specifies that nodes 1 to 4, and 6 be used).
/usr/libexec/vdsm/hooks/before_vm_start/50_numa
#!/usr/bin/python
import os
import sys
import hooking
import traceback
'''
numa hook
=========
add numa support for domain xml:
<numatune>
<memory mode="strict" nodeset="1-4,^3" />
</numatune>
memory=interleave|strict|preferred
numaset="1" (use one NUMA node)
numaset="1-4" (use 1-4 NUMA nodes)
numaset="^3" (don't use NUMA node 3)
numaset="1-4,^3,6" (or combinations)
syntax:
numa=strict:1-4
'''
if os.environ.has_key('numa'):
try:
mode, nodeset = os.environ['numa'].split(':')
domxml = hooking.read_domxml()
domain = domxml.getElementsByTagName('domain')[0]
numas = domxml.getElementsByTagName('numatune')
if not len(numas) > 0:
numatune = domxml.createElement('numatune')
domain.appendChild(numatune)
memory = domxml.createElement('memory')
memory.setAttribute('mode', mode)
memory.setAttribute('nodeset', nodeset)
numatune.appendChild(memory)
hooking.write_domxml(domxml)
else:
sys.stderr.write('numa: numa already exists in domain xml')
sys.exit(2)
except:
sys.stderr.write('numa: [unexpected error]: %s\n' % traceback.format_exc())
sys.exit(2)
- C.1.1. What is the Domain Management Tool?
- C.1.2. Syntax for the Domain Management Tool
- C.1.3. Using the Domain Management Tool
- C.1.4. Adding Domains to Configuration
- C.1.5. Editing a Domain in the Configuration
- C.1.6. Deleting a Domain from the Configuration
- C.1.7. Validating Domain Configuration
- C.1.8. Listing Domains in Configuration
- C.1.9. Getting a Configuration Value
- C.1.10. Setting a Configuration Value
admin user to add the directory service that the users must be authenticated against. You add and remove directory services domains using the included domain management tool, rhevm-manage-domains.
rhevm-manage-domains command is only accessible on the machine on which Red Hat Enterprise Virtualization Manager is installed. The rhevm-manage-domains command must be run as the root user.
rhevm-manage-domains -action=ACTION [options]add- Add a domain to Red Hat Enterprise Virtualization Manager's directory services configuration.
edit- Edit a domain in Red Hat Enterprise Virtualization Manager's directory services configuration.
delete- Delete a domain from Red Hat Enterprise Virtualization Manager's directory services configuration.
validate- Validate Red Hat Enterprise Virtualization Manager's directory services configuration. This command attempts to authenticate each domain in the configuration using the configured user name and password.
list- List Red Hat Enterprise Virtualization Manager's current directory services configuration.
-domain=DOMAIN- Specifies the domain on which the action will be performed. The
-domainparameter is mandatory foradd,edit, anddelete. -provider=PROVIDER- Specifies the LDAP provider type of the directory server for the domain. Valid values are:
ActiveDirectory- Active Directory.IPA- Identity, Policy, Audit.RHDS- Red Hat Directory Server.
-user=USER- Specifies the domain user to use. The
-userparameter is mandatory foradd, and optional foredit. -passwordFile=FILE- Specifies that the domain user's password is on the first line of the provided file. This option, or the
-interactiveoption, must be used to provide the password for use with theaddaction. -addPermissions- Specifies that the domain user will be given the
SuperUserrole in Red Hat Enterprise Virtualization Manager. By default, if the-addPermissionsparameter is not specified, theSuperUserrole is not assigned to the domain user. The-addPermissionsoption is optional. It is only valid when used in combination with theaddandeditactions. -interactive- Specifies that the domain user's password is to be provided interactively. This option, or the
-passwordFileoption, must be used to provide the password for use with theaddaction. -configFile=FILE- Specifies an alternate configuration file that the command must load. The
-configFileparameter is always optional. -report- In conjunction with the
validateaction results in the output of a report of all encountered validation errors.
rhevm-manage-domains command's help output:
# rhevm-manage-domains --help
rhevm-manage-domains command to perform basic manipulation of the Red Hat Enterprise Virtualization Manager domain configuration.
rhevm-manage-domains command is used to add the IPA domain directory.demo.redhat.com to the Red Hat Enterprise Virtualization Manager configuration. The configuration is set to use the admin user when querying the domain; the password is provided interactively.
Example C.1. rhevm-manage-domains Add Action
# rhevm-manage-domains -action=add -domain=directory.demo.redhat.com -provider=IPA -user=admin -interactive loaded template kr5.conf file setting default_tkt_enctypes setting realms setting domain realm success User guid is: 80b71bae-98a1-11e0-8f20-525400866c73 Successfully added domain directory.demo.redhat.com. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart).
rhevm-manage-domains command is used to edit the directory.demo.redhat.com domain in the Red Hat Enterprise Virtualization Manager configuration. The configuration is updated to use the admin user when querying this domain; the password is provided interactively.
Example C.2. rhevm-manage-domains Edit Action
# rhevm-manage-domains -action=edit -domain=directory.demo.redhat.com -user=admin -interactive loaded template kr5.conf file setting default_tkt_enctypes setting realms setting domain realmo success User guide is: 80b71bae-98a1-11e0-8f20-525400866c73 Successfully edited domain directory.demo.redhat.com. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart).
rhevm-manage-domains command is used to remove the directory.demo.redhat.com domain from the Red Hat Enterprise Virtualization Manager configuration. Users defined in the removed domain will no longer be able to authenticate with the Red Hat Enterprise Virtualization Manager. The entries for the affected users will remain defined in the Red Hat Enterprise Virtualization Manager until they are explicitly removed.
admin user from the internal domain will be able to log in until another domain is added.
Example C.3. rhevm-manage-domains Delete Action
# rhevm-manage-domains -action=delete -domain='directory.demo.redhat.com' WARNING: Domain directory.demo.redhat.com is the last domain in the configuration. After deleting it you will have to either add another domain, or to use the internal admin user in order to login. Successfully deleted domain directory.demo.redhat.com. Please remove all users and groups of this domain using the Administration portal or the API.
rhevm-manage-domains command is used to validate the Red Hat Enterprise Virtualization Manager configuration. The command attempts to log into each listed domain with the credentials provided in the configuration. The domain is reported as valid if the attempt is successful.
Example C.4. rhevm-manage-domains Validate Action
# rhevm-manage-domains -action=validate User guide is: 80b71bae-98a1-11e0-8f20-525400866c73 Domain directory.demo.redhat.com is valid.
rhevm-manage-domains command is used to list the domains defined in the Red Hat Enterprise Virtualization Manager configuration. For each configuration entry the command displays the domain, the user name — in User Principle Name (UPN) format — and whether the domain is local or remote.
Example C.5. rhevm-manage-domains List Action
# rhevm-manage-domains -action=list
Domain: directory.demo.redhat.com
User name: admin@DIRECTORY.DEMO.REDHAT.COM
This domain is a remote domain.
rhevm-config.
- list all available configuration keys,
- list all available configuration values,
- retrieve the value of a specific configuration key, and
- set the value of a specific configuration key.
--cver parameter to specify the configuration version to be used when retrieving or setting a value for a configuration key. The default configuration version is general.
rhevm-config command:
# rhevm-config --helpCommon tasks
- List available configuration keys
- Use the
--listparameter to list available configuration keys.#
rhevm-config--listEach available configuration key is listed by name and description. - List available configuration values
- Use the
--allparameter to list available configuration values.#
rhevm-config--allEach available configuration key is listed by name, current value of the key, and the configuration version. - Retrieve value of configuration key
- Use the
--getparameter to retrieve the value of a specific key.#
rhevm-config--getKEY_NAMEReplaceKEY_NAMEwith the name of the specific key to retrieve the key name, value, and the configuration version. Use the--cverparameter to specify the configuration version of the value to be retrieved. - Set value of configuration key
- Use the
--setparameter to set the value of a specific key. You must also set the configuration version to which the change is to apply using the--cverparameter.#
rhevm-config--setKEY_NAME=KEY_VALUE--cver=VERSIONReplaceKEY_NAMEwith the name of the specific key to set; replaceKEY_VALUEwith the value to be set. Environments with more than one configuration version require theVERSIONto be specified.
admin@internal user account is automatically created upon installation of the Red Hat Enterprise Virtualization Manager. This account is stored locally in the Red Hat Enterprise Virtualization Manager's PostgreSQL database, separate from external directory services such as IPA or Active Directory. Unlike external directory domains, users cannot be added or deleted from the internal domain. The admin@internal user is the SuperUser of the Red Hat Enterprise Virtualization Manager and has administrative privileges over the environment via the Administration Portal.
admin@internal user is set during the installation of the Red Hat Enterprise Virtualization Manager. Use the rhevm-config utility if you need to reset the password.
- Log in to the Red Hat Enterprise Virtualization Manager server as the
rootuser. - Use the rhevm-config utility to set a new password for the
admin@internaluser.# rhevm-config -s AdminPassword=interactiveUse escape characters if your password includes any special characters. - Restart the ovirt-engine service for the changes to take effect.
# service ovirt-engine restart
Example C.8. Getting a Configuration Value
# rhevm-config --get=SearchResultsLimit --cver=general
100
Example C.9. Setting a Configuration Value
# rhevm-config --set SearchResultsLimit=50 --cver=general
Table C.1. Red Hat Enterprise Virtualization Manager Configuration Options, Explanations, Limitations, and Best Practices
| Option Name | Description | Possible values | Recommended (default) values | Comments |
|---|---|---|---|---|
| AsyncTaskPollingRate | Async Task Polling Rate (in seconds) | Integer | 10 | How often (in seconds) RHEV-M queries the status of an async task currently running. |
| AsyncTaskZombieTaskLifeInMinutes | Zombie tasks lifetime in minutes | Integer | 3000 | How long (in minutes) a task is allowed to run before assuming it has become a zombie and should be killed. The value affects large storage manipulations especially. When using slow storage and large virtual images, or when a task is known to take longer than 3000 minutes (50 hours), the value should be increased. |
| AuditLogAgingThreshold | Audit Log Aging Threshold (in days) | Integer | 30 | How long an audit log is kept before being rotated. |
| AuditLogCleanupTime | Time to check for Audit Log cleanup | Time | 03:35:35 | At what time the Audit Log is checked for Aging and cleaned up. |
| AuthenticationMethod | Authentication Method used by RHEV-M | String | LDAP | The API used for querying users. Currently LDAP is the only supported value. |
| BlockMigrationOnSwapUsagePercentage | Host swap percentage threshold (for scheduling) | Integer | 0 | The maximum percentage of swap on the host that a VM run or migration is allowed on this host. If the host is swapping beyond this percentage a VM will not migrate over and will not be started. |
| CABaseDirectory | CA Base Directory | String | /etc/pki/ovirt-engine | Where the RHEV-M Certificate Authority is located on the RHEV-M host. |
| CertificateFileName | Certificate File Name | String | /etc/pki/ovirt-engine/certs/engine.cer | Points to the certificate file used by RHEV-M for SSL/TLS communication with VDSM. |
| CertificateFingerPrint | Certificate Finger Print | String | Automatically populated | Unused. |
| CertificatePassword | Certificate Password | Password | Automatically populated | Unused. |
| CpuOverCommitDurationMinutes | The duration in minutes of CPU consumption to activate selection algorithm | Integer | 2 | When the cluster policy is set to Even Distribution, wait for this amount of minutes after detecting CPU overcommit before triggering virtual machine migrations to rebalance the host load. This configuration value applies only for the default. |
| DefaultWorkgroup | Default Workgroup | String | WORKGROUP | Unused. |
| DisableFenceAtStartupInSec | Disable Fence Operations At RHEV-M Startup in Seconds | Integer | 300 | Allow this amount of seconds after RHEV-M starts to detect hosts, before assuming the hosts are non-responsive and proceed to fence hosts. This value should be increased when RHEV-M is on a machine that has slow network startup (a VMWare guest, for example). |
| EnableHostTimeDrift | Enable Checking Of Host Time Drifting | String | False | Check to see if host time and date are out of sync with NTP server. |
| EnableSpiceRootCertificateValidation | Enable Spice Root Certification Validation | String | true | If 'true', the certificate of the host on which the virtual machine is running and the RHEV-M setup CA certificate are sent to the SPICE client when attempting to connect to the virtual machine with SPICE, as an extra security mechanism. |
| EnableUSBAsDefault | Enable USB devices attachment to the virtual machine by default | String | true | |
| EnableVdsLoadBalancing | Enables Host Load Balancing system | String | true | This config value allows the user to turn on or off (true and false, respectively) the virtual machine load balancing according to the policy configured for the cluster. |
| FreeSpaceCriticalLowInGB | Critical low disk space alert threshold (in GB) | Integer | 5 | Produces an alert when a Storage Domain has this amount of space left. This setting is also used in various preliminary tests for action sanity when users try to use storage domains, to prevent reaching this critical amount. Adding and importing disks will fail if the amount of space is less than the value specified here. |
| FreeSpaceLow | Limit of percentage of free disk space below which it is considered low | Integer | 10 | When a storage domain has this percentage of space left, it is considered low on disk space. |
| HighUtilizationForEvenlyDistribute | High Utilization Limit For Evenly Distribute selection algorithm | Integer | 75 | Maximum number of virtual machines per host in the Evenly Distribute algorithm. |
| HighUtilizationForPowerSave | High Utilization Limit For Power Save selection algorithm | Integer | 75 | A default for newly created clusters, in use with PowerSave load balancing algorithm, marks the higher limit of host utilization for populating hosts. |
| HostTimeDriftInSec | Maximum Allowable Host Time Drift in Seconds | Integer | 300 |
This parameter must be used with the EnableHostTimeDrift parameter.
|
| LocalAdminPassword | Local Administrator Password | Password | Populated during initial setup |
The password for admin@local default user.
|
| LogPhysicalMemoryThresholdInMB | Threshold for logging low host memory in MB | Integer | 1024 | The minimum amount of RAM left before a host is considered low on memory. If a host's RAM is lower than this setting, it is recorded on the audit log and no action is taken. |
| LogXmlRpcData | Log XML-RPC Data | String | false |
Unused. To use this option configure settings in log4j.xml.
|
| LowUtilizationForEvenlyDistribute | Low Utilization Limit for Evenly Distribute selection algorithm | Integer | 0 | Minimum number of virtual machines per host in the Evenly Distribute algorithm. |
| LowUtilizationForPowerSave | Low Utilization Limit for Power Save selection algorithm | Integer | 20 | A default for newly created clusters, in use with PowerSave load balancing algorithm, marks the lower limit of host utilization for populating hosts. |
| MacPoolRanges | MAC Addresses Pool Ranges | String | 00:1A:4A:23:18:00-00:1A:4A:23:18:FF | The MAC address pool range to be automatically assigned to virtual machines. |
| MaxDiskSize | Max size of newly created disk (in GB) | Integer | 16384 | The maximum size (in GB) for a new virtual disk image assigned to virtual machines. |
| MaxMacsCountInPool | Maximum MAC Addresses count in Pool | Integer | 100000 | Maximum number of MAC addresses allowed in the MAC pool. |
| MaxNumberofHostsInStoragePool | Maximum number of hosts in Storage Pool | Integer | 250 | Limits the maximum number of hosts assigned to the clusters of a single Data Center. This can be increased after testing more hosts, if necessary. |
| MaxNumOfCpuPerSocket | Maximum Number of CPU per socket | Integer | v2.2:16 v3.0:16 | Maximum number of virtual CPU cores that can be assigned to a single virtual CPU socket. |
| MaxNumOfVMCpus | Total Numbers of Virtual Machine CPUs | Integer | v2.2:16 v3.0:64 | Maximum total amount of CPU cores assigned to a virtual machine (determined by number of cores multiplied by number of sockets). |
| MaxNumofVmSockets | Maximum number of sockets per virtual machine | Integer | v2.2:16 v3.0:16 | Maximum number of virtual CPU sockets assigned to a virtual machine. |
| MaxRerunVmOnVdsCount | Maximum virtual machine rerun attempts on a host | Integer | 3 | Maximum number of attempts to start a virtual machine on a host before an error ("unable to start VM") is reported. |
| MaxStorageVdsDelayCheckSec | Max delay for check of domain in seconds | Integer | 5 | Maximum amount of seconds to wait for storage domain status to be returned before reporting an error. |
| MaxStorageVdsTimeoutCheckSec | Maximum timeout for last check of domain in seconds | Integer | 30 | When monitoring storage, vdsmd on the hosts reports a "lastCheck" value for each domain. This setting is used to decide whether the last check happened too long ago and domain is considered in error. |
| MaxVDSMemOverCommit | Max Host Memory Over-Commit (%) for virtual desktops load | Integer | 200 | The percentage of memory overcommit permitted to occur when using virtual desktop loads. |
| MaxVdsMemOverCommitForServers | Maximum Host Memory Over-Commit (%) for Virtual Servers load | Integer | 150 | The percentage of memory overcommit permitted to occur when using virtual server loads. |
| MaxVdsNameLength | Max VDS name length | Integer | 255 | Maximum name length for a Hypervisor host. |
| MaxVmNameLengthNonWindows | Maximum virtual machine name length for non-Windows operating system | Integer | 64 | Maximum name length for a non-Windows virtual machine. |
| MaxVmNameLengthWindows | Maximum name length in Windows | Integer | 15 | Maximum name length for Windows virtual machine (limitation imposed by Windows hostnames). |
| MaxVmsInPool | Max virtual machines in pool | Integer | 1000 | Maximum number of virtual machines in a single data center. |
| NumberofFailedRunsOnVds | Number of Failed Runs on Host | Integer | 3 | Number of attempts to run virtual machines on hosts before setting host status to "Error". |
| NumberOfVmsForTopSizeVms | Number of virtual machines with highest disk size to display | Integer | 10 | Number of virtual machines to display in the storage domain's virtual machine tab. Will display this amount of virtual machines, sorted by the most storage space per used virtual machine. |
| NumberVmRefreshesBeforeSave | Number of Virtual Machine Data Refreshes Before Saving to Database | Integer | 5 | The number of host monitor iterations between refreshing virtual machines from VDSM (determines if virtual machines should be refreshed one upon each iteration) |
| oVirtISOsRepositoryPath | The RHEV-H installation files path | String | /usr/share/rhev-hypervisor | The location of RHEV-H ISO images used for upgrading Hypervisor hosts. |
| ProductKey2003x64 | Product Key (for Windows 2003 x64) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2008 | Product Key (for Windows 2008) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2008R2 | Product Key (for Windows 2008 R2) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2008x64 | Product Key (for Windows 2008 x64) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey | Product Key (for Windows XP) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKeyWindow7 | Product Key (for Windows 7) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKeyWindow7x64 | Product Key (for Windows 7 x64) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductRPMVersion | Red Hat Enterprise Virtualization Manger RPM Version | String | Automatically populated | The PRM version of the currently used rhevm package. |
| RDPLoginWithFQN | Connect to RDP console with Fully Qualified User-Name (user@domain) | String | true | - |
| SANWipeAfterDelete | Initializing disk image is more secure but it can be time consuming and I/O intensive depending on the size of the image | String | false | Represents the default value (checked/unchecked) of the "wipe after delete" check box in the "New Virtual Disk" dialog if the newly-created Disk belongs to a SAN (FC/iSCSI) Data Center (i.e. about to be created on a SAN storage domain). |
| SearchResultsLimit | Max Quantity of Search Results | Integer | 100 | The number of results to return for search queries if no specific figure is given in the web administration portal or REST. |
| ServerRebootTimeout | Host Reboot Timeout (in seconds) | Integer | 300 |
Wait this amount of seconds when a host is rebooted or fenced, before determining that the host is Non Responsive. Can be increased for hosts that take longer to reboot.
|
| SpiceReleaseCursorKeys | Keyboard keys combination that causes the mouse cursor to be released from its grab on SPICE | String | Shift+F12 | - |
| SpiceSecureChannels | SPICE Secure Channels | String | smain, sinputs | Which SPICE channels should be secured with SSL. Valid values are one or more of: smain, sinputs, scursor, splayback, srecord, sdisplay. |
| SpiceToggleFullScreenKeys | Keyboard keys combination that toggles the full-screen state of SPICE client window | String | Shift+F11 | - |
| SpiceUsbAutoShare | Enable USB devices sharing by default in SPICE | String | true | Represents the default value (checked/unchecked) of the "Enable USB Auto-Share" check box in the SPICE Console Options dialog in the User Portal. |
| SpmCommandRailOverRetries | Number of retries to failover the Storage Pool Manager on failed commands | Integer | 3 | Number of SPM selection failover retries. In case an SPM command fails, backend performs a failover - it selects a new SPM and re-runs the command. |
| SPMFailOverAttempts | Number of attempts to connect to the Storage Pool Manager before Failover | Integer | 3 | When monitoring a Storage Pool, if the current SPM fails, failover does not happen immediately (see description of SpmCommandFailOverRetries). This setting defines the number of retries before deciding that the current SPM is down and a failover is required. |
| SpmVCpuConsumption | The CPI consumption of SPM embodied as number of VCPUs on the Host | Integer | 1 | When a host is the SPM, it is considered to be using this amount of extra virtual CPUs, to make up for the overhead that SPM operations generate. |
| SSHInactivityTimeoutSeconds | SSH Inactivity Timeout (in seconds) | Integer | 600 | The maximum amount of time backend allows for an SSH session to remote hosts. After this timeout the session is killed. |
| SSLEnabled | SPICE SSL Enabled | String | true | Whether SPICE Secure channels should be SSL encrypted. |
| StorageDomainFailureTimeoutInMinutes | Storage Domain failure timeout | Integer | 5 | Defines the amount of time taken before deciding domain is problematic, starting at the first failure reported by VDSM (in minutes). |
| StoragePoolRefreshTimeInSeconds | Storage Pool Manager Polling Rate (in seconds) | Integer | 10 | Storage Pool monitoring frequency. |
| SysPrep2K3Path | Path to a Windows 2003 machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.2k3 | Path to the operating system specific sysprep file template. |
| SysPrep2K8Path | Path to a Windows 2008 machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.2k8x86 | Path to the operating system specific sysprep file template. |
| SysPrep2K8R2Path | Path to a Windows 2008 R2 machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.2k8 | Path to the operating system specific sysprep file template. |
| SysPrep2K8x64Path | Path to a Windows 2008 machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.2k8 | Path to the operating system specific sysprep file template. |
| SysPrepWindows7Path | Path to a Windows 7 machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.w7 | Path to the operating system specific sysprep file template. |
| SysPrepWindows7x64Path | Path to a Windows 7 x64 machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.w7x64 | Path to the operating system specific sysprep file template. |
| SysPrepXPPath | Path to a Windows XP machine sysprep file | string | /usr/share/ovirt-engine/sysprep/sysprep.xp | Path to the operating system specific sysprep file template. |
| TimeoutToResetVdsInSeconds | Communication timeout in seconds before attempting reset | Integer | 60 |
The amount of time a host is nonresponsive before a fence command is issued. This is used in conjunction with VDSAttemptsToResetCount.
|
| TimeToReduceFailedRunOnVdsInMinutes | Time to Reduce Failed Run on Host (in minutes) | Integer | 30 | The amount of time that the host will be in Error status after failing to run virtual machines. |
| UserDefinedVMProperties | User-defined virtual machine properties | String | Custom properties set by user | Mostly used with VDSM hooks. |
| UserRefreshRate | Refresh Rate of Users' Data from Active Directory (in seconds) | Integer | 3600 | How often the directory server is polled for user account updates. |
| UtilizationThresholdInPercent | The Utilization Threshold (in percent) | Integer | 80 | In load balancing, this is a default value used to calculate the maximum CPU limit to determine if the host is over-utilized. This is the percent of the value that the user set in high-utilization in the cluster. |
| ValidNumOfMonitors | Valid Numbers of Monitors | Integer | 1,2,4 | Number of monitors available for SPICE-enabled virtual machines. |
| VdcBootStrapUrl | Host Installation Bootstrap Script URL | String | Automatically populated by RHEV-M FQDN: http://RHEVM-FQDN:8080/Components/vds | The URL for the location of the host installation bootstrap scripts, used for adding Hypervisor hosts. |
| VdcVersion | Red Hat Enterprise Virtualization Manager Version | String | Automatically set to the current version of RHEV-M | - |
| VDSAttemptstoResetCount | Number of attempts to communicate with Host before trying to reset | Integer | 2 |
The amount of times to retry communications with a host before a fence command is issued. Used in conjunction with TimeoutToResetVdsInSeconds.
|
| VdsLoadBalancingIntervalInMinutes | Host Load Balancing Interval (in minutes) | Integer | 1 | The interval between running the virtual machines' load balancer in minutes (also defines the first invocation of the load balancer). |
| VdsRecoveryTimeoutInMinutes | Host Timeout when Recovering (in minutes) | Integer | 3 | When VDSM fails/restarts, it can sometimes be in recovering mode (VDSM reports "initializing" or "recovering from reports"). |
| VdsRefreshRate | Time interval in seconds to poll a Host's status | Integer | 2 | How often a Hypervisor host's status is checked. |
| vdsTimeout | Host Control Communication Timeout (in seconds) | Integer | 180 | Timeout for a VDSM call - the time engine will wait for sync call to VDSM. |
| VirtualMachineDomainName | Virtual Machine Domain Name | String | Automatically populated with the FQDN of RHEV-M | Deprecated. |
| VMGracefulShutdownMessage | Message displayed in Virtual Machine when Virtual Machine is being shut down from Red Hat Enterprise Virtualization Manager | String | The Red Hat Enterprise Virtualization Manager is shutting down this Virtual Machine | - |
| VMMinMemorySizeInMB | Minimal memory size of virtual machine in MB | Integer | 256 | - |
| VncKeyboardLayout | Keyboyard Layout configuration for VNC | String | en-us | Possible values: ar, da, de-ch, en-us, et, fo, fr-be, fr-ch, hu, it, li, mk, nl, no, pt, ru, sv, tr, de en-gb, es, fi, fr, fr-ca, hr, is, ja, lv, nl-be, pl, pt-br, sl, th. |
| WaitForVdsInitInSec | Wait for a host to complete init in SPM selection | Integer | 60 |
This is a timeout for initializing host as in VdsRecoveryTimeoutInMinutes, but this timeout is shorter and is used during the SPM selection algorithm. If the selected host is initialized, wait for it to recover.
|
| FenceQuietTimeBetweenOperationsInSec | Quiet time between Power Management operations in seconds | Integer | 180 | The minimum time in seconds between two power management operations activated manually by a user. |
| MaxAuditLogMessageLength | Maximum length of an Audit Log message | Integer | 10000 | - |
| SysPrepDefaultUser | Default sysprep user name | String | - | This user is used if the domain for sysprep is unknown or no domain is specified. |
| SysPrepDefaultPassword | Default SysPrep user password | Password | Empty | This password is used if the domain for sysprep is unknown or no domain is specified. |
| UserSessionTimeOutInterval | Session timeout interval in minutes | Integer | 30 | User session timeout. Global for all types of access - User Portal/Admin Portal/Web Admin/API. |
| AdminPassword | admin user password | Password | ****** | Password of admin user (used if no directory service is used for authentication). |
|-- images | |-- [Image Group UUID] | |--- [Image UUID (this is the disk image)] | |--- [Image UUID (this is the disk image)].meta |-- master | |---vms | |--- [UUID] | |--- [UUID].ovf
rhevm-image-uploader[options]listrhevm-image-uploader[options]upload[file].[file]...[file]
list and upload.
- The
listparameter lists the valid export storage domains available for image uploads. - The
uploadparameter uploads selected image file(s) to the specified image storage domain.
list or upload parameter be included for basic usage. The upload parameter requires a minimum of one local file name to upload.
rhevm-image-uploader command. You can set defaults for any of these in the /etc/ovirt-engine/imageuploader.conf file.
General Options
-h,--help- Displays command usage information and returns to prompt.
--conf-file=PATH- Sets
PATHas the configuration file the tool is to use. The default isetc/ovirt-engine/imageuploader.conf. --log-file=PATH- Sets
PATHas the specific file name the command should use for the log output. --quiet- Sets quiet mode, reducing console output to a minimum. Quiet mode is off by default.
-v,--verbose- Sets verbose mode, providing more console output. Verbose mode is off by default.
-f,--force- Force mode is necessary when the source file being uploaded has an identical file name as an existing file at the destination; it forces the existing file to be overwritten. Force mode is off by default.
Red Hat Enterprise Virtualization Manager Options
-u,USER--user=USER- Sets the user associated with the file to be uploaded. The
USERis specified in the formatuser@domain, whereuseris the user name anddomainis the directory services domain in use. The user must exist in directory services and be known to the Red Hat Enterprise Virtualization Manager. -r,FQDN--rhevm=FQDN- Sets the fully qualified domain name of the Red Hat Enterprise Virtualization Manager server from which to upload images, where
FQDNis replaced by the fully qualified domain name of the Manager. It is assumed that the image uploader is being run on the same client machine as the Red Hat Enterprise Virtualization Manager; the default value islocalhost:443.
Export Storage Domain Options
-e,--export-domain=EXPORT_DOMAIN- Sets the storage domain
EXPORT_DOMAINas the destination for uploads. -n,--nfs-server=NFSSERVER- Sets the NFS path
NFSSERVERas the destination for uploads. -i,--ovf-id- Use this option if you do not want to update the UUID of the image. By default, the tool will generate a new UUID for the image. This ensures that there is no conflict between the id of the incoming image and those already in the environment.
-d,-disk-instance-id- Use this option if you do not want to rename the instance ID for each disk (i.e. InstanceId) in the image. By default, this tool will generate new UUIDs for disks within the image to be imported. This ensures that there are no conflicts between the disks on the imported image and those within the environment.
-m,--mac-address- Use this option if you do not want to remove the network components from the image that will be imported. By default, this tool will remove any network interface cards from the image to prevent conflicts with network cards on other virtual machines within the environment. Once the image has been imported, use the Administration Portal to add network interface cards back and the Manager will ensure that there are no MAC address conflicts.
-N,NEW_IMAGE_NAME--name=NEW_IMAGE_NAME- Supply this option if you want to rename the image.
rhevm-image-uploader tool.
Procedure C.1. Creating an OVF Archive That is Compatible with the Image Uploader
- Use the Manager to create an empty export domain. An empty export domain makes it easy to see which directory contains your virtual machine.
- Export your virtual machine to the empty export domain you just created.
- Log in to the storage server that serves as the export domain, find the root of the NFS share and change to the subdirectory under that mount point. You started with a new export domain, there is only one directory under the exported directory. It contains the
images/andmaster/directories. - Run the
tar -zcvf my.ovf images/ master/command to create the tar/gzip ovf archive. - Anyone you give the resulting ovf file to (in this example, called
my.ovf) can import it to Red Hat Enterprise Virtualization Manager using therhevm-image-uploadercommand.
rhevm-image-uploader command to upload your image into their Red Hat Enterprise Virtualization environment.
rhevm-image-uploader to list storage domains:
Example C.10. Uploading a file Using the rhevm-image-uploader Tool
# rhevm-image-uploader list Please provide the REST API username for RHEV-M: admin@internal Please provide the REST API password for the admin@internal RHEV-M user: ********** Export Storage Domain Name | Datacenter | Export Domain Status myexportdom | Myowndc | active
-n NFSSERVER) or export domain (-e EXPORT_STORAGE_DOMAIN) and the name of the .ovf file:
# rhevm-image-uploader -e myexportdom upload myrhel6.ovf Please provide the REST API username for RHEV-M: admin@internal Please provide the REST API password for the admin@internal RHEV-M user: **********
usbfilter.txt policy file. The policy rules defined in this file allow or deny the pass-through of specific USB devices from client machines to virtual machines managed using the Red Hat Enterprise Virtualization Manager. The policy file resides on the Red Hat Enterprise Virtualization Manager in the following location:
/etc/ovirt-engine/usbfilter.txt
ovirt-engine service on the Red Hat Enterprise Virtualization Manager server is restarted.
USBFilterEditor.msi file from the Red Hat Enterprise Virtualization Manager (v.3.1 x86_64) channel of the Red Hat Network.
Procedure C.2. Installing the USB Filter Editor
- On a Windows machine, launch the
USBFilterEditor.msiinstaller obtained from Red Hat Network. - Follow the steps of the installation wizard. Unless otherwise specified, the USB Filter Editor will be installed by default in either
C:\Program Files\RedHat\USB Filter EditororC:\Program Files(x86)\RedHat\USB Filter Editordepending on your version of Windows. - A USB Filter Editor shortcut icon is created on your desktop.
Important
Table C.2. USB Editor Fields
| Name | Description |
|---|---|
| Class | Type of USB device; for example, printers, mass storage controllers. |
| Vendor | The manufacturer of the selected type of device. |
| Product | The specific USB device model. |
| Revision | The revision of the product. |
| Action | Allow or block the specified device. |
Procedure C.3. Adding a USB Policy
- Click the button. The Edit USB Criteria window opens:
- Use the USB Class, Vendor ID, Product ID, and Revision check boxes and lists to specify the device.Click the button to permit virtual machines use of the USB device; click the button to prohibit the USB device from virtual machines.Click to add the selected filter rule to the list and close the window.
Example C.11. Adding a Device
The following is an example of how to add USB ClassSmartcard, deviceEP-1427X-2 Ethernet Adapter, from manufacturerAcer Communications & Multimediato the list of allowed devices.
- Click → to save the changes.
Procedure C.4. Removing a USB Policy
- Click . A message displays prompting you to confirm that you want to remove the policy.
- Click to confirm that you want to remove the policy.
- Click → to save the changes.
Procedure C.5. Searching for USB Device Policies
- Select the device and click or as appropriate. Double-click the selected device to close the window. A policy rule for the device is added to the list.
- Use the Up and Down buttons to change the position of the new policy rule in the list.
- Click → to save the changes.
ovirt-engine service.
Procedure C.6. Exporting a USB Policy
- Click ; the window opens.
- Save the file with a file name of
usbfilter.txt. - Using a Secure Copy client, such as WinSCP, upload the
usbfilter.txtfile to the server running Red Hat Enterprise Virtualization Manager. The file must be placed in the following directory on the server:/etc/ovirt-engine/ - As the
rootuser on the server running Red Hat Enterprise Virtualization Manager, restart theovirt-engineservice.# service ovirt-engine restart
Procedure C.7. Importing a USB Policy
- Using a Secure Copy client, such as WinSCP, upload the
usbfilter.txtfile to the server running Red Hat Enterprise Virtualization Manager. The file must be placed in the following directory on the server:/etc/ovirt-engine/ - Double-click the USB Filter Editor shortcut icon on your desktop to open the editor.
- Click to open the window.
- Open the
usbfilter.txtfile that was downloaded from the server.
rhevm-log-collector. You are required to log in as the root user and provide the administration credentials for the Red Hat Enterprise Virtualization environment. The rhevm-log-collector -h command displays usage information, including a list of all valid options for the rhevm-log-collector command.
rhevm-log-collector[options]list[all, clusters, datacenters]rhevm-log-collector[options]collect
list and collect.
- The
listparameter lists either the hosts, clusters, or data centers attached to the Red Hat Enterprise Virtualization Manager. You are able to filter the log collection based on the listed objects. - The
collectparameter performs log collection from the Red Hat Enterprise Virtualization Manager. The collected logs are placed in an archive file under the/tmp/logcollectordirectory. Therhevm-log-collectorcommand assigns each log a specific file name.
rhevm-log-collector command.
General options
--version- Displays the version number of the command in use and returns to prompt.
-h,--help- Displays command usage information and returns to prompt.
--conf-file=PATH- Sets
PATHas the configuration file the tool is to use. --local-tmp=PATH- Sets
PATHas the directory in which logs are saved. The default directory is/tmp/logcollector. --ticket-number=TICKET- Sets
TICKETas the ticket, or case number, to associate with the SOS report. --upload=FTP_SERVER- Sets
FTP_SERVERas the destination for retrieved logs to be sent using FTP. Do not use this option unless advised to by a Red Hat support representative. --log-file=PATH- Sets
PATHas the specific file name the command should use for the log output. --quiet- Sets quiet mode, reducing console output to a minimum. Quiet mode is off by default.
-v,--verbose- Sets verbose mode, providing more console output. Verbose mode is off by default.
Red Hat Enterprise Virtualization Manager Options
rhevm-log-collector --user=admin@internal --cluster ClusterA,ClusterB --hosts "SalesHost"* specifies the user as admin@internal and limits the log collection to only SalesHost hosts in clusters A and B.
--no-hypervisors- Omits virtualization hosts from the log collection.
-u,USER--user=USER- Sets the user name for login. The
USERis specified in the formatuser@domain, whereuseris the user name anddomainis the directory services domain in use. The user must exist in directory services and be known to the Red Hat Enterprise Virtualization Manager. -r,FQDN--rhevm=FQDN- Sets the fully qualified domain name of the Red Hat Enterprise Virtualization Manager server from which to collect logs, where
FQDNis replaced by the fully qualified domain name of the Manager. It is assumed that the log collector is being run on the same local host as the Red Hat Enterprise Virtualization Manager; the default value islocalhost. -c,CLUSTER--cluster=CLUSTER- Collects logs from the virtualization hosts in the nominated
CLUSTERin addition to logs from the Red Hat Enterprise Virtualization Manager. The cluster(s) for inclusion must be specified in a comma-separated list of cluster names or match patterns. -d,DATACENTER--data-center=DATACENTER- Collects logs from the virtualization hosts in the nominated
DATACENTERin addition to logs from the Red Hat Enterprise Virtualization Manager. The data center(s) for inclusion must be specified in a comma-separated list of data center names or match patterns. -H,HOSTS_LIST--hosts=HOSTS_LIST- Collects logs from the virtualization hosts in the nominated
HOSTS_LISTin addition to logs from the Red Hat Enterprise Virtualization Manager. The hosts for inclusion must be specified in a comma-separated list of host names, fully qualified domain names, or IP addresses. Match patterns are also valid.
SOS Report Options
--jboss-home=JBOSS_HOME- JBoss installation directory path. The default is
/var/lib/jbossas. --java-home=JAVA_HOME- Java installation directory path. The default is
/usr/lib/jvm/java. --jboss-profile=JBOSS_PROFILE- Displays a quoted and space-separated list of server profiles; limits log collection to specified profiles. The default is
'rhevm-slimmed'. --enable-jmx- Enables the collection of run-time metrics from Red Hat Enterprise Virtualization's JBoss JMX interface.
--jboss-user=JBOSS_USER- User with permissions to invoke JBoss JMX. The default is
admin. --jboss-logsize=LOG_SIZE- Maximum size in MB for the retrieved log files.
--jboss-stdjar=STATE- Sets collection of JAR statistics for JBoss standard JARs. Replace
STATEwithonoroff. The default ison. --jboss-servjar=STATE- Sets collection of JAR statistics from any server configuration directories. Replace
STATEwithonoroff. The default ison. --jboss-twiddle=STATE- Sets collection of twiddle data on or off. Twiddle is the JBoss tool used to collect data from the JMX invoker. Replace
STATEwithonoroff. The default ison. --jboss-appxml=XML_LIST- Displays a quoted and space-separated list of applications with XML descriptions to be retrieved. Default is
all.
SSH Configuration
--ssh-port=PORT- Sets
PORTas the port to use for SSH connections with virtualization hosts. -k,KEYFILE--key-file=KEYFILE- Sets
KEYFILEas the public SSH key to be used for accessing the virtualization hosts. --max-connections=MAX_CONNECTIONS- Sets
MAX_CONNECTIONSas the maximum concurrent SSH connections for logs from virtualization hosts. The default is10.
PostgreSQL Database Options
pg-pass parameter includes the Red Hat Enterprise Virtualization Manager database in the log. The database user name and database name must be specified if they have been changed from the default values.
pg-dbhost parameter if the database is not on the local host. Use the optional pg-host-key parameter to collect remote logs. The PostgreSQL SOS plugin must be installed on the database server for remote log collection to be successful.
--no-postgresql- Disables collection of database. Database collection is performed by default.
--pg-user=USER- Sets
USERas the user name to use for connections with the database server. The default ispostgres. --pg-dbname=DBNAME- Sets
DBNAMEas the database name to use for connections with the database server. The default isrhevm. --pg-dbhost=DBHOST- Sets
DBHOSTas the host name for the database server. The default islocalhost. --pg-host-key=KEYFILE- Sets
KEYFILEas the public identity file (private key) for the database server. This value is not set by default; it is required only where the database does not exist on the local host.
Example C.12. Log Collector Usage
#rhevm-log-collectorPlease provide the username for rhevm (CTRL+D to abort): admin@directory.demo.redhat.com Please provide the password for rhevm (CTRL+D to abort): Host list (datacenter=None, cluster=None, host=None): Data Center | Cluster | Hostname/IP Address SalesDataCenter | SalesCluster | 192.168.122.250 EngineeringDataCenter | EngineeringCluster | 192.168.122.251 FinanceDataCenter | FinanceCluster | 192.168.122.252 #rhevm-log-collector collectPlease provide the username for rhevm (CTRL+D to abort): admin@directory.demo.redhat.com Please provide the password for rhevm (CTRL+D to abort): About to collect information from 3 hypervisors. Continue? (Y/n): Y INFO: Gathering information from selected hypervisors... INFO: collecting information from 192.168.122.250 INFO: collecting information from 192.168.122.251 INFO: collecting information from 192.168.122.252 INFO: finished collecting information from 192.168.122.250 INFO: finished collecting information from 192.168.122.251 INFO: finished collecting information from 192.168.122.252 Please provide the password to dump the PostgreSQL database (CTRL+D to abort): INFO: Gathering PostgreSQL the RHEV-M database and log files from localhost... INFO: Gathering RHEV-M information... Please provide the password for jboss (CTRL+D to abort): INFO: Log files have been collected and placed in /tmp/logcollector/sosreport-rhn-account-20110804121320-ce2a.tar.xz. The MD5 for this file is 6d741b78925998caff29020df2b2ce2a and its size is 26.7M
rhevm-iso-uploader. You are required to log in as the root user and provide the administration credentials for the Red Hat Enterprise Virtualization environment. The rhevm-iso-uploader -h command displays usage information, including a list of all valid options for the rhevm-iso-uploader command.
rhevm-iso-uploader[options]listrhevm-iso-uploader[options]upload[file].[file]...[file]
list and upload.
- The
listparameter lists the valid ISO storage domains available for ISO uploads. The Red Hat Enterprise Virtualization Manager sets this list on the local machine upon installation. - The
uploadparameter uploads single or multiple space-separated ISO files to the specified ISO storage domain. NFS is used as default; SSH is available.
list or upload parameter be included for basic usage. The upload parameter requires a minimum of one local file name to upload.
rhevm-iso-uploader command.
General Options
--version- Displays the version number of the command in use and returns to prompt.
-h,--help- Displays command usage information and returns to prompt.
--conf-file=PATH- Sets
PATHas the configuration file the tool is to use. --log-file=PATH- Sets
PATHas the specific file name the command should use for the log output. --quiet- Sets quiet mode, reducing console output to a minimum. Quiet mode is off by default.
-v,--verbose- Sets verbose mode, providing more console output. Verbose mode is off by default.
-f,--force- Force mode is necessary when the source file being uploaded has an identical file name as an existing file at the destination; it forces the existing file to be overwritten. Force mode is off by default.
Red Hat Enterprise Virtualization Manager Options
-u,USER--user=USER- Sets the user associated with the file to be uploaded. The
USERis specified in the formatuser@domain, whereuseris the user name anddomainis the directory services domain in use. The user must exist in directory services and be known to the Red Hat Enterprise Virtualization Manager. -r,FQDN--rhevm=FQDN- Sets the fully qualified domain name of the Red Hat Enterprise Virtualization Manager server from which to upload ISOs, where
FQDNis replaced by the fully qualified domain name of the Manager. It is assumed that the ISO uploader is being run on the same client machine as the Red Hat Enterprise Virtualization Manager; the default value islocalhost.
ISO Storage Domain Options
-i,--iso-domain=ISODOMAIN- Sets the storage domain
ISODOMAINas the destination for uploads. -n,--nfs-server=NFSSERVER- Sets the NFS path
NFSSERVERas the destination for uploads.
Connection Options
--ssh-user=USER- Sets
USERas the SSH user name to use for the upload. --ssh-port=PORT- Sets
PORTas the port to use when connecting to SSH. -k,KEYFILE--key-file=KEYFILE- Sets
KEYFILEas the public key to use for SSH authentication. You will be prompted to enter the password of the specified user if no key is set.
Example C.13. Uploading to an NFS Server
# rhevm-iso-uploader --nfs-server=storage.demo.redhat.com:/iso/path upload RHEL6.0.isoISODomain.
Example C.14. List Domains and Upload Image
#rhevm-iso-uploader listPlease provide the REST API username for RHEV-M (CTRL+D to abort):admin@directory.demo.redhat.comPlease provide the REST API password for RHEV-M (CTRL+D to abort): ISO Storage Domain List: ISODomain #rhevm-iso-uploader --iso-domain=Please provide the REST API username for RHEV-M (CTRL+D to abort):ISODomainuploadRHEL6.isoadmin@directory.demo.redhat.comPlease provide the REST API password for RHEV-M (CTRL+D to abort):
virtio-win.iso, virtio-win.vfd, and rhev-tools-setup.iso image files to the ISODomain.
Example C.15. Uploading the VirtIO and Guest Tool Image Files
# rhevm-iso-uploader --iso-domain=ISODomain upload /usr/share/virtio-win/virtio-win.iso /usr/share/virtio-win/virtio-win.vfd /usr/share/rhev-guest-tools-iso/rhev-tools-setup.iso/usr/share/virtio-win/virtio-win.iso/usr/share/virtio-win/virtio-win.vfd/usr/share/rhev-guest-tools-iso/rhev-tools-setup.iso
rhevm-iso-uploader command to upload these images to your ISO storage domain. Once uploaded, the image files can be attached to and used by virtual machines.
- Installing the agents and drivers on Red Hat Enterprise Linux guests
- All of the drivers are included in the base channel for RHN registered Red Hat Enterprise Linux virtual machines. They can be installed using the
yum installcommand.Your guest must be subscribed to theRed Hat Enterprise Virt Agentchannel to install the agents.In Red Hat Enterprise Enterprise Linux 5, this channel is labelledrhel-x86_64-rhev-agent-5-server. In Red Hat Enterprise Linux 6, the channel is labelledrhel-x86_64-rhev-agent-6-server. - Installing the agents and drivers on Windows guests
- The agents and drivers are installed on Windows virtual machines using the
rhev-tools-setup.isodisk image. The guest tools ISO is distributed using the Red Hat Network asrhev-guest-tools-iso.rpm, an RPM file installed on the Red Hat Enterprise Virtualization Manager.After installing the Manager, the guest tools ISO can be found at/usr/share/rhev-guest-tools-iso/rhev-tools-setup.iso. When setting up the Manager, if you have created a local storage share for an ISO storage domain, the ISO file is automatically copied to the ISO storage domain. In this case the ISO image is automatically attached to Windows guests when they are created. Otherwise, the ISO must be manually attached to Windows guests for the tools and agents to be installed.Updated versions of the ISO file must be manually attached to running Windows virtual machines to install updated versions of the tools and drivers. If the APT service is enabled on virtual machines, the updated ISO files will be automatically attached.
Table C.3. Red Hat Enterprise Virtualization Guest Drivers
|
Driver
|
Description
|
Works on
|
|---|---|---|
virtio-net
|
Paravirtualized network driver provides enhanced performance over emulated devices like rtl.
|
Server and Desktop.
|
virtio-block
|
Paravirtualized HDD driver offers increased I/O performance over emulated devices like IDE by optimizing the coordination and communication between the guest and the hypervisor. The driver complements the software implementation of the virtio-device used by the host to play the role of a hardware device.
|
Server and Desktop.
|
virtio-serial
|
Virtio-serial provides support for multiple serial ports. The improved performance is used for fast communication between the guest and the host that avoids network complications. This fast communication is required for the guest agents and for other features such as clipboard copy-paste between the guest and the host and logging.
|
Server and Desktop.
|
virtio-balloon
|
Virtio-balloon is used to control the amount of memory a guest actually accesses. It offers improved memory over-commitment. The balloon drivers are installed for future compatibility but not used by default in Red Hat Enterprise Virtualization 3.1.
|
Server and Desktop.
|
qxl
|
A paravirtualized display driver reduces CPU usage on the host and provides better performance through reduced network bandwidth on most workloads.
|
Server and Desktop.
|
Table C.4. Red Hat Enterprise Virtualization Guest Agents and Tools
|
Guest agent/tool
|
Description
|
Works on
|
|---|---|---|
rhev-guest-agent
|
Allows the Red Hat Enterprise Virtualization Manager to receive guest internal events and information such as IP address and installed applications. Also allows the Manager to execute specific commands, such as shut down or reboot, on a guest.
|
Server and Desktop.
|
spice-agent
|
The SPICE agent supports multiple monitors and is responsible for client-mouse-mode support to provide a better user experience and improved responsiveness than the QEMU emulation. Cursor capture is not needed in client-mouse-mode. The SPICE agent reduces bandwidth usage when used over a wide area network by reducing the display level, including color depth, disabling wallpaper, font smoothing, and animation. The SPICE agent enables clipboard support allowing cut and paste operations for both text and images between client and guest, and automatic guest display setting according to client-side settings. On Windows guests, the SPICE agent consists of vdservice and vdagent.
|
Server and Desktop.
|
rhev-sso
|
An agent that enables users to automatically log in to their virtual machines based on the credentials used to access the Red Hat Enterprise Virtualization Manager.
|
Desktop.
|
rhev-usb
|
A component that contains drivers and services for "Legacy" USB support on guests. It is needed for accessing a USB device that is plugged into the client machine.
RHEV-USB Client is needed on the client side.
|
Desktop.
|
Procedure C.8. Subscribing to Channels Using Subscription Manager
- Run the
subscription-managercommand to register the system with Red Hat Network. To complete registration successfully you will need to supply your Red Hat Network Username and Password when prompted.register# subscription-manager register
Identify available entitlement pools
To subscribe the system to channels, you must locate the identifiers for the relevant entitlement pools. Use thelistaction of thesubscription-managerto find these.For example, to identify available subscription pools forRed Hat Enterprise Virtualizationuse the command:# subscription-manager list --available | grep -A8 "Red Hat Enterprise Virtualization"
Subscribe system to entitlement pools
Using the pool identifiers located in the previous step, subscribe the system to the required entitlements. When a system is subscribed to an entitlement pool, the system is automatically subscribed to the channels in the entitlement. The main channel is automatically enabled, other channels in the entitlement must be enabled manually. Use thesubscribeaction of thesubscription-managercommand, replacingPOOLIDwith one of the pool identifiers each time the command is run:# subscription-manager subscribe --pool=
POOLIDEnable additional subscription channels
When a system is subscribed to an entitlement with a main channel and some additional channel, only the main channel is enabled by default. Other channels are available, but disabled. The additional channels must be enabled using theyum-config-managercommand as therootuser:# yum-config-manager --enable
CHANNEL
Procedure C.9. Subscribing to the channels using RHN Classic
- Run the
rhn_registercommand to register the system with Red Hat Network. To complete registration successfully you will need to supply your Red Hat Network username and password. Follow the onscreen prompts to complete registration of the system.# rhn_register
Subscribe to Required Channels
You must subscribe the system to the required channels using either the web interface to Red Hat Network or the command linerhn-channelcommand.Using the
rhn-channelCommandRun therhn-channelcommand to subscribe the system to each of the required channels. The commands which need to be run are:# rhn-channel --add --channel=
CHANNELImportant
If you are not the administrator for the machine as defined in Red Hat Network, or the machine is not registered to Red Hat Network, then use of therhn-channelcommand will result in an error:Error communicating with server. The message was: Error Class Code: 37 Error Class Info: You are not allowed to perform administrative tasks on this system. Explanation: An error has occurred while processing your request. If this problem persists please enter a bug report at bugzilla.redhat.com. If you choose to submit the bug report, please be sure to include details of what you were trying to do when this error occurred and details on how to reproduce this problem.If you encounter this error when usingrhn-channelthen to add the channel to the system you must use the web user interface.Using the Web Interface to Red Hat Network
To add a channel subscription to a system from the web interface:- Log on to Red Hat Network (http://rhn.redhat.com).
- Move the mouse cursor over the Subscriptions link at the top of the screen, and then click the Registered Systems link in the menu that appears.
- Select the system to which you are adding channels from the list presented on the screen, by clicking the name of the system.
- Click Alter Channel Subscriptions in the Subscribed Channels section of the screen.
- Select the channels to be added from the list presented on the screen.
- Click the Change Subscription button to finalize the change.
Procedure D.1. Backing up the engine database using the backup.sh script
- Change into the
/usr/share/ovirt-engine/dbscripts/directory. - Invoke
backup.shwith the-hparameter to see the available options.Usage: backup.sh [-h] [-s SERVERNAME] [-p PORT] [-d DATABASE] [-l DIR] -u USERNAME [-v] -s SERVERNAME - The database servername for the database (def. localhost) -p PORT - The database port for the database (def. 5432) -d DATABASE - The database name (def. engine) -u USERNAME - The username for the database. -v - Turn on verbosity (WARNING: lots of output) -l DIR - Backup file directory. -h - This help text. for more options please run pg_dump --help
- Invoke the
backup.shcommand again with parameters appropriate for your environment. If you are backing up the localenginedatabase, the-s, -p,and-dparameters are not necessary. Use the-lto specify the backup directory. This will cause a.sqlfile to be created in the directory you give. - Copy the
.sqlyou just created from the directory you specified to a safe remote location.
engine database.
Procedure D.2. Restoring the Engine Database Using the restore.sh Script
- Change into the
/usr/share/ovirt-engine/dbscripts/directory. - Invoke
restore.shwith the-hparameter to see the available options.Usage: restore.sh [-h] [-s SERVERNAME] [-p PORT] -u USERNAME -d DATABASE -f FILE [-r] -s SERVERNAME - The database servername for the database (def. localhost) -p PORT - The database port for the database (def. 5432) -u USERNAME - The username for the database. -d DATABASE - The database name -f File - Backup file name to restore from. -r - Remove existing database with same name -h - This help text. for more options please run pg_restore --help
- Invoke the
restore.shcommand again with parameters appropriate for your environment. If you are restoring the localenginedatabase, the-sand-pparameters are not necessary. Use the-dto specify name of the database you are creating. Red Hat Enterprise Virtualization expects a primary database namedengine. Use the-fto specify the.sqlfile you are restoring from.
engine database.
Procedure D.3. Restoring Red Hat Enterprise Virtualization Manager Configuration Files
- Stop the Engine service:
# service ovirt-engine stop
- Completely remove all previous installations of the Red Hat Enterprise Virtualization Manager:
# yum remove rhevm
- Remove /etc/pki/ovirt-engine:
# rm -rf /etc/pki/ovirt-engine
- Remove the main rhevm directory:
# rm -rf /etc/ovirt-engine
- Install the Red Hat Enterprise Virtualization Manager:
# yum install -y rhevm
- Run rhevm-setup, giving the same answers as when you originally installed rhevm:
# rhevm-setup
- Restore the backed up configuration files to their original locations.
- Make sure the ownership of the .keystore file is correct:
# chown ovirt:ovirt /etc/pki/ovirt-engine/.keystore
- Make sure the permissions of the notifier.conf file is correct:
# chmod 644 /etc/ovirt-engine/notifier/notifier.conf
- Start the
Engineservice:# service ovirt-engine start
Table D.1. Configuration files and directories requiring backup.
| Location | What is it? |
|---|---|
| /etc/ovirt-engine/ | Contains Red Hat Enterprise Virtualization Manager configuration files. |
| /etc/sysconfig/ovirt-engine | It is the ovirt-engine service configuration file. |
| /etc/yum/pluginconf.d/versionlock.list | Contains version information about currently installed Red Hat Enterprise Virtualization components. |
| /etc/pki/ovirt-engine/ | Security certificates provided by the Red Hat Enterprise Virtualization Manager to clients. |
| /usr/share/ovirt-engine-reports/buildomatic | Contains files required to build the Red Hat Enterprise Virtualization reports server. |
| /usr/share/ovirt-engine/conf/iptables.example | An example of a correct iptables configuration that allows the communications required by the Red Hat Enterprise Virtualization Manager. |
| /usr/share/ovirt-engine/dbscripts/create_db.sh.log | Log file from the creation of the rhevm database. |
| /var/lib/ovirt-engine/backups | A folder where all backup data is stored. |
| /var/lib/ovirt-engine/deployments | A folder where all deployment data is stored. |
| /usr/share/ovirt-engine-reports/reports-INSERT_VERSION_NUMBER/users/rhevmreports/rhevm-002dadmin.xml | Contains plain-text, un-encrypted user and password information for the rhev-admin user. |
| /usr/share/ovirt-engine-reports/default_master.properties | Contains settings to handle the configuration and deployment of JasperServer. |
| /root/.rnd | Random seed file, used to generate secure certificates. |
- E.1.1. Performing Searches in Red Hat Enterprise Virtualization
- E.1.2. Search Syntax and Examples
- E.1.3. Search Auto-Completion
- E.1.4. Search Result Type Options
- E.1.5. Search Criteria
- E.1.6. Search: Multiple Criteria and Wildcards
- E.1.7. Search: Determining Search Order
- E.1.8. Searching for Data Centers
- E.1.9. Searching for Clusters
- E.1.10. Searching for Hosts
- E.1.11. Searching for Storage
- E.1.12. Searching for Disks
- E.1.13. Searching for Volumes
- E.1.14. Searching for Virtual Machines
- E.1.15. Searching for Pools
- E.1.16. Searching for Templates
- E.1.17. Searching for Users
- E.1.18. Searching for Events
result type: {criteria} [sortby sort_spec]
Table E.1. Example Search Queries
| Example | Result |
|---|---|
| Hosts: Vms.status = up | Displays a list of all hosts running virtual machines that are up. |
| Vms: domain = qa.company.com | Displays a list of all virtual machines running on the specified domain. |
| Vms: users.name = Mary | Displays a list of all virtual machines belonging to users with the username Mary. |
| Events: severity > normal sortby time | Displays the list of all Events whose severity is higher than Normal, sorted by time. |
Hosts: Vms.status = down
Table E.2. Example Search Queries Using Auto-Completion
| Input | List Items Displayed | Action |
|---|---|---|
h
|
Hosts (1 option only)
|
Select
Hosts or;
Type
Hosts
|
Hosts:
|
All host properties
|
Type v
|
Hosts: v
|
host properties starting with a v
|
Select Vms or type Vms
|
Hosts: Vms
| All virtual machine properties |
Type s
|
Hosts: Vms.s
|
All virtual machine properties beginning with s
|
Select status or type status
|
Hosts: Vms.status
|
=
=!
|
Select or type =
|
Hosts: Vms.status =
| All status values |
Select or type down
|
- Vms for a list of virtual machines
- Host for a list of hosts
- Pools for a list of pools
- Template for a list of templates
- Event for a list of events
- Users for a list of users
- Cluster for a list of clusters
- Datacenter for a list of data centers
- Storage for a list of storage domains
{criteria} is as follows:
<prop><operator><value>
<obj-type><prop><operator><value>
Table E.3. Example Search Criteria
| Part | Description | Values | Example | Note |
|---|---|---|---|---|
| prop |
The property of the searched-for resource. Can also be the property of a resource type (see obj-type), or tag (custom tag).
| Limit your search to objects with a certain property. For example, search for objects with a status property. | Status | -- |
| obj-type | A resource type that can be associated with the searched-for resource. | These are system objects, like data centers and virtual machines. | Users | -- |
| operator | Comparison operators. |
=
!= (not equal)
>
<
>=
<=
| -- | Value options depend on obj-type. |
| Value | What the expression is being compared to. |
String
Integer
Ranking
Date (formatted according to Regional Settings)
|
Jones
256
normal
|
|
<value> part of the syntax for strings. For example, to find all users beginning with m, enter m*.
AND and OR. For example:
Vms: users.name = m* AND status = Up
Vms: users.name = m* AND tag = "paris-loc"
AND or OR, AND is implied. AND precedes OR, and OR precedes implied AND.
sortby. Sort direction (asc for ascending, desc for descending) can be included.
events: severity > normal sortby time desc
Table E.4. Searching for Data Centers
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Clusters.clusters-prop
| Depends on property type | The property of the clusters associated with the data center. |
| name | String | The name of the data center. |
| description | String | A description of the data center. |
| type | String | The type of data center. |
| status | List | The availability of the data center. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to display per page. |
Datacenter: type = nfs and status != up
- A storage type of NFS and status other than up
Table E.5. Searching Clusters
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Datacenter.datacenter-prop
| Depends on property type | The property of the data center associated with the cluster. |
| Datacenter | String | The data center to which the cluster belongs. |
| name | String | The unique name that identifies the clusters on the network. |
| description | String | The description of the cluster. |
| initialized | String | True or False indicating the status of the cluster. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to diplay per page. |
Clusters: initialized = true or name = Default
- initialized; or
- named Default
Table E.6. Searching for Hosts
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| Depends on property type | The property of the virtual machines associated with the host. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the host. |
Events.events-prop
| Depends on property type | The property of the events associated with the host. |
Users.users-prop
| Depends on property type | The property of the users associated with the host. |
| name | String | The name of the host. |
| status | List | The availability of the host. |
| cluster | String | The cluster to which the host belongs. |
| address | String | The unique name that identifies the host on the network. |
| cpu_usage | Integer | The percent of processing power used. |
| mem_usage | Integer | The percentage of memory used. |
| network_usage | Integer | The percentage of network usage. |
| load | Integer | Jobs waiting to be executed in the run-queue per processor, in a given time slice. |
| version | Integer | The version number of the operating system. |
| cpus | Integer | The number of CPUs on the host. |
| memory | Integer | The amount of memory available. |
| cpu_speed | Integer | The processing speed of the CPU. |
| cpu_model | String | The type of CPU. |
| active_vms | Integer | The number of Vms currently running. |
| migrating_vms | Integer | The number of Vms currently being migrated. |
| committed_mem | Integer | The percentage of committed memory. |
| tag | String | The tag assigned to the host. |
| type | String | The type of host. |
| datacenter | String | The data center to which the host belongs. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to display per page. |
Hosts: cluster = Default and Vms.os = rhel6
- Are part of the Default cluster and host virtual machines running the Red Hat Enterprise Linux 6 operating system.
Table E.7. Searching for Storage
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the storage. |
Clusters.clusters-prop
| Depends on property type | The property of the clusters associated with the storage. |
| name | String | The unique name that identifies the storage on the network. |
| status | String | The status of the storage domain. |
| datacenter | String | The data center to which the storage belongs. |
| type | String | The type of the storage. |
| size | Integer | The size of the storage. |
| used | Integer | The amount of the storage that is used. |
| committed | Integer | The amount of the storage that is committed. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to display per page. |
Storage: size > 200 or used < 50
- total storage space greater than 200 GB; or
- used storage space less than 50 GB.
Table E.8. Searching for Disks
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Datacenters.datacenters-prop
| Depends on property type | The property of the data centers associated with the disk. |
Storages.storages-prop
| Depends on property type | The property of the storage associated with the disk. |
| alias | String | The human readable name that identifies the storage on the network. |
| description | String | Keywords or text describing the disk, optionally used when creating the disk. |
| provisioned_size | Integer | The virtual size of the disk. |
| size | Integer | The size of the disk. |
| actual_size | Integer | The actual size allocated to the disk. |
| creation_date | Integer | The date the disk was created. |
| bootable | String |
Whether the disk can or cannot be booted. Valid values are one of 0, 1, yes, or no
|
| shareable | String |
Whether the disk can or cannot be attached to more than one virtual machine at a time. Valid values are one of 0, 1, yes, or no
|
| format | String |
The format of the disk. Can be one of unused, unassigned, cow, or raw.
|
| status | String |
The status of the disk. Can be one of unassigned, ok, locked, invalid, or illegal.
|
| disk_type | String |
The type of the disk. Can be one of image or lun.
|
| number_of_vms | Integer | The number of virtual machine(s) to which the disk is attached. |
| vm_names | String | The name(s) of the virtual machine(s) to which the disk is attached. |
| quota | String | The name of the quota enforced on the virtual disk. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Disks: format = cow and provisioned_size > 8
- Qcow, also known as thin provisioning, format; and
- an allocated disk size greater than 8 GB.
Table E.9. Searching for Volumes
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Volume.cluster-prop
| Depends on property type | The property of the clusters associated with the volume. |
| Cluster | String | The name of the cluster associated with the volume. |
| name | String | The human readable name that identifies the volume. |
| type | String | Can be one of distribute, replicate, distributed_replicate, stripe, or distributed_stripe. |
| transport_type | Integer | Can be one of tcp or rdma |
| replica_count | Integer | Number of replica. |
| stripe_count | Integer | Number of stripes. |
| status | String | The status of the volume. Can be one of Up or Down. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Volume: transport_type = rdma and stripe_count >= 2
- Transport type set to RDMA; and
- with 2 or more stripes.
Table E.10. Searching for Virtual Machines
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the virtual machine. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the virtual machine. |
Events.events-prop
| Depends on property type | The property of the events associated with the virtual machine. |
Users.users-prop
| Depends on property type | The property of the users associated with the virtual machine. |
| name | String | The name of the virtual machine. |
| status | List | The availability of the virtual machine. |
| ip | Integer | The IP address of the virtual machine. |
| uptime | Integer | The number of minutes that the virtual machine has been running. |
| domain | String | The domain (usually Active Directory domain) that groups these machines. |
| os | String | The operating system selected when the virtual machine was created. |
| creationdate | Date | The date on which the virtual machine was created. |
| address | String | The unique name that identifies the virtual machine on the network. |
| cpu_usage | Integer | The percent of processing power used. |
| mem_usage | Integer | The percentage of memory used. |
| network_usage | Integer | The percentage of network used. |
| memory | Integer | The maximum memory defined. |
| apps | String | The applications currently installed on the virtual machine. |
| cluster | List | The cluster to which the virtual machine belongs. |
| pool | List | The virtual machine pool to which the virtual machine belongs. |
| loggedinuser | String | The name of the user currently logged in to the virtual machine. |
| tag | List | The tags to which the virtual machine belongs. |
| datacenter | String | The data center to which the virtual machine belongs. |
| type | List | The virtual machine type (server or desktop). |
| quota | String | The name of the quota associated with the virtual machine. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Vms: template.name = Win* and user.name = ""
- The template on which the virtual machine is based begins with Win and the virtual machine is assigned to any user.
Vms: cluster = Default and os = windowsxp
- The cluster to which the virtual machine belongs is named Default and the virtual machine is running the Windows XP operating system.
Table E.11. Searching for Pools
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
| name | String | The name of the pool. |
| description | String | The description of the pool. |
| type | String | The type of pool. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Pools: type = automatic
- Type of automatic
Table E.12. Searching for Templates
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| String | The property of the virtual machines associated with the template. |
Hosts.hosts-prop
| String | The property of the hosts associated with the template. |
Events.events-prop
| String | The property of the events associated with the template. |
Users.users-prop
| String | The property of the users associated with the template. |
| name | String | The name of the template. |
| domain | String | The domain of the template. |
| os | String | The type of operating system. |
| creationdate | Integer |
The date on which the template was created.
Date format is mm/dd/yy.
|
| childcount | Integer | The number of Vms created from the template. |
| mem | Integer | Defined memory. |
| description | String | The description of the template. |
| status | String | The status of the template. |
| cluster | String | The cluster associated with the template. |
| datacenter | String | The data center associated with the template. |
| quota | String | The quota associated with the template. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Template: Events.severity >= normal and Vms.uptime > 0
- Events of normal or greater severity have occurred on VMs derived from the template, and the VMs are still running.
Table E.13. Searching for Users
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| Depends on property type | The property of the virtual machines associated with the user. |
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the user. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the user. |
Events.events-prop
| Depends on property type | The property of the events associated with the user. |
| name | String | The name of the user. |
| lastname | String | The last name of the user. |
| usrname | String | The unique name of the user. |
| department | String | The department to which the user belongs. |
| group | String | The group to which the user belongs. |
| title | String | The title of the user. |
| status | String | The status of the user. |
| role | String | The role of the user. |
| tag | String | The tag to which the user belongs. |
| pool | String | The pool to which the user belongs. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Users: Events.severity > normal and Vms.status = up or Vms.status = pause
- Events of greater than normal severity have occurred on their Vms AND the Vms are still running; or
- The users’ VMs are paused.
Table E.14. Searching for Events
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| Depends on property type | The property of the virtual machines associated with the event. |
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the event. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the event. |
Users.users-prop
| Depends on property type | The property of the users associated with the event. |
Clusters.clusters-prop
| Depends on property type | The property of the clusters associated with the data center. |
Volumes.Volumes-prop
| Depends on property type | The property of the volumes associated with the event. |
| type | List | Type of the event. |
| severity | List | The severity of the event: Warning/Error/Normal. |
| message | String | Description of the event type. |
| time | Integer | Time at which the event occurred. |
| usrname | String | The username associated with the event. |
| event_host | String | The host associated with the event. |
| event_vm | String | The virtual machine associated with the event. |
| event_template | String | The template associated with the event. |
| event_storage | String | The storage associated with the event. |
| event_datacenter | String | The data center associated with the event. |
| event_volume | String | The volume associated with the event. |
| correlation_id | Integer | The identification number of the event. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Events: Vms.name = testdesktop and Hosts.name = gonzo.example.com
- The event occurred on the virtual machine named testdesktop while it was running on the host gonzo.example.com.
Procedure E.1. Saving a Query String as a Bookmark
- Enter the desired search query in the search bar and perform the search.
- Click the star-shaped button to the right of the search bar to open the New Bookmark window.
- Enter the Name of the bookmark.
- Edit the Search string field (if applicable).
- Click to save the query as a bookmark and close the window.
- The search query is saved and displays in the Bookmarks pane.
Procedure E.2. Editing a Bookmark
- Click the Bookmarks tab on the far left side of the screen.
- Select the bookmark you wish to edit.
- Click the button to open the Edit Bookmark window.
- Change the Name and Search string fields as necessary.
- Click to save the edited bookmark.
Procedure E.3. Deleting a Bookmark
- Click the Bookmarks tab on the far left side of the screen.
- Select the bookmark you wish to remove.
- Click the button to open the Remove Bookmark window.
- Click to remove the selected bookmark.
Procedure E.4. Creating a Tag
- Click the Tags tab on the left side of the screen.
- Select the node under which you wish to create the tag. For example, to create it at the highest level, click the root node.
- Click the New button to open the New Tag window.
- Enter the Name and Description of the new tag.
- Click to create the tag.
Procedure E.5. Modifying a Tag
- Click the Tags tab on the left side of the screen.
- Select the tag you wish to modify.
- Click to open the Edit Tag window.
- Change the Name and Description fields as necessary.
- Click to save the edited tag.
Procedure E.6. Deleting a Tag
- Click the Tags tab on the left side of the screen.
- Select the tag you wish to delete.
- Click to open the Remove Tag(s) window. The message warns you that removing the tag will also remove all descendants of the tag.
- Click to delete the selected tag.
Procedure E.7. Adding and Removing Tags to and from Objects
- Use the resource tab, tree mode, or the search function to find and select the object(s) you wish to tag or untag.
- Click the Assign Tags button to open the Assign Tags window.
- Select the check box to assign a tag to the object, or deselect the check box to detach the tag from the object.
- Click .
- Enter a search query using
tagas the property and the desired value or set of values as criteria for the search.The objects tagged with the specified criteria are listed in the results list.
| Revision History | ||||||||
|---|---|---|---|---|---|---|---|---|
| Revision 2-113.400 | 2013-10-31 | |||||||
| ||||||||
| Revision 2-113 | Thu Dec 20 2012 | |||||||
| ||||||||
| Revision 2-111 | Fri Dec 14 2012 | |||||||
| ||||||||
| Revision 2-110 | Tues Dec 11 2012 | |||||||
| ||||||||
| Revision 2-109 | Fri Nov 30 2012 | |||||||
| ||||||||
| Revision 2-108 | Thurs Nov 29 2012 | |||||||
| ||||||||
| Revision 2-107 | Fri Nov 16 2012 | |||||||
| ||||||||
| Revision 2-106 | Fri Nov 9 2012 | |||||||
| ||||||||
| Revision 2-105 | Tue Nov 6 2012 | |||||||
| ||||||||
| Revision 2-104 | Tue Oct 30 2012 | |||||||
| ||||||||
| Revision 2-103 | Fri Oct 26 2012 | |||||||
| ||||||||
| Revision 2-102 | Mon Oct 15 2012 | |||||||
| ||||||||
| Revision 2-101 | Thu Oct 11 2012 | |||||||
| ||||||||
| Revision 2-100 | Tue Oct 9 2012 | |||||||
| ||||||||
| Revision 2-99 | Mon Oct 3 2012 | |||||||
| ||||||||
| Revision 2-98 | Mon Oct 1 2012 | |||||||
| ||||||||
| Revision 2-97 | Tues Sept 25 2012 | |||||||
| ||||||||
| Revision 2-96 | Tues Sept 18 2012 | |||||||
| ||||||||
| Revision 2-95 | Wed Sept 12 2012 | |||||||
| ||||||||
| Revision 2-94 | Tues Sept 10 2012 | |||||||
| ||||||||
| Revision 2-93 | Tues Sept 4 2012 | |||||||
| ||||||||
| Revision 2-92 | Tues Sept 4 2012 | |||||||
| ||||||||
| Revision 2-91 | Tues Aug 28 2012 | |||||||
| ||||||||
| Revision 2-90 | Mon Aug 27 2012 | |||||||
| ||||||||
| Revision 2-89 | Thu Aug 24 2012 | |||||||
| ||||||||
| Revision 2-88 | Thu Aug 23 2012 | |||||||
| ||||||||
| Revision 2-87 | Mon Aug 20 2012 | |||||||
| ||||||||
| Revision 2-86 | Tue Aug 14 2012 | |||||||
| ||||||||
| Revision 2-85 | Wed July 25 2012 | |||||||
| ||||||||
| Revision 2-84 | Tues July 17 2012 | |||||||
| ||||||||
| Revision 2-83 | Thurs June 28 2012 | |||||||
| ||||||||
| Revision 2-82 | Wed June 06 2012 | |||||||
| ||||||||
| Revision 2-81 | Tue May 01 2012 | |||||||
| ||||||||
| Revision 2-73 | Wed Mar 28 2012 | |||||||
| ||||||||
| Revision 2-72 | Wed Mar 28 2012 | |||||||
| ||||||||
| Revision 2-71 | Mon Mar 26 2012 | |||||||
| ||||||||
| Revision 2-68 | Tues Feb 28 2012 | |||||||
| ||||||||
| Revision 2-67 | Tues Feb 14 2012 | |||||||
| ||||||||
| Revision 2-22 | Mon Dec 05 2011 | |||||||
| ||||||||
| Revision 2-21 | Thu Nov 17 2011 | |||||||
| ||||||||
| Revision 2-20 | Thu Nov 10 2011 | |||||||
| ||||||||
| Revision 2-19 | Wed Nov 09 2011 | |||||||
| ||||||||
| Revision 2-19 | Wed Nov 09 2011 | |||||||
| ||||||||
| Revision 2-18 | Thu Nov 03 2011 | |||||||
| ||||||||
| Revision 2-17 | Fri Oct 28 2011 | |||||||
| ||||||||
| Revision 2-16 | Tues Oct 25 2011 | |||||||
| ||||||||
| Revision 2-15 | Mon Oct 24 2011 | |||||||
| ||||||||
| Revision 2-14 | Mon Oct 24 2011 | |||||||
| ||||||||
| Revision 2-13 | Mon Oct 19 2011 | |||||||
| ||||||||
| Revision 2-12 | Mon Oct 17 2011 | |||||||
| ||||||||
| Revision 2-11 | Mon Oct 12 2011 | |||||||
| ||||||||
| Revision 2-10 | Mon Oct 5 2011 | |||||||
| ||||||||
| Revision 2-9 | Mon Oct 3 2011 | |||||||
| ||||||||
| Revision 2-8 | Fri Sep 30 2011 | |||||||
| ||||||||
| Revision 2-7 | Fri Sep 16 2011 | |||||||
| ||||||||
| Revision 2-6 | Fri Sep 16 2011 | |||||||
| ||||||||
| Revision 2-5 | Thu Sep 15 2011 | |||||||
| ||||||||
| Revision 2-4 | Wed Sep 14 2011 | |||||||
| ||||||||
| Revision 2-3 | Fri Sep 09 2011 | |||||||
| ||||||||
| Revision 2-2 | Thu Sep 08 2011 | |||||||
| ||||||||
| Revision 1-1 | Thu Sep 01 2011 | |||||||
| ||||||||
| Revision 1-0 | Tue Aug 23 2011 | |||||||
| ||||||||

































































































