Administrating Red Hat Enterprise Virtualization Environments.
Edition 1
Legal Notice
Abstract
- Preface
- 1. Using this Guide
- 2. Basics
- I. Administering the Resources
- 3. Data Centers
- 4. Clusters
- 5. Logical Networks
- 6. Hosts
- 7. Storage
- 7.1. Introduction to Storage in Red Hat Enterprise Virtualization
- 7.2. Understanding Storage Domains
- 7.3. Storage Metadata Versions in Red Hat Enterprise Virtualization
- 7.4. Preparing and Adding File-based Storage
- 7.5. Adding POSIX Compliant File System Storage
- 7.6. Adding Block-based Storage
- 7.7. Storage Tasks
- 7.8. Red Hat Storage Volumes
- 7.9. Storage and Permissions
- 8. Virtual Machines
- 8.1. Introduction to Virtual Machines
- 8.2. Supported Virtual Machine Operating Systems
- 8.3. Virtual Machine Performance Parameters
- 8.4. Creating Virtual Machines
- 8.5. Using Virtual Machines
- 8.6. Shutting Down or Pausing Virtual Machines
- 8.7. Managing Virtual Machines
- 8.8. Virtual Machines and Permissions
- 8.9. Backing Up and Restoring Virtual Machines with Snapshots
- 8.10. Importing and Exporting Virtual Machines
- 8.11. Migrating Virtual Machines Between Hosts
- 8.12. Improving Uptime with Virtual Machine High Availability
- 8.13. Other Virtual Machine Tasks
- 9. Templates
- 10. Pools
- 11. Virtual Machine Disks
- 11.1. Understanding Virtual Machine Storage
- 11.2. Understanding Virtual Disks
- 11.3. Shareable Disks in Red Hat Enterprise Virtualization
- 11.4. Creating Unassociated Virtual Machine Hard Disks
- 11.5. Explanation of Settings in the New Virtual Machine Disk and Edit Virtual Machine Disk Windows
- 11.6. Moving a Virtual Machine Hard Disk Between Data Domains
- 11.7. Virtual Disks and Permissions
- II. Administering the Environment
- 12. Users and Roles
- 13. Quotas
- 13.1. Introduction to Quota
- 13.2. Shared Quota and Individually-defined Quota
- 13.3. Quota Accounting
- 13.4. Enabling and Changing a Quota Mode in a Data Center
- 13.5. Creating a New Quota Policy
- 13.6. Explanation of Quota Threshold Settings
- 13.7. Assigning a Quota to an Object
- 13.8. Using Quota to Limit Resources by User
- 13.9. Editing Quotas
- 13.10. Removing Quotas
- 14. Event Notifications
- 15. Utilities
- 15.1. Managing Domains with the Domain Management Tool
- 15.2. Editing the Configuration of the Red Hat Virtualization Manager with the Configuration Tool
- 15.3. Uploading Virtual Machine Images with the Image Uploader Tool
- 15.4. Editing USB Filters with the USB Filter Editor
- 15.5. Collecting Logs with the Log Collector Tool
- 15.6. Uploading ISO Files with the ISO Uploader Tool
- 15.7. Guest Drivers and Agents
- 16. Log Files
- 17. Updating the Red Hat Enterprise Virtualization Environment
- 18. Backups
- III. Gathering Information About the Environment
- A. Firewalls
- B. VDSM and Hooks
- B.1. VDSM
- B.2. VDSM Hooks
- B.3. Extending VDSM with Hooks
- B.4. Supported VDSM Events
- B.5. The VDSM Hook Environment
- B.6. The VDSM Hook Domain XML Object
- B.7. Defining Virtual Machine Custom Properties
- B.8. Setting Virtual Machine Custom Properties
- B.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook
- B.10. Using the VDSM Hooking Module
- B.11. VDSM Hook Execution
- B.12. VDSM Hook Return Codes
- B.13. VDSM Hook Examples
- C. Red Hat Enterprise Virtualization User Interface Plugins
- C.1. Red Hat Enterprise Virtualization User Interface Plugins
- C.2. Red Hat Enterprise Virtualization User Interface Plugin Lifecycle
- C.3. User Interface Plugin-related Files and their Locations
- C.4. Example User Interface Plugin Deployment
- C.5. Installing Red Hat Support Plugin
- C.6. Using Red Hat Support Plugin
- D. Red Hat Enterprise Virtualization and SSL
- E. Using Search, Bookmarks, and Tags to Find Your Way Around
- F. Revision History
Mono-spaced Bold
To see the contents of the filemy_next_bestselling_novelin your current working directory, enter thecat my_next_bestselling_novelcommand at the shell prompt and press Enter to execute the command.
Press Enter to execute the command.Press Ctrl+Alt+F2 to switch to a virtual terminal.
mono-spaced bold. For example:
File-related classes includefilesystemfor file systems,filefor files, anddirfor directories. Each class has its own associated set of permissions.
Choose → → from the main menu bar to launch Mouse Preferences. In the Buttons tab, select the Left-handed mouse check box and click to switch the primary mouse button from the left to the right (making the mouse suitable for use in the left hand).To insert a special character into a gedit file, choose → → from the main menu bar. Next, choose → from the Character Map menu bar, type the name of the character in the Search field and click . The character you sought will be highlighted in the Character Table. Double-click this highlighted character to place it in the Text to copy field and then click the button. Now switch back to your document and choose → from the gedit menu bar.
Mono-spaced Bold Italic or Proportional Bold Italic
To connect to a remote machine using ssh, typesshat a shell prompt. If the remote machine isusername@domain.nameexample.comand your username on that machine is john, typessh john@example.com.Themount -o remountcommand remounts the named file system. For example, to remount thefile-system/homefile system, the command ismount -o remount /home.To see the version of a currently installed package, use therpm -qcommand. It will return a result as follows:package.package-version-release
Publican is a DocBook publishing system.
mono-spaced roman and presented thus:
books Desktop documentation drafts mss photos stuff svn books_tests Desktop1 downloads images notes scripts svgs
mono-spaced roman but add syntax highlighting as follows:
static int kvm_vm_ioctl_deassign_device(struct kvm *kvm,
struct kvm_assigned_pci_dev *assigned_dev)
{
int r = 0;
struct kvm_assigned_dev_kernel *match;
mutex_lock(&kvm->lock);
match = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head,
assigned_dev->assigned_dev_id);
if (!match) {
printk(KERN_INFO "%s: device hasn't been assigned before, "
"so cannot be deassigned\n", __func__);
r = -EINVAL;
goto out;
}
kvm_deassign_device(kvm, match);
kvm_free_assigned_device(kvm, match);
out:
mutex_unlock(&kvm->lock);
return r;
}Note
Important
Warning
- search or browse through a knowledgebase of technical support articles about Red Hat products.
- submit a support case to Red Hat Global Support Services (GSS).
- access other product documentation.
- at least one data center,
- at least one cluster,
- at least one host,
- at least one data storage domain,
- at least one logical network: the
rhevmmanagement network, - and at least one user: the internal
adminuser.
- Data Centers;
- Clusters;
- Networks;
- Hosts;
- Storage;
- Virtual Machines, Templates, and Pools;
- Users and Roles;
- Quotas;
- Monitoring, Reports, and Dashboards;
- Firewalls;
- VDSM and Hooks;
- Utilities; and
- Backups.
- 2.1.1. Red Hat Enterprise Virtualization Architecture
- 2.1.2. Red Hat Enterprise Virtualization System Components
- 2.1.3. Red Hat Enterprise Virtualization Resources
- 2.1.4. Red Hat Enterprise Virtualization API Support Statement
- 2.1.5. SPICE
- 2.1.6. Administering and Maintaining the Red Hat Enterprise Virtualization Environment
- Virtual machine hosts using the Kernel-based Virtual Machine (KVM).
- Agents and tools running on hosts including VDSM, QEMU, and libvirt. These tools provide local management for virtual machines, networks and storage.
- The Red Hat Enterprise Virtualization Manager; a centralized management platform for the Red Hat Enterprise Virtualization environment. It provides a graphical interface where you can view, provision and manage resources.
- Storage domains to hold virtual resources like virtual machines, templates, ISOs.
- A database to track the state of and changes to the environment.
- Access to an external Directory Server to provide users and authentication.
- Networking to link the environment together. This includes physical network links, and logical networks.
- Data Center - A data center is the highest level container for all physical and logical resources within a managed virtual environment. It is a collection of clusters of virtual machines, storage, and networks.
- Clusters - A cluster is a set of physical hosts that are treated as a resource pool for virtual machines. Hosts in a cluster share the same network infrastructure and storage. They form a migration domain within which virtual machines can be moved from host to host.
- Logical Networks - A logical network is a logical representation of a physical network. Logical networks group network traffic and communication between the Manager, hosts, storage, and virtual machines.
- Hosts - A host is a physical server that runs one or more virtual machines. Hosts are grouped into clusters. Virtual machines can be migrated from one host to another within a cluster.
- Storage Pool - The storage pool is a logical entity that contains a standalone image repository of a certain type, either iSCSI, Fibre Channel, NFS, or POSIX. Each storage pool can contain several domains, for storing virtual machine disk images, ISO images, and for the import and export of virtual machine images.
- Virtual Machines - A virtual machine is a virtual desktop or virtual server containing an operating system and a set of applications. Multiple identical virtual machines can be created in a Pool. Virtual machines are created, managed, or deleted by power users and accessed by users.
- Template - A template is a model virtual machine with pre-defined settings. A virtual machine that is based on a particular template acquires the settings of the template. Using templates is the quickest way of creating a large number of virtual machines in a single step.
- Virtual Machine Pool - A virtual machine pool is a group of identical virtual machines that are available on demand by each group member. Virtual machine pools can be set up for different purposes. For example, one pool can be for the Marketing department, another for Research and Development, and so on.
- Snapshot - A snapshot is a view of a virtual machine's operating system and all its applications at a point in time. It can be used to save the settings of a virtual machine before an upgrade or installing new applications. In case of problems, a snapshot can be used to restore the virtual machine to its original state.
- User Types - Red Hat Enterprise Virtualization supports multiple levels of administrators and users with distinct levels of permissions. System administrators can manage objects of the physical infrastructure, such as data centers, hosts, and storage. Users access virtual machines available from a virtual machine pool or standalone virtual machines made accessible by an administrator.
- Events and Monitors - Alerts, warnings, and other notices about activities help the administrator to monitor the performance and status of resources.
- Reports - A range of reports either from the reports module based on JasperReports, or from the data warehouse. Preconfigured or ad hoc reports can be generated from the reports module. Users can also generate reports using any query tool that supports SQL from a data warehouse that collects monitoring data for hosts, virtual machines, and storage.
Supported Interfaces for Read and Write Access
- Representational State Transfer (REST) API
- The REST API exposed by the Red Hat Enterprise Virtualization Manager is a fully supported interface for interacting with Red Hat Enterprise Virtualization Manager.
- Software Development Kit (SDK)
- The SDK provided by the rhevm-sdk package is a fully supported interface for interacting with Red Hat Enterprise Virtualization Manager.
- Command Line Shell
- The command line shell provided by the rhevm-cli package is a fully supported interface for interacting with the Red Hat Enterprise Virtualization Manager.
- VDSM Hooks
- The creation and use of VDSM hooks to trigger modification of virtual machines based on custom properties specified in the Administration Portal is supported on Red Hat Enterprise Linux virtualization hosts. The use of VDSM Hooks on virtualization hosts running Red Hat Enterprise Virtualization Hypervisor is not currently supported.
Supported Interfaces for Read Access
- Red Hat Enterprise Virtualization Manager History Database
- Read access to the Red Hat Enterprise Virtualization Manager history database using the database views specified in the Administration Guide is supported. Write access is not supported.
- Libvirt on Virtualization Hosts
- Read access to
libvirtusing thevirsh -rcommand is a supported method of interacting with virtualization hosts. Write access is not supported.
Unsupported Interfaces
- The vdsClient Command
- Use of the
vdsClientcommand to interact with virtualization hosts is not supported unless explicitly requested by Red Hat Support. - Red Hat Enterprise Virtualization Hypervisor Console
- Console access to Red Hat Enterprise Virtualization Hypervisor outside of the provided text user interface for configuration is not supported unless explicitly requested by Red Hat Support.
- Red Hat Enterprise Virtualization Manager Database
- Direct access to and manipulation of the Red Hat Enterprise Virtualization Manager database is not supported unless explicitly requested by Red Hat Support.
Important
- video at more than 30 frames per second
- bi-directional audio (for soft-phones/IP phones)
- bi-directional video (for video telephony/video conferencing)
- connection to multiple monitors with a single virtual machine
- USB redirection from the client's USB port into the virtual machine
- connection to a proxy from outside of the network the hypervisor is attached to
- Managing physical and virtual resources such as hosts and virtual machines. This includes upgrading and adding hosts, importing domains, converting virtual machines created on foreign hypervisors, and managing virtual machine pools.
- Monitoring the overall system resources for potential problems such as extreme load on one of the hosts, insufficient memory or disk space, and taking any necessary actions (such as migrating virtual machines to other hosts to lessen the load or freeing resources by shutting down machines).
- Responding to the new requirements of virtual machines (for example, upgrading the operating system or allocating more memory).
- Managing customized object properties using tags.
- Managing searches saved as public bookmarks.
- Managing user setup and setting permission levels.
- Troubleshooting for specific users or virtual machines for overall system functionality.
- Generating general and specific reports.
User Interface Elements
Header
The Header bar contains the name of the current logged in user and the button. The button shows version information. The button allows you to configure user roles. The button provides a shortcut to the book you are reading now.
Search Bar
The Search bar allows you to build queries to find the resources that you need. Queries can be as simple as a list of all the hosts in the system, or much more complex. As you type each part of the search query, you are offered choices to assist you in building the search. The star icon can be used to save the search as a bookmark.
Resource Tabs
All resources, such as hosts and clusters, can be managed using the appropriate tab. Additionally, the Events tabs allow you to view events for each resource.The Administration Portal provides the following tabs: Data Centers, Clusters, Hosts, Storage, Disks, Virtual Machines, Pools, Templates, Users, and Events, and a Dashboard tab if you have installed the Data Warehouse and Reporting services.
Results List
Perform a task on an individual item, multiple items, or all the items in the results list, by selecting the item(s) and then clicking the relevant action button. Information on a selected item is displayed in the details pane.
Details Pane
The Details pane shows detailed information about a selected item in the results list. If multiple items are selected, the details pane displays information on the first selected item only.
Tree/Bookmarks/Tags Pane
The Tree pane displays a navigable hierarchy of the resources in the virtualized environment.Bookmarks are used to save frequently used or complicated searches for repeated use. Bookmarks can be added, edited, or removed.Tags are applied to groups of resources and are used to search for all resources associated with that tag.
Alerts/Events Pane
The Alerts tab lists all high severity events such as errors or warnings. The Events tab shows an audit of events for all resources. The Tasks tab lists the current running tasks. You can view this panel by clicking the maximize/ minimize button.
Important
See Also:
Procedure 2.1. Saving a Query String as a Bookmark
- Enter the desired search query in the search bar and perform the search.
- Click the star-shaped button to the right of the search bar to open the New Bookmark window.
- Enter the Name of the bookmark.
- Edit the Search string field (if applicable).
- Click to save the query as a bookmark and close the window.
- The search query is saved and displays in the Bookmarks pane.
Table of Contents
- 3. Data Centers
- 4. Clusters
- 5. Logical Networks
- 6. Hosts
- 7. Storage
- 7.1. Introduction to Storage in Red Hat Enterprise Virtualization
- 7.2. Understanding Storage Domains
- 7.3. Storage Metadata Versions in Red Hat Enterprise Virtualization
- 7.4. Preparing and Adding File-based Storage
- 7.5. Adding POSIX Compliant File System Storage
- 7.6. Adding Block-based Storage
- 7.7. Storage Tasks
- 7.8. Red Hat Storage Volumes
- 7.9. Storage and Permissions
- 8. Virtual Machines
- 8.1. Introduction to Virtual Machines
- 8.2. Supported Virtual Machine Operating Systems
- 8.3. Virtual Machine Performance Parameters
- 8.4. Creating Virtual Machines
- 8.5. Using Virtual Machines
- 8.6. Shutting Down or Pausing Virtual Machines
- 8.7. Managing Virtual Machines
- 8.8. Virtual Machines and Permissions
- 8.9. Backing Up and Restoring Virtual Machines with Snapshots
- 8.10. Importing and Exporting Virtual Machines
- 8.11. Migrating Virtual Machines Between Hosts
- 8.12. Improving Uptime with Virtual Machine High Availability
- 8.13. Other Virtual Machine Tasks
- 9. Templates
- 10. Pools
- 11. Virtual Machine Disks
- 11.1. Understanding Virtual Machine Storage
- 11.2. Understanding Virtual Disks
- 11.3. Shareable Disks in Red Hat Enterprise Virtualization
- 11.4. Creating Unassociated Virtual Machine Hard Disks
- 11.5. Explanation of Settings in the New Virtual Machine Disk and Edit Virtual Machine Disk Windows
- 11.6. Moving a Virtual Machine Hard Disk Between Data Domains
- 11.7. Virtual Disks and Permissions
- 3.5.1. Creating a New Data Center
- 3.5.2. Explanation of Settings in the New Data Center and Edit Data Center Windows
- 3.5.3. Editing a Resource
- 3.5.4. Creating a New Logical Network in a Data Center or Cluster
- 3.5.5. Re-Initializing a Data Center: Recovery Procedure
- 3.5.6. Removing a Data Center
- 3.5.7. Force Removing a Data Center
Note
Procedure 3.1. Creating a New Data Center
- Select the Data Centers resource tab to list all data centers in the results list.
- Click to open the New Data Center window.
- Enter the Name and Description of the data center.
- Select the storage Type, Compatibility Version, and Quota Mode of the data center from the drop-down menus.
- Click to create the data center and open the New Data Center - Guide Me window.
- The Guide Me window lists the entities that need to be configured for the data center. Configure these entities or postpone configuration by clicking the button; configuration can be resumed by selecting the data center and clicking the button.
See Also:
Table 3.1. Data Center Properties
|
Field
|
Description/Action
|
|---|---|
|
Name
|
The name of the data center. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
|
Description
| The description of the data center. This field is recommended but not mandatory. |
|
Type
|
The storage type. Choose one of
|
|
Compatibility Version
|
The version of Red Hat Enterprise Virtualization. Choose one of:
|
|
Quota Mode
|
Quota is a resource limitation tool provided with Red Hat Enterprise Virtualizaton. Choose one of:
|
Procedure 3.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
See Also:
Procedure 3.3. Defining Logical Networks in a Cluster
- Use the Data Centers or Clusters resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Logical Networks tab of the details pane to list the existing logical networks.
- Click in the Data Centers details pane to open the New Logical Network window.Click in the Clusters details pane to open the New Logical Network window.
- Enter the Name and Description of the logical network.
- Select the check boxes to enable a VM Network, Enable VLAN tagging, and Override MTU.
- Select the cluster(s) you want to assign the network to. Note that the network is added as required Network to the selected clusters.
- Tick the Allow all users to use this Network checkbox to confer permissions for the new network to all users.
- Click OK to create the logical network.
Procedure 3.4. Re-Initializing a Data Center
- Click the Data Centers resource tab and select the data center to re-initialize.
- Ensure that any storage domains attached to the data center are in maintenance mode.
- Right-click the data center and select Re-Initialize Data Center from the drop-down menu to open the Data Center Re-Initialize window.
- The Data Center Re-Initialize window lists all available (detached; in maintenance mode) storage domains. Click the radio button for the storage domain you are adding to the data center.
- Select the Approve operation check box.
- Click to close the window and re-initialize the data center.
Procedure 3.5. Removing a Data Center
- Ensure the storage domains attached to the data center is in maintenance mode.
- Click the Data Centers resource tab and select the data center to remove.
- Click to open the Remove Data Center(s) confirmation window.
- Click .
Non Responsive if the attached storage domain is corrupt or if the host becomes Non Responsive. You cannot Remove the data center under either circumstance.
Procedure 3.6. Force Removing a Data Center
- Click the Data Centers resource tab and select the data center to remove.
- Click Force Remove to open the Force Remove Data Center confirmation window.
- Select the Approve operation check box.
- Click OK
Prerequisites:
Procedure 3.7. Attaching an Existing Data Domain to a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains already attached to the data center.
- Click to open the Attach Storage window.
- Select the check box for the data domain to attach to the data center. You can select multiple check boxes to attach multiple data domains.
- Click .
Procedure 3.8. Attaching an Existing ISO Domain to a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains already attached to the data center.
- Click to open the Attach ISO Library window.
- Click the radio button for the appropriate ISO domain.
- Click .
Procedure 3.9. Attaching an Existing Export Domain to a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains already attached to the data center.
- Click to open the Attach Export Domain window.
- Click the radio button for the appropriate Export domain.
- Click .
Note
Procedure 3.10. Detaching a Storage Domain from a Data Center
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains attached to the data center.
- Select the storage domain to detach. If the storage domain is
Active, click to move the domain into maintenance mode. - Click to open the Detach Storage confirmation window.
- Click .
Procedure 3.11. Activating a Data Domain from Maintenance Mode
- Click the Data Centers resource tab and select the appropriate data center.
- Select the Storage tab in the details pane to list the storage domains attached to the data center.
- Select the appropriate storage domain and click .
- Create and remove clusters associated with the data center;
- Add and remove hosts, virtual machines, and pools associated with the data center; and
- Edit user permissions for virtual machines associated with the data center.
Note
Table 3.2. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| DataCenterAdmin | Data Center Administrator | Can use, create, delete, manage all physical and virtual resources within a specific data center, including clusters, hosts, templates and virtual machines. |
| NetworkAdmin | Network Administrator | Can configure and manage the network of a particular data center. A network administrator of a data center inherits network permissions for virtual machines within the data center as well. |
Procedure 3.12. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 3.13. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 4.2.1. Creating a New Cluster
- 4.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows
- 4.2.3. Editing a Resource
- 4.2.4. Importing an Existing Red Hat Storage Cluster
- 4.2.5. Explanation of Settings in the Add Hosts Window
- 4.2.6. Setting Load and Power Management Policies for Hosts in a Cluster
- 4.2.7. Creating a New Logical Network in a Data Center or Cluster
- 4.2.8. Removing a Cluster
- 4.2.9. Designate a Specific Traffic Type for a Logical Network with the Assign/UnAssign Window
- 4.2.10. Explanation of Settings in the Assign/UnAssign Window
Prerequisites:
Important
Procedure 4.1. Creating a New Cluster
- Select the Clusters resource tab to list all clusters in the results list.
- Click to open the New Cluster window.
- Select the Data Center the cluster will belong to from the drop-down menu.
- Enter the Name and Description of the cluster.
- Select the CPU Name and Compatibility Version from the drop-down menus. It is important to match the CPU processor family with the minimum CPU processor type of the hosts you intend to attach to the cluster, otherwise the host will be non-operational.
- Tick either the Enable Virt Service or Enable Gluster Service check boxes, depending on whether the cluster should be populated with virtual machine hosts or Gluster-enabled nodes. Note that you cannot add Red Hat Enterprise Virtualization Hypervisor hosts to a Gluster-enabled cluster.
- Click the Optimization tab to select the memory page sharing threshold for the cluster, and optionally enable CPU thread handling on the cluster's hosts.
- Click the Resilience Policy tab to select the virtual machine migration policy.
- Click to create the cluster and open the New Cluster - Guide Me window.
- The Guide Me window lists the entities that need to be configured for the cluster. Configure these entities or postpone configuration by clicking the button; configuration can be resumed by selecting the cluster and clicking the button.
See Also:
Table 4.1. General Cluster Settings
|
Field
|
Description/Action
|
|---|---|
|
Data Center
|
The data center that will contain the cluster.
|
|
Name
|
The name of the cluster. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
|
Description
| The description of the cluster. This field is recommended but not mandatory. |
|
CPU Name
|
The CPU type of the cluster. Choose one of:
|
|
Compatibility Version
|
The version of Red Hat Enterprise Virtualization. Choose one of:
|
|
Enable Virt Service
| If this radio button is selected, hosts in this cluster will be used to run virtual machines. |
|
Enable Gluster Service
| If this radio button is selected, hosts in this cluster will be used as Red Hat Storage Server nodes, and not for running virtual machines. You cannot add a Red Hat Enterprise Virtualization Hypervisor host to a cluster with this option enabled. |
|
Import existing gluster configuration
|
This check box is only available if the Enable Gluster Service radio button is selected. This option allows you to import an existing Gluster-enabled cluster and all its attached hosts to Red Hat Enterprise Virtualization Manager.
The following options are required for each host in the cluster that is being imported:
|
Table 4.2. Optimization Settings
|
Field
|
Description/Action
|
|---|---|
|
Memory Optimization
|
|
|
CPU Threads
|
Selecting the Count Threads As Cores checkbox allows hosts to run virtual machines with a total number of processor cores greater than the number of cores in the host.
The exposed host threads would be treated as cores which can be utilized by virtual machines. For example, a 24-core system with 2 threads per core (48 threads total) can run virtual machines with up to 48 cores each, and the algorithms to calculate host CPU load would compare load against twice as many potential utilized cores.
|
Note
Table 4.3. Resilience Policy Settings
|
Field
|
Description/Action
|
|---|---|
|
Migrate Virtual Machines
|
Migrates all virtual machines in order of their defined priority.
|
|
Migrate only Highly Available Virtual Machines
|
Migrates only highly available virtual machines to prevent overloading other hosts.
|
|
Do Not Migrate Virtual Machines
| Prevents virtual machines from being migrated. |
Table 4.4. Cluster General Tab Properties
|
Field/Tab
|
Description/Action
|
|---|---|
|
None
|
Set the policy value to None to have no load or power sharing between hosts. This is the default mode.
|
|
Even Distribution
|
Distributes the CPU processing load evenly across all hosts in the cluster. Additional virtual machines attached to a host will not start if that host has reached the defined Maximum Service Level.
|
|
Power Saving
|
Distributes the CPU processing load across a subset of available hosts to reduce power consumption on under-utilized hosts. Hosts with a CPU load below the minimum service level past the defined time interval will migrate all virtual machines to other hosts so that it can be powered down. Additional virtual machines attached to a host will not start if that host has reached the defined maximum service level.
|
|
Maximum Service Level
|
Set by the blue slider. If the host runs at maximum service level for the defined time interval, the Red Hat Enterprise Virtualization Manager will migrate virtual machines to other hosts in the cluster until the host's CPU load is below the maximum service threshold.
|
|
Minimum Service Level
|
Set by the green slider. If the host runs below minimum service level for the defined time interval, the Red Hat Enterprise Virtualization Manager will migrate virtual machines to other hosts in the cluster and power down the host.
|
|
Time Interval Entry Field
|
Sets the time (in minutes) that a host can run a CPU load outside of the defined service levels before the cluster policy takes action. The defined time interval protects against temporary spikes in CPU load activating cluster policies and instigating unnecessary virtual machine migration. Maximum two characters.
|
Procedure 4.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
gluster peer status command is executed on that host through SSH, then displays a list of hosts that are a part of the cluster. You must manually verify the fingerprint of each host and provide passwords for them. You will not be able to import the cluster if one of the hosts in the cluster is down or unreachable. As the newly imported hosts do not have VDSM installed, the bootstrap script installs all the necessary VDSM packages on the hosts after they have been imported, and reboots them.
Important
Procedure 4.3. Importing an Existing Red Hat Storage Cluster to Red Hat Enterprise Virtualization Manager
- Select the Clusters resource tab to list all clusters in the results list.
- Click to open the New Cluster window.
- Select the Data Center the cluster will belong to from the drop-down menu.
- Enter the Name and Description of the cluster.
- Select the Enable Gluster Service radio button and the Import existing gluster configuration check box.The Import existing gluster configuration field is displayed only if you select Enable Gluster Service radio button.
- In the Address field, enter the hostname or IP address of any server in the cluster.The host Fingerprint displays to ensure you are connecting with the correct host. If a host is unreachable or if there is a network error, an error Error in fetching fingerprint displays in the Fingerprint field.
- Enter the Root Password for the server, and click OK.
- The Add Hosts window opens, and a list of hosts that are a part of the cluster displays.
- For each host, enter the Name and the Root Password.
- If you wish to use the same password for all hosts, select the Use a Common Password checkbox to enter the password in the provided text field.Click to set the entered password all hosts.Make sure the fingerprints are valid and submit your changes by clicking .
See Also:
Table 4.5. Add Gluster Hosts Settings
| Field | Description |
|---|---|
| Use a common password | Tick this checkbox to use the same password for all hosts belonging to the cluster. Enter the password in the Password field, then click the Apply button to set the password on all hosts. |
| Name | Enter the name of the host. |
| Hostname/IP | This field is automatically populated with the fully qualified domain name or IP of the host you provided in the New Cluster window. |
| Root Password | Enter a password in this field if you wish to use a different root password for each host. This field overrides the common password provided for all hosts in the cluster. |
| Fingerprint | The host fingerprint is displayed to ensure you are connecting with the correct host. This field is automatically populated with the fingerprint of the host you provided in the New Cluster window. |
Procedure 4.4. Setting Load and Power Management Policies for Hosts
- Use the resource tabs, tree mode, or the search function to find and select the cluster in the results list.
- Click the button, found in the General tab of the details pane, to open the Edit Policy window.
- Select one of the following policies:
- None
- Even Distribution - use the blue slider to specify the Maximum Service Level for a host.
- Power Saving - use the green slider to specify the Minimum Service Level for a host. Use the blue slider to specify the Maximum Service Level for a host.
- Specify the defined time interval (in minutes) in the text field.
- Click .
- ResultYou have updated the cluster policy for the cluster.
Procedure 4.5. Defining Logical Networks in a Cluster
- Use the Data Centers or Clusters resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Logical Networks tab of the details pane to list the existing logical networks.
- Click in the Data Centers details pane to open the New Logical Network window.Click in the Clusters details pane to open the New Logical Network window.
- Enter the Name and Description of the logical network.
- Select the check boxes to enable a VM Network, Enable VLAN tagging, and Override MTU.
- Select the cluster(s) you want to assign the network to. Note that the network is added as required Network to the selected clusters.
- Tick the Allow all users to use this Network checkbox to confer permissions for the new network to all users.
- Click OK to create the logical network.
See Also:
Note
Procedure 4.6. Removing a Cluster
- Use the resource tabs, tree mode, or the search function to find and select the cluster in the results list.
- Ensure there are no hosts in the cluster.
- Click to open the Remove Cluster(s) confirmation window.
- Click
Procedure 4.7. Assigning or UnAssigning a Logical Network to a Cluster
- Use the Clusters resource tab, tree mode, or the search function to find and select the cluster in the results list.
- Select the Logical Networks tab in the details pane to list the logical networks assigned to the cluster.
- Click to open the Assign/UnAssign Networks window.
- Select appropriate check boxes.
- Click to save the changes and close the window.
See Also:
Table 4.6. Assign/UnAssign Networks Settings
|
Field
|
Description/Action
|
|---|---|
Assign
|
Assigns the logical network to all hosts in the cluster.
|
Required
|
A logical network becomes operational when it is attached to an active NIC on all hosts in the cluster.
|
VM Network
| The logical network carries the virtual machine network traffic. |
Display Network
| The logical network carries the virtual machine SPICE and virtual network controller traffic. |
- Create and remove associated clusters;
- Add and remove hosts, virtual machines, and pools associated with the cluster; and
- Edit user permissions for virtual machines associated with the cluster.
Note
Table 4.7. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| ClusterAdmin | Cluster Administrator |
Can use, create, delete, manage all physical and virtual resources in a specific cluster, including hosts, templates and virtual machines. Can configure network properties within the cluster such as designating display networks, or marking a network as required or non-required.
However, a ClusterAdmin does not have permissions to attach or detach networks from a cluster, to do so NetworkAdmin permissions are required.
|
| NetworkAdmin | Network Administrator | Can configure and manage the network of a particular cluster. A network administrator of a cluster inherits network permissions for virtual machines within the cluster as well. |
Procedure 4.8. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 4.9. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
rhevm. The rhevm network carries all traffic, until another logical network is created. It is meant especially for management communication between the Red Hat Enterprise Virtualization Manager and hosts.
Warning
Important
- Directory Services
- DNS
- Storage
See Also:
Important
Non-operational.
Note
- 5.4.1. Creating a New Logical Network in a Data Center or Cluster
- 5.4.2. Explanation of Settings and Controls in the New Logical Network and Edit Logical Network Windows
- 5.4.3. Editing a Logical Network
- 5.4.4. Designate a Specific Traffic Type for a Logical Network with the Assign/UnAssign Window
- 5.4.5. Explanation of Settings in the Assign/UnAssign Window
- 5.4.6. Adding Multiple VLANs to a Single Network Interface using Logical Networks
- 5.4.7. Using the Networks Tab
Procedure 5.1. Defining Logical Networks in a Cluster
- Use the Data Centers or Clusters resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Logical Networks tab of the details pane to list the existing logical networks.
- Click in the Data Centers details pane to open the New Logical Network window.Click in the Clusters details pane to open the New Logical Network window.
- Enter the Name and Description of the logical network.
- Select the check boxes to enable a VM Network, Enable VLAN tagging, and Override MTU.
- Select the cluster(s) you want to assign the network to. Note that the network is added as required Network to the selected clusters.
- Tick the Allow all users to use this Network checkbox to confer permissions for the new network to all users.
- Click OK to create the logical network.
See Also:
Table 5.1. New Logical Network Settings
|
Field Name
|
Description
|
|---|---|
Name
|
The name of the logical network. This text field has a 15-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Description
|
The description of the logical network. This field is recommended but not mandatory.
|
VM Network
|
Select this option if only virtual machines use this network. If the network is used for traffic that does not involve virtual machines, like storage communications for example, do not select VM Network
|
Enable VLAN tagging
|
VLAN tagging is a security feature that gives all network traffic carried on the logical network a special characteristic. VLAN-tagged traffic cannot be read by interfaces that do not also have that characteristic. Use of VLANs on logical networks also allows a single network interface to be associated with multiple, differently VLAN-tagged logical networks. Enter a numeric value in the text entry field if VLAN tagging is enabled.
|
Override MTU
|
Set a custom maximum transmission unit for the logical network. You can use this to match the MTU supported by your new logical network to the MTU supported by the hardware it interfaces with. Enter a numeric value in the text entry field if MTU override is enabled.
|
Attach/Detach Network to/from Cluster(s)
|
Select the clusters that use the logical network.
Logical networks are added to clusters as Required networks by default. You can change this later using the button.
|
Allow all users to use this Network
|
Confers NetworkUser permissions on the new network to Everyone. This allows any user in the system with permissions on the relevant virtual machine or template to connect the network to the virtual machine or template.
|
Procedure 5.2. Editing a Logical Network
- Use the Data Centers resource tab, tree mode, or the search function to find and select the data center of the logical network in the results list.
- Click the Logical Networks tab in the details pane to list the logical networks in the data center.
- Select a logical network and click to open the Edit Logical Network window.
- You are required to detach all clusters before editing the logical network settings. Clear the cluster check boxes in the Attach/Detach Network to/from Cluster(s) area and click to open the Attach/Detach Network to/from Clusters confirmation window.Select the Approve operation check box and click OK to detach the clusters and enable editing of the logical network.
- Edit the necessary settings.
- Attach the necessary clusters.
- Click OK to save the changes.
Procedure 5.3. Assigning or UnAssigning a Logical Network to a Cluster
- Use the Clusters resource tab, tree mode, or the search function to find and select the cluster in the results list.
- Select the Logical Networks tab in the details pane to list the logical networks assigned to the cluster.
- Click to open the Assign/UnAssign Networks window.
- Select appropriate check boxes.
- Click to save the changes and close the window.
See Also:
Table 5.2. Assign/UnAssign Networks Settings
|
Field
|
Description/Action
|
|---|---|
Assign
|
Assigns the logical network to all hosts in the cluster.
|
Required
|
A logical network becomes operational when it is attached to an active NIC on all hosts in the cluster.
|
VM Network
| The logical network carries the virtual machine network traffic. |
Display Network
| The logical network carries the virtual machine SPICE and virtual network controller traffic. |
Important
Procedure 5.4. Adding Multiple VLANs to a Network Interface using Logical Networks
- Use the Hosts resource tab, tree mode, or the search function to find and select in the results list a host associated with the cluster to which your VLAN-tagged logical networks are assigned.
- Click the Network Interfaces tab in the details pane to list the physical network interfaces attached to the data center.
- Click to open the Setup Host Networks window.
- Drag your VLAN-tagged logical networks into the Assigned Logical Networks area next to the physical network interface. The physical network interface can have multiple logical networks assigned due to the VLAN tagging.
- Edit the logical networks by hovering your cursor over an assigned logical network and clicking the pencil icon to open the Edit Network window.If your logical network definition is not synchronized with the network configuration on the host, select the Sync network check box.Select a Boot Protocol from:Click OK.
- None,
- DHCP, or
- Static,Provide the IP and Subnet Mask.
- Select the Verify connectivity between Host and Engine check box to run a network check; this will only work if the host is in maintenance mode.
- Select the Save network configuration check box
- Click .
See Also:
- Attaching or detaching the networks to clusters and hosts
- Removing network interfaces from virtual machines and templates
- Adding and removing permissions for users to access and manage networks
- Create, edit and remove networks;
- Edit the configuration of the network, including configuring port mirroring;
- Attach and detach networks from resources including clusters and virtual machines.
Table 5.3. Red Hat Enterprise Virtualization Network Administrator and User Roles
| Role | Privileges | Notes |
|---|---|---|
| NetworkAdmin | Network Administrator for data center, cluster, host, virtual machine, or template. The user who creates a network is automatically assigned NetworkAdmin permissions on the created network. | Can configure and manage the network of a particular data center, cluster, host, virtual machine, or template. A network administrator of a data center or cluster inherits network permissions for virtual pools within the cluster. To configure port mirroring on a virtual machine network, apply the NetworkAdmin role on the network and the UserVmManager role on the virtual machine. |
| NetworkUser | Logical network and network interface user for virtual machine and template. | Can attach or detach network interfaces from specific logical networks. |
Procedure 5.5. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 5.6. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Important
- Must belong to only one cluster in the system.
- Must have CPUs that support the AMD-V or Intel VT hardware virtualization extensions.
- Must have CPUs that support all functionality exposed by the virtual CPU type selected upon cluster creation.
- Has a minimum of 2 GB RAM.
- Can have an assigned system administrator with system permissions.
See Also:
Important
- 6.4.1. Adding a Red Hat Enterprise Linux Host
- 6.4.2. Explanation of Settings and Controls in the New Host and Edit Host Windows
- 6.4.3. Configuring Host Power Management Settings
- 6.4.4. Configuring Host Storage Pool Manager (SPM) Settings
- 6.4.5. Editing a Resource
- 6.4.6. Approving Newly Added Red Hat Enterprise Virtualization Hypervisor Hosts
- 6.4.7. Moving a Host to Maintenance Mode
- 6.4.8. Activating a host from maintenance mode
- 6.4.9. Removing a Host
- 6.4.10. Customizing Hosts with Tags
Procedure 6.1. Adding a Red Hat Enterprise Linux Host
- Click the Hosts resource tab to list the hosts in the results list.
- Click to open the New Host window.
- Use the drop-down menus to select the Data Center and Host Cluster for the new host.
- Enter the Name, Address, and Root Password of the new host.
- If applicable, clear the Automatically configure host firewall check box.
- You can configure the Power Management and SPM using the applicable tabs now; however, as these are not fundamental to adding a Red Hat Enterprise Linux host, they are not covered in this procedure.
- Click to add the host and close the window.
Installing. Once installation is complete, the status will update to Reboot. The host must be activated for the status to change to Up.
Note
See Also:
Table 6.1. General settings
|
Field Name
|
Description
|
|---|---|
|
Name
|
The name of the cluster. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
|
Address
|
The IP address, or resolvable hostname of the host.
|
|
Data Center
|
The data center to which the host belongs. Red Hat Enterprise Virtualization Hypervisor hosts can not be added to Gluster-enabled clusters.
|
|
Host Cluster
|
The cluster to which the host belongs.
|
|
Root password
|
The password of the host's root user. This can only be given when you add the host, it cannot be edited afterwards.
|
Table 6.2. Power Management Settings
|
Field Name
|
Description
|
|---|---|
|
Primary/ Secondary
|
Prior to Red Hat Enterprise Virtualization 3.2, a host with power management configured only recognised one fencing agent. Fencing agents configured on version 3.1 and earlier, and single agents, are treated as primary agents. The secondary option is valid when a second agent is defined.
|
|
Concurrent
|
Valid when there are two fencing agents, for example for dual-power hosts in which each power switch has two agents connected to the same power switch.
|
|
Address
|
The address to access your host's power management device. Either a resolvable hostname or an IP address.
|
|
User Name
|
User account to access the power management device with. You may have to set up a user on the device, or use the default user.
|
|
Password
|
Password for the user accessing the power management device.
|
|
Type
|
The type of power management device in your host.
Choose one of the following:
|
|
Port
|
The port number used by the power management device to communicate with the host.
|
|
Options
|
Power management device specific options. Give these as 'key=value' or 'key', refer to the documentation of your host's power management device for the options available.
|
|
Secure
|
Tick this checkbox to allow the power management device to connect securely to the host. This can be done via ssh, ssl, or other authentication protocols depending on and supported by the power management agent.
|
|
Source
|
Specifies whether the host will search within its cluster or data center for a fencing proxy. Use the and buttons to change the sequence in which the resources are used.
|
Table 6.4. Console settings
|
Field Name
|
Description
|
|---|---|
|
Override display address
|
Select this checkbox to enable overriding the display addresses of the host. This feature is useful in a case where the hosts are defined by internal IP and are behind a NAT firewall. When a user connects to a virtual machine from outside of the internal network, instead of returning the private address of the host on which the virtual machine is running, a public IP or FQDN (which is resolved in the external network to the public IP) is returned.
|
|
Display address
|
The display address specified here will be used for all virtual machines running on this host. The address must be in the format of a fully qualified domain name or IP.
|
Important
maintenance mode before configuring power management settings. Otherwise, all running virtual machines on that host will be stopped ungracefully upon restarting the host, which can cause disruptions in production environments. A warning dialog will appear if you have not correctly set your host to maintenance mode.
Procedure 6.2. Configuring Power Management Settings
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Edit Host window.
- Click the Power Management tab to display the Power Management settings.
- Select the Enable Power Management check box to enable the fields.
- The Primary option is selected by default if you are configuring a new power management device. If you are adding a new device, set it to Secondary.
- Select the Concurrent check box to enable multiple fence agents to be used concurrently.
- Enter the Address, User Name, and Password of the power management device into the appropriate fields.
- Use the drop-down menu to select the Type of power management device.
- Enter the Port number used by the power management device to communicate with the host.
- Enter the Options for the power management device. Use a comma-separated list of
'key=value'or'key'. - Select the Secure checkbox to enable the power management device to connect securely to the host.
- Click to ensure the settings are correct.
- Click to save your settings and close the window.
See Also:
Procedure 6.3. Configuring SPM settings
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Edit Host window.
- Click the SPM tab to display the SPM Priority settings.
- Use the radio buttons to select the appropriate SPM priority for the host.
- Click to save the settings and close the window.
Procedure 6.4. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
See Also:
Prerequisites:
Procedure 6.5. Approving newly added Red Hat Enterprise Virtualization Hypervisor hosts
- In the Hosts tab, select the host you recently installed using the Red Hat Enterprise Virtualization Hypervisor host installation media. This host shows a status of
Pending Approval. - Click the button.
Up and it can be used to run virtual machines.
Note
Procedure 6.6. Moving a Host to Maintenance Mode
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Maintenance Host(s) confirmation window.
- Click to initiate maintenance mode.
Preparing for Maintenance, and finally Maintenance when the operation completes successfully.
Procedure 6.7. Activating a Host from Maintenance Mode
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click .
Unassigned, and finally Up when the operation is complete. Virtual machines can now run on the host.
Procedure 6.8. Removing a host
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Place the host into maintenance mode.
- Click to open the Remove Host(s) confirmation window.
- Select the Force Remove check box if the host is part of a Red Hat Storage cluster and has volume bricks on it, or if the host is non-responsive.
- Click .
Prerequisites:
Procedure 6.9. Customizing hosts with tags
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Assign Tags window.
- The Assign Tags window lists all available tags. Select the check boxes of applicable tags.
- Click to assign the tags and close the window.
rhevm management logical network between interfaces, and adding a newly created logical network to a network interface are common reasons to edit host networking.
Procedure 6.10. Editing Host Network Interfaces and Adding Logical Networks to Hosts
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results.
- Click the Network Interfaces tab in the details pane to list the network interfaces attached to the host and their configurations.
- Attach a logical network to a network interface by selecting and dragging a logical network into the Assigned Logical Networks area next to the network interface.Alternatively, right-click the logical network and select a network interface from the drop-down menu.
- Edit the logical networks by hovering your cursor over an assigned logical network and clicking the pencil icon to open the Edit Network window.If your logical network definition is not synchronized with the network configuration on the host, select the Sync network check box.Select a Boot Protocol from:Click OK.
- None,
- DHCP, or
- Static.If you have chosen Static, provide the IP and Subnet Mask.
- Select the Verify connectivity between Host and Engine check box to run a network check; this will only work if the host is in maintenance mode.
- Select the Save network configuration check box if you want these network changes to be made persistent when the environment is rebooted.
- Click to implement the changes and close the window.
Note
rhevm management network with VLAN tagging enabled, please see Red Hat KB43070.
Procedure 6.11. Creating a Bond Device using the Administration Portal
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click the Network Interfaces tab in the details pane to list the physical network interfaces attached to the host.
- Click to open the Setup Host Networks window.
- Select and drag one of the interfaces over the top of another interface and drop it to open the Create New Bond window.Alternatively, right-click the interface and select another interface from the drop-down menu.
- Select the Bond Name and Bonding Mode from the drop-down menus.Bonding modes 1, 2, 4, and 5 can be selected. Any other mode can be configured using the Custom option.
- Click to create the bond and close the Create New Bond window.
- Assign a logical network to the newly created bonded interface.
- Optionally choose to Verify connectivity between Host and Engine and Save network configuration.
- Click accept the changes and close the Setup Host Networks window.
Example 6.1. xmit_hash_policy
mode=4, xmit_hash_policy=layer2+3
Example 6.2. ARP Monitoring
arp_interval on the bond device of the host by selecting a Custom bonding mode, and entering the following into the text field:
mode=1, arp_interval=1, arp_ip_target=192.168.0.2
Example 6.3. Primary
mode=1, primary=eth0
Procedure 6.12. Saving a host network configuration
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click the tab on the Details pane to list the NICs on the host, their address, and other specifications.
- Click the button.
- The host network configuration is saved and the following message is displayed on the task bar: "Network Changes were saved on host
<Hostname>."
- Any host in the same cluster as the host requiring fencing.
- Any host in the same data center as the host requiring fencing.
Procedure 6.13. Setting fencing parameters on a host
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click to open the Edit Host window.
- Select the Enable Power Management check box to enable the fields.
- The Primary option is selected by default if you are configuring a new power management device. If you are adding a new device, set it to Secondary.
- Select the Concurrent check box to enable multiple fence agents to be used concurrently.
- Enter the Address, User Name, and Password of the power management device.
- Select the power management device Type from the drop-down menu.
- Enter the Port number used by the power management device to communicate with the host.
- Enter the specific Options of the power management device. Use a comma-separated list of 'key=value' or 'key' entries.
- Click the button to test the power management device. Test Succeeded, Host Status is: on will display upon successful verification.
Warning
Power management parameters (userid, password, options, etc) are tested by Red Hat Enterprise Virtualization Manager only during setup and manually after that. If you choose to ignore alerts about incorrect parameters, or if the parameters are changed on the power management hardware without the corresponding change in Red Hat Enterprise Virtualization Manager, fencing is likely to fail when most needed. - Click to save the changes and close the window.
Prerequisites:
Procedure 6.14. Using Host Power Management Functions
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click the Power Management drop-down menu.
- Select one of the following options:
- Restart: This option stops the host and waits until the host's status changes to
Down. When the agent has verified that the host is down, the highly available virtual machines are restarted on another host in the cluster. The agent then restarts this host. When the host is ready for use its status displays asUp. - Start: This option starts the host and lets it join a cluster. When it is ready for use its status displays as
Up. - Stop: This option powers off the host. Before using this option, ensure that the virtual machines running on the host have been migrated to other hosts in the cluster. Otherwise the virtual machines will crash and only the highly available virtual machines will be restarted on another host. When the host has been stopped its status displays as
Non-Operational.
Important
When two fencing agents are defined on a host, they can be used concurrently or sequentially. For concurrent agents, both agents have to respond to the Stop command for the host to be stopped; and when one agent responds to the Start command, the host will go up. For sequential agents, to start or stop a host, the primary agent is used first; if it fails, the secondary agent is used. - Selecting one of the above options opens a confirmation window. Click OK to confirm and proceed.
Warning
Procedure 6.15. Manually fencing or isolating a non-responsive host
- On the Hosts tab, select the host. The status must display as
non-responsive. - Manually reboot the host. This could mean physically entering the lab and rebooting the host.
- On the Administration Portal, right-click the host entry and select the button.
- A message displays prompting you to ensure that the host has been shut down or rebooted. Select the Approve Operation check box and click OK.
- Edit the configuration of the host;
- Set up the logical networks; and
- Remove the host.
Table 6.5. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| HostAdmin | Host Administrator | Can configure, manage, and remove a specific host. Can also perform network-related operations on a specific host. |
Procedure 6.16. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 6.17. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 7.1. Introduction to Storage in Red Hat Enterprise Virtualization
- 7.2. Understanding Storage Domains
- 7.3. Storage Metadata Versions in Red Hat Enterprise Virtualization
- 7.4. Preparing and Adding File-based Storage
- 7.5. Adding POSIX Compliant File System Storage
- 7.6. Adding Block-based Storage
- 7.7. Storage Tasks
- 7.8. Red Hat Storage Volumes
- 7.9. Storage and Permissions
- Network File System (NFS).
- Other POSIX compliant file systems.
- Internet Small Computer System Interface (iSCSI).
- Local storage attached directly to the virtualization hosts.
- Fibre Channel Protocol (FCP).
- Data Domain: A data domain holds the virtual hard disks and OVF files of all the virtual machines and templates in a data center. In addition, snapshots of the virtual machines are also stored in the data domain.The data domain cannot be shared across data centers, and the data domain must be of the same type as the data center. For example, a data center of a iSCSI type, must have an iSCSI data domain.You must attach a data domain to a data center before you can attach domains of other types to it.
- ISO Domain: ISO domains store ISO files (or logical CDs) used to install and boot operating systems and applications for the virtual machines. An ISO domain removes the data center's need for physical media. An ISO domain can be shared across different data centers. ISO storage domains use NFS storage.
- Export Domain: Export domains are temporary storage repositories that are used to copy and move images between data centers and Red Hat Enterprise Virtualization environments. Export domains can be used to backup virtual machines. An export domain can be moved between data centers, however, it can only be active in one data center at a time.
Important
Support for export storage domains backed by storage on anything other than NFS is being deprecated. While existing export storage domains imported from Red Hat Enterprise Virtualization 2.2 environments remain supported new export storage domains must be created on NFS storage.
Important
Up.
- V1 metadata (Red Hat Enterprise Virtualization 2.x series)Each storage domain contains metadata describing its own structure, and all of the names of physical volumes that are used to back virtual machine disk images.Master domains additionally contain metadata for all the domains and physical volume names in the storage pool. The total size of this metadata is limited to 2 kb, limiting the number of storage domains that can be in a pool.Template and virtual machine base images are read only.V1 metadata is applicable to NFS, iSCSI, and FC storage domains.
- V2 metadata (Red Hat Enterprise Virtualization 3.0)All storage domain and pool metadata is stored as logical volume tags rather than written to a logical volume. Metadata about virtual machine disk volumes is still stored in a logical volume on the domains.Physical volume names are no longer included in the metadata.Template and virtual machine base images are read only.V2 metadata is applicable to iSCSI, and FC storage domains.
- V3 metadata (Red Hat Enterprise Virtualization 3.1)All storage domain and pool metadata is stored as logical volume tags rather than written to a logical volume. Metadata about virtual machine disk volumes is still stored in a logical volume on the domains.Virtual machine and template base images are no longer read only. This change enables live snapshots, live storage migration, and clone from snapshot.Support for unicode metadata is added, for non-English volume names.V3 metadata is applicable to NFS, POSIX, iSCSI, and FC storage domains.
Note
Procedure 7.1. Preparing NFS Storage
Install nfs-utils
NFS functionality is provided by the nfs-utils package. Before file shares can be created, check that the package is installed by querying the RPM database for the system:$
rpm -qi nfs-utilsIf the nfs-utils package is installed then the package information will be displayed. If no output is displayed then the package is not currently installed. Install it usingyumwhile logged in as therootuser:#
yum install nfs-utilsConfigure Boot Scripts
To ensure that NFS shares are always available when the system is operational both thenfsandrpcbindservices must start at boot time. Use thechkconfigcommand while logged in asrootto modify the boot scripts.#
chkconfig --add rpcbind#chkconfig --add nfs#chkconfig rpcbind on#chkconfig nfs onOnce the boot script configuration has been done, start the services for the first time.#
service rpcbind start#service nfs startCreate Directory
Create the directory you wish to share using NFS.#
mkdir/exports/isoReplace/exports/isowith the name, and path of the directory you wish to use.Export Directory
To be accessible over the network using NFS the directory must be exported. NFS exports are controlled using the/etc/exportsconfiguration file. Each export path appears on a separate line followed by a tab character and any additional NFS options. Exports to be attached to the Red Hat Enterprise Virtualization Manager must have the read, and write, options set.To grant read, and write access to/exports/isousing NFS for example you add the following line to the/etc/exportsfile./exports/iso*(rw)Again, replace/exports/isowith the name, and path of the directory you wish to use.Reload NFS Configuration
For the changes to the/etc/exportsfile to take effect the service must be told to reload the configuration. To force the service to reload the configuration run the following command asroot:#
service nfs reloadSet Permissions
The NFS export directory must be configured for read write access and must be owned by vdsm:kvm. If these users do not exist on your external NFS server use the following command, assuming thatis the directory to be used as an NFS share./exports/iso#
chown -R 36:36/exports/isoThe permissions on the directory must be set to allow read and write access to both the owner and the group. The owner should also have execute access to the directory. The permissions are set using thechmodcommand. The following command arguments set the required permissions on thedirectory./exports/iso#
chmod 0755/exports/iso
Procedure 7.2. Attaching NFS Storage
- Click the resource tab to list the existing storage domains.
- Click to open the New Domain window.
- Enter the Name of the storage domain.
- Select the Data Center, Domain Function / Storage Type, and Use Host from the drop-down menus.If applicable, select the Format from the drop-down menu.
- Enter the Export Path to be used for the storage domain.The export path should be in the format of
192.168.0.10:/data or domain.example.com:/data - Click to enable further configurable settings. It is recommended that the values of these parameters not be modified.
Important
All communication to the storage domain is from the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must be attached to the chosen Data Center before the storage is configured. - Click OK to create the storage domain and close the window.
Locked while the disk prepares. It is automatically attached to the data center upon completion.
Important
/data/images. This directory already exists with the correct permissions on Hypervisor installations. The steps in this procedure are only required when preparing local storage on Red Hat Enterprise Linux virtualization hosts.
Procedure 7.3. Preparing Local Storage
- On the virtualization host, create the directory to be used for the local storage.
# mkdir -p /data/images
- Ensure that the directory has permissions allowing read/write access to the
vdsmuser (UID 36) andkvmgroup (GID 36).# chown 36:36 /data /data/images
# chmod 0755 /data /data/images
Procedure 7.4. Adding Local Storage
- Use the Hosts resource tab, tree mode, or the search function to find and select the host in the results list.
- Click Maintenance to place the host into maintenance mode.
- Click to open the Configure Local Storage window.
- Click the buttons next to the Data Center, Cluster, and Storage fields to configure and name the local storage domain.
- Set the path to your local storage in the text entry field.
- If applicable, select the Memory Optimization tab to configure the memory optimization policy for the new local storage cluster.
- Click to save the settings and close the window.
Important
Procedure 7.5. Attaching POSIX Compliant File System Storage
- Click the Storage resource tab to list the existing storage domains in the results list.
- Click New Domain to open the New Domain window.
- Enter the Name for the storage domain.
- Select the Data Center to be associated with the storage domain. The Data Center selected must be of type POSIX (POSIX compliant FS). Alternatively, select
(none). - Select
Data / POSIX compliant FSfrom the Domain Function / Storage Type drop-down menu.If applicable, select the Format from the drop-down menu. - Select a host from the Use Host drop-down menu. Only hosts within the selected data center will be listed. The host that you select will be used to connect the storage domain.
- Enter the Path to the POSIX file system, as you would normally provide it to the
mountcommand. - Enter the VFS Type, as you would normally provide it to the
mountcommand using the-targument. Seeman mountfor a list of valid VFS types. - Enter additional Mount Options, as you would normally provide them to the
mountcommand using the-oargument. The mount options should be provided in a comma-separated list. Seeman mountfor a list of valid mount options. - Click OK to attach the new Storage Domain and close the window.
Procedure 7.6. Preparing iSCSI Storage
- Install the scsi-target-utils package using the
yumcommand as root on your storage server.# yum install -y scsi-target-utils
- Add the devices or files you want to export to the
/etc/tgt/targets.conffile. Here is a generic example of a basic addition to thetargets.conffile:<target iqn.
YEAR-MONTH.com.EXAMPLE:SERVER.targetX> backing-store/PATH/TO/DEVICE1# Becomes LUN 1 backing-store/PATH/TO/DEVICE2# Becomes LUN 2 backing-store/PATH/TO/DEVICE3# Becomes LUN 3 </target>Targets are conventionally defined using the year and month they are created, the reversed fully qualified domain that the server is in, the server name, and a target number. - Start the tgtd service.
# service tgtd start
- Make the tgtd start persistently across reboots.
# chkconfig tgtd on
- Open an iptables firewall port to allow clients to access your iSCSI export. By default, iSCSI uses port 3260. This example inserts a firewall rule at position 6 in the INPUT table.
# iptables -I INPUT 6 -p tcp --dport 3260 -j ACCEPT
- Save the iptables rule you just created.
# service iptables save
Note
Procedure 7.7. Adding iSCSI Storage
- Click the Storage resource tab to list the existing storage domains in the results list.
- Click the button to open the New Domain window.
- Enter the Name of the new storage domain.
- Use the Data Center drop-down menu to select an iSCSI data center.If you do not yet have an appropriate iSCSI data center, select
(none). - Use the drop-down menus to select the Domain Function / Storage Type and the Format. The storage domain types that are not compatible with the chosen data center are not available.
- Select an active host in the Use Host field. If this is not the first data domain in a data center, you must select the data center's SPM host.
Important
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - The Red Hat Enterprise Virtualization Manager is able to map either iSCSI targets to LUNs, or LUNs to iSCSI targets. The New Domain window automatically displays known targets with unused LUNs when iSCSI is selected as the storage type. If the target that you are adding storage from is not listed then you can use target discovery to find it, otherwise proceed to the next step.
iSCSI Target Discovery
- Click Discover Targets to enable target discovery options. When targets have been discovered and logged in to, the New Domain window automatically displays targets with LUNs unused by the environment.
Note
LUNs used externally to the environment are also displayed.You can use the Discover Targets options to add LUNs on many targets, or multiple paths to the same LUNs. - Enter the fully qualified domain name or IP address of the iSCSI host in the Address field.
- Enter the port to connect to the host on when browsing for targets in the Port field. The default is
3260. - If the Challenge Handshake Authentication Protocol (CHAP) is being used to secure the storage, select the User Authentication check box. Enter the CHAP username and CHAP password.
- Click the button.
- Select the target you want to use from the discovery results and click the button.Alternatively, click the to log in to all of the discovered targets.
- Click the + button next to the desired target. This will expand the entry and display all unused LUNs attached to the target.
- Select the check box for each LUN that you are using to create the storage domain.
- Click to create the storage domain and close the window.
Note
Procedure 7.8. Adding FCP Storage
- Click the resource tab to list all storage domains in the virtualized environment.
- Click to open the New Domain window.
- Enter the Name of the storage domain
- Use the Data Center drop-down menu to select an FCP data center.If you do not yet have an appropriate FCP data center, select
(none). - Use the drop-down menus to select the Domain Function / Storage Type and the Format. The storage domain types that are not compatible with the chosen data center are not available.
- Select an active host in the Use Host field. If this is not the first data domain in a data center, you must select the data center's SPM host.
Important
All communication to the storage domain is via the selected host and not directly from the Red Hat Enterprise Virtualization Manager. At least one active host must exist in the system, and be attached to the chosen data center, before the storage is configured. - The New Domain window automatically displays known targets with unused LUNs when Data / Fibre Channel is selected as the storage type. Select the LUN ID check box to select all of the available LUNs.Alternatively, select the Add LUN check boxes for individual LUNs to use them with the FCP data domain.
- Click OK to create the storage domain and close the window.
Locked status while it is being prepared for use. When ready, it is automatically attached to the data center. Select either Build New Domain or Use Existing Volume Group.
- LUNs that are already being used by the SPM host will also display as in use. You can choose to forcefully over ride the contents of these LUNs, but the operation is not guaranteed to succeed.
- 7.7.1. Importing existing ISO or export storage domains
- 7.7.2. Populating the ISO Storage Domain
- 7.7.3. Moving storage domains to maintenance mode
- 7.7.4. Editing a Resource
- 7.7.5. Activating storage domains
- 7.7.6. Removing a storage domain
- 7.7.7. Destroying a storage domain
- 7.7.8. Detaching the Export Domain
- 7.7.9. Attaching an Export Domain to a Data Center
Procedure 7.9. Importing an Existing ISO or Export Storage Domain
- Click the resource tab to list all the available storage domains in the results list.
- Select the appropriate Domain Function / Storage Type from the following:
- ISO
- Export
The Domain Function / Storage Type determines the availability of the Format field. - Select the SPM host from the Use host drop-down menu.
Important
All communication to the storage domain is via the selected host and not from the Red Hat Enterprise Virtualization Manager. At least one host must be active and have access to the storage before the storage can be configured. - Enter the Export path of the storage. The export path can be either a static IP address or a resolvable hostname. For example,
192.168.0.10:/Images/ISOorstorage.demo.redhat.com:/exports/iso. - Click to import the domain and close the window.
- The storage domain is imported and displays on the Storage tab. The next step is to attach it to a data center. This is described later in this chapter, .
Procedure 7.10. Populating the ISO Storage Domain
- Copy the required ISO image to a temporary directory on the system running Red Hat Enterprise Virtualization Manager.
- Log in to the system running Red Hat Enterprise Virtualization Manager as the
rootuser. - Use the
rhevm-iso-uploadercommand to upload the ISO image. This action will take some time, the amount of time varies depending on the size of the image being uploaded and available network bandwidth.Example 7.1. ISO Uploader Usage
In this example the ISO imageRHEL6.isois uploaded to the ISO domain calledISODomainusing NFS. The command will prompt for an administrative username and password. The username must be provided in the formusername@domain.#
rhevm-iso-uploader--iso-domain=ISODomainuploadRHEL6.iso
Important
Procedure 7.11. Moving storage domains to maintenance mode
- Use the Storage resource tab, tree mode, or the search function to find and select the storage domain in the results list.
- Shut down and move all the virtual machines running on the storage domain.
- Click the Data Centers tab in the details pane.
- Click . The storage domain is deactivated and has an
Inactivestatus in the results list.
Note
Procedure 7.12. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
- Use the Storage resource tab, tree mode, or the search function to find and select the inactive storage domain in the results list.
- Click the Data Centers tab in the details pane.
- Select the appropriate data center and click .
Important
If you attempt to activate the ISO domain before activating the data domain, an error message displays and the domain is not activated.
Procedure 7.13. Removing a Storage Domain
- Use the Storage resource tab, tree mode, or the search function to find and select the appropriate storage domain in the results list.
- Move the domain into maintenance mode to deactivate it.
- Detach the domain from the data center.
- Click to open the Remove Storage confirmation window.
- Select a host from the list.
- Click to remove the storage domain and close the window.
Procedure 7.14. Destroying a Storage Domain
- Use the Storage resource tab, tree mode, or the search function to find and select the appropriate storage domain in the results list.
- Right-click the storage domain and select to open the Destroy Storage Domain confirmation window.
- Select the Approve operation check box and click to destroy the storage domain and close the window.
Procedure 7.15. Detaching an Export Domain from the Data Center
- Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list.
- Click the Data Centers tab in the details pane and select the export domain.
- Click to put the export domain into maintenance mode.
- Click to open the Detach Storage confirmation window.
- Click to detach the export domain.
Prerequisites:
Procedure 7.16. Attaching an Export Domain to a Data Center
- Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list.
- Click the Data Centers tab in the details pane.
- Click to open the Attach to Data Center window.
- Select the radio button of the appropriate data center.
- Click to attach the export domain.
- Select the newly attached data center in the details pane and click .
- 7.8.1. Introduction to Red Hat Storage Volumes
- 7.8.2. Gluster Storage Terminology
- 7.8.3. Creating A Storage Volume
- 7.8.4. Adding Bricks to a Volume
- 7.8.5. Explanation of Settings in the Add Bricks window
- 7.8.6. Enabling Red Hat Storage Volumes for Virtualization
- 7.8.7. Starting Volumes
- 7.8.8. Tuning Volumes
- 7.8.9. Editing Volume Options
- 7.8.10. Reset Volume Options
- 7.8.11. Removing Bricks from a Volume
- 7.8.12. Stopping Red Hat Storage Volumes
- 7.8.13. Deleting Red Hat Storage Volumes
Note
Table 7.1. Data Center Properties
|
Term
|
Definition
|
|---|---|
|
Brick
|
A brick is the GlusterFS basic unit of storage, represented by an export directory on a server in the trusted storage pool. A Brick is expressed by combining a server with an export directory in the following format:
SERVER:EXPORT
For example:
myhostname:/exports/myexportdir/
|
|
Block Storage
|
Block special files or block devices correspond to devices through which the system moves data in the form of blocks. These device nodes often represent addressable devices such as hard disks, CD-ROM drives, or memory-regions. Red Hat Storage supports XFS file system with extended attributes.
|
|
Cluster
|
A trusted pool of linked computers, working together closely thus in many respects forming a single computer. In Red Hat Storage terminology a cluster is called as trusted storage pool.
|
|
Client
|
The machine which mounts the volume (this may also be a server)
|
|
Distributed File System
|
A file system that allows multiple clients to concurrently access data spread across multiple servers/bricks in a trusted storage pool. Data sharing among multiple locations is fundamental to all distributed file system.
|
|
Geo-Replication
|
Geo-replication provides a continuous, asynchronous, and incremental replication service from site to another over Local Area Networks (LAN), Wide Area Network (WAN), and across the Internet.
|
|
glusterd
|
The Gluster management daemon that needs to run on all servers in the trusted storage pool.
|
|
Metadata
|
Metadata is data providing information about one or more other pieces of data.
|
|
N-way Replication
|
Local synchronous data replication typically deployed across campus or Amazon Web Services Availability Zones.
|
|
Namespace
|
Namespace is an abstract container or environment created to hold a logical grouping of unique identifiers or symbols. Each Red Hat Storage trusted storage pool exposes a single namespace as a POSIX mount point that contains every file in the trusted storage pool.
|
|
POSIX
|
Portable Operating System Interface (for Unix) is the name of a family of related standards specified by the IEEE to define the application programming interface (API), along with shell and utilities interfaces for software compatible with variants of the UNIX operating system. Red Hat Storage exports a fully POSIX compatible file system.
|
|
RAID
|
Redundant Array of Inexpensive Disks (RAID) is a technology that provides increased storage reliability through redundancy, combining multiple low-cost, less-reliable disk drives components into a logical unit where all drives in the array are interdependent.
|
|
RRDNS
|
Round Robin Domain Name Service (RRDNS) is a method to distribute load across application servers. RRDNS is implemented by creating multiple A records with the same name and different IP addresses in the zone file of a DNS server.
|
|
Server
|
The machine (virtual or bare metal) which hosts the actual file system in which data will be stored.
|
|
Scale-Up Storage
|
Increases the capacity of the storage device, but only in a single dimension. An example might be adding additional disk capacity to a single computer in a trusted storage pool.
|
|
Scale-Out Storage
|
Increases the capability of a storage device in multiple dimensions. For example adding a server to a trusted storage pool increases CPU, disk capacity, and throughput for the trusted storage pool.
|
|
Subvolume
|
A brick after being processed by at least one translator.
|
|
Translator
|
A translator connects to one or more subvolumes, does something with them, and offers a subvolume connection.
|
|
Trusted Storage Pool
|
A storage pool is a trusted network of storage servers. When you start the first server, the storage pool consists of that server alone.
|
|
User Space
|
Applications running in user space don’t directly interact with hardware, instead using the kernel to moderate access. User Space applications are generally more portable than applications in kernel space. Gluster is a user space application.
|
|
Virtual File System (VFS)
|
VFS is a kernel software layer that handles all system calls related to the standard Linux file system. It provides a common interface to several kinds of file systems
|
|
Volfile
|
Volfile is a configuration file used by glusterfs process. Volfile will be usually located at
/var/lib/glusterd/vols/VOLNAME.
|
|
Volume
|
A volume is a logical collection of bricks. Most of the gluster management operations happen on the volume.
|
Important
Procedure 7.17. Creating A Storage Volume
- Click the Volumes tab. The Volumes tab displays a list of all volumes in the system.
- Click the button. The Create Volume dialog box displays.
- Select the cluster from the Volume Cluster drop-down list.
- In the Name field, enter the name of the volume.
- Select the type of the volume from the Type drop-down list. You can choose the volume type as Distribute, Replicate, or Stripe.
- Add bricks to your volume. Bricks must be created externally on the Red Hat Storage nodes. Click Add Bricks.
- Select the Access Protocol for the new volume by selecting GlusterFS,or NFS, or both checkboxes.
- In the Allow Access From field, specify the volume access control as a comma-separated list of IP addresses or hostnames.You can use wildcards to specify ranges of addresses such as an asterisk (*) which specifies all IP addresses or hostnames. You need to use IP-based authentication for Gluster Filesystem and NFS exports.
- Click to create the volume. The new volume is added and displays on the Volume tab.
Procedure 7.18. Adding Bricks to a Volume
- On the Volumes tab on the navigation pane, select the volume to which you want to add bricks.
- Select the volume to add new bricks. Click the tab from the Details pane.
- Click to open the Add Bricks window.
- Use the Server drop-down menu to select the server on which the brick will reside.
- Enter the path for the Brick Directory. The directory or its parent directory must already exist.
- Click . A list of available bricks appears, with server addresses and brick directory names.
- Tick the checkbox of the bricks you wish to use.
- Click .
Table 7.2. Add Bricks Tab Properties
|
Field Name
|
Description
|
|---|---|
Volume Type
|
Displays the type of volume. This field cannot be changed, it was set when you created the volume.
|
Server
|
The selected server to add new bricks.
|
Brick Directory
|
The directory in the server.
|
Important
Important
Procedure 7.19. Enabling Red Hat Storage Volumes for Virtualization
- On the Data Centers tab, click to create a new data center. Set its Compatibility Version to 3.1 and its storage Type to POSIX compliant FS. See Section 3.5.1, “Creating a New Data Center” for details.
- You can either create a new Gluster-enabled cluster and install at least one new host, or import an existing Gluster-enabled cluster and all its attached hosts.
- New cluster and host: On the Clusters tab, click to create a new cluster. Choose the Data Center you just created, enter all required details and select the Enable Gluster Service checkbox. See Section 4.2.1, “Creating a New Cluster” for details.On the Hosts tab, click to add a new Red Hat Storage host. Choose the Data Center and Cluster you just created, enter all required details to install the host. See Section 6.4.1, “Adding a Red Hat Enterprise Linux Host” for details.
- Existing cluster and host: On the Clusters tab, click New to import your existing Gluster enabled cluster and all its attached hosts. Choose the Data Center you just created, enter all required details and select the Enable Gluster Service checkbox. Select the Import existing gluster configuration checkbox and enter all required details. See Section 4.2.4, “Importing an Existing Red Hat Storage Cluster” for details.
- On the Volumes tab, click and enter all required information. Add bricks to the volume using the button. See Section 7.8.3, “Creating A Storage Volume” for details.
- Select the newly created volume and click .The volume is tuned and
group,storage-owner-uid, andstorage-owner-gidoptions are set. - Select the new volume and click Start to start the volume. The volume status changes to Up.You must optimize the volume before you can attach the volume to your storage domain.
Procedure 7.20. Starting Volumes
- In the Volumes tab, select the volume to be started.You can select multiple volumes to start by using
ShiftorCtrlkey. - Click the button.
Up.
Procedure 7.21. Tuning Volumes
- Click the Volumes tab.A list of volumes displays.
- Select the volume that you want to tune, and click the tab from the Details pane.The Volume Options tab displays a list of options set for the volume.
- Click to set an option. The Add Option dialog box displays. Select the Option Key from the drop down list and enter the option value.
- Click .The option is set and displays in the Volume Options tab.
Procedure 7.22. Editing Volume Options
- Click the Volumes tab.A list of volumes displays.
- Select the volume that you want to edit, and click the Volume Options tab from the Details pane.The Volume Options tab displays a list of options set for the volume.
- Select the option you wish to edit. Click . The Edit Option dialog box displays. Enter a new value for the option.
- Click .The edited option displays in the Volume Options tab.
- Click the Volumes tab.A list of volumes displays.
- Select the volume and click the tab from the Details pane.The Volume Options tab displays a list of options set for the volume.
- Select the option you wish to reset. Click . A dialog box displays, prompting to confirm the reset option.
- Click .The selected option is reset.
Note
Procedure 7.23. Removing Bricks from a Volume
- On the Volumes tab on the navigation pane, select the volume from which you wish to remove bricks.
- Click the tab from the Details pane.
- Select the bricks you wish to remove. Click .
- A window opens, prompting to confirm the deletion. Click OK to confirm.
Procedure 7.24. Stopping Volumes
- In the Volumes tab, select the volume to be stopped.You can select multiple volumes to stop by using
ShiftorCtrlkey. - Click .
Down.
- In the Volumes tab, select the volume to be deleted.
- Click . A dialog box displays, prompting to confirm the deletion. Click .
- Edit the configuration of the storage domain;
- Move the storage domain into maintenance mode; and
- Remove the storage domain.
Note
Table 7.3. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| StorageAdmin | Storage Administrator | Can create, delete, configure and manage a specific storage domain. |
| GlusterAdmin | Gluster Storage Administrator | Can create, delete, configure and manage Gluster storage volumes. |
Procedure 7.25. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 7.26. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 8.1. Introduction to Virtual Machines
- 8.2. Supported Virtual Machine Operating Systems
- 8.3. Virtual Machine Performance Parameters
- 8.4. Creating Virtual Machines
- 8.5. Using Virtual Machines
- 8.6. Shutting Down or Pausing Virtual Machines
- 8.7. Managing Virtual Machines
- 8.8. Virtual Machines and Permissions
- 8.9. Backing Up and Restoring Virtual Machines with Snapshots
- 8.10. Importing and Exporting Virtual Machines
- 8.11. Migrating Virtual Machines Between Hosts
- 8.12. Improving Uptime with Virtual Machine High Availability
- 8.13. Other Virtual Machine Tasks
Table 8.1. Supported virtual machine operating systems
| Operating System | Architecture | SPICE support |
|---|---|---|
|
Red Hat Enterprise Linux 3
|
32-bit, 64-bit
|
Yes
|
|
Red Hat Enterprise Linux 4
|
32-bit, 64-bit
|
Yes
|
|
Red Hat Enterprise Linux 5
|
32-bit, 64-bit
|
Yes
|
|
Red Hat Enterprise Linux 6
|
32-bit, 64-bit
|
Yes
|
|
SUSE Linux Enterprise Server 10 (select for the guest type in the user interface)
|
32-bit, 64-bit
|
No
|
|
SUSE Linux Enterprise Server 11 (SPICE drivers (QXL) are not supplied by Red Hat. However, the distribution's vendor may provide spice drivers as part of their distribution.)
|
32-bit, 64-bit
|
No
|
|
Windows XP Service Pack 3 and newer
|
32 bit
|
Yes
|
|
Windows 7
|
32-bit, 64-bit
|
Yes
|
|
Windows 8
|
32-bit, 64-bit
|
No
|
|
Windows Server 2003 Service Pack 2 and newer
|
|
Yes
|
|
Windows Server 2008
|
32 bit, 64 bit
|
Yes
|
|
Windows Server 2008 R2
|
64-bit
|
Yes
|
|
Windows Server 2012 R2
|
64-bit
|
No
|
Note
Table 8.2. Supported virtual machine parameters
| Parameter | Number | Note |
|---|---|---|
| Virtualized CPUs | 160 | per virtual machine |
| Virtualized RAM | 2TB | For a 64 bit virtual machine |
| Virtualized RAM | 4GB | per 32 bit virtual machine. Note, the virtual machine may not register the entire 4GB. The amount of RAM that the virtual machine recognizes is limited by its operating system. |
| Virtualized storage devices | 8 | per virtual machine |
| Virtualized network interface controllers | 8 | per virtual machine |
| Virtualized PCI devices | 32 | per virtual machine |
- 8.4.1. Creating a New Virtual Machine from an Existing Template
- 8.4.2. Creating a New Virtual Machine from a Blank Template
- 8.4.3. Explanation of Settings and Controls in the New Virtual Machine and Edit Virtual Machine Windows
- 8.4.4. Creating a Cloned Virtual Machine from an Existing Template
- 8.4.5. Completing the Configuration of a Virtual Machine by Defining Network Interfaces and Hard Disks
- 8.4.6. Installing a Guest Operating System onto a Virtual Machine
- 8.4.7. Installing Windows on VirtIO Optimized Hardware
- 8.4.8. Virtual Machine Run Once Settings Explained
Procedure 8.1. Creating a New Virtual Machine from an Existing Template
- Click the Virtual Machines resource tab to list all the virtual machines in the results list.The icon to the right of the virtual machine name indicates whether it is a virtual server, a virtual machine, or a part of a virtual machine pool.
- Click the New Server button to open the New Server Virtual Machine window, or the New Desktop button to open the New Desktop Virtual Machine window.
- Select the Data Center and Host Cluster on which the desktop is to run. Select an existing template from the Based on Template drop-down menu.
- Enter a suitable Name and Description, and accept the default values inherited from the template. You can change the rest of the fields if needed.
- Click OK.
See Also:
Procedure 8.2. Creating a New Virtual Machine from a Blank Template
- Click the resource tab to list all the virtual machines in the results list.The icon to the right of the virtual machine name indicates whether it is a virtual server, a virtual machine, or a part of a virtual machine pool.
- Click the button to open the New Server Virtual Machine window, or the button to open the New Desktop Virtual Machine window.
- On the General tab, you only need to fill in the Name and Operating System fields. You can accept the default settings for other fields, or change them if required.
- Alternatively, click the Initial Run, Console, Host, Resource Allocation, Boot Options, and Custom Properties tabs in turn to define options for your virtual machine.
- Click to create the virtual machine and close the window.
- The New Virtual Machine - Guide Me window opens. Use the Guide Me buttons to complete configuration or click to close the window.
Down. Before you can use this virtual machine, add at least one network interface and one virtual disk, and install an operating system.
Table 8.3. Virtual Machine: General Settings
|
Field Name
|
Description
|
|---|---|
|
Data Center
|
The data center to which the virtual machine is attached.
|
|
Host Cluster
|
The name of the host cluster to which the virtual machine is attached. It can be hosted on any physical machine in the cluster depending on the policy rules.
|
|
Quota (Server only)
|
A policy that limits the virtual machine from using more CPU, memory, or storage resources than are allocated.
|
|
Name
|
The name of virtual machine. Names must not contain any spaces, and must contain at least one character from A-Z. The maximum length of a virtual machine name is 15 characters.
|
|
Description
|
A meaningful description of the new virtual machine.
|
|
Based on Template
|
Templates can be used to create a virtual machines from existing models. This field is set to Blank by default, which enables creating a virtual machine from scratch.
|
|
Memory Size
|
The amount of memory assigned to the virtual machine. When allocating memory, consider the processing and storage needs of the applications that are intended to run on the virtual machine.
Maximum guest memory is constrained by the selected guest architecture and the cluster compatibility level.
|
|
Total Virtual CPUs
|
The processing power allocated to the virtual machine as CPU Cores. Do not assign more cores to a virtual machine than are present on the physical host.
|
|
Cores per Virtual Socket
|
The number of cores assigned to each virtual socket.
|
|
Virtual Sockets
|
The number of CPU sockets for the virtual machine. Do not assign more sockets to a virtual machine than are present on the physical host.
|
|
Operating System
|
The operating system. Valid values include a range of Red Hat Enterprise Linux and Windows variants.
|
|
Stateless (Desktop only)
|
Select this check box if the virtual machine is to run in stateless mode. The stateless mode is used primarily for desktop virtual machines. Running a stateless desktop or server creates a new COW layer on the virtual machine hard disk image where new and changed data is stored. Shutting down the stateless virtual machine deletes the new COW layer, returning the virtual machine to its original state. This type of virtual machine is useful when creating virtual machines that need to be used for a short time, or by temporary staff.
|
|
Delete protection
|
Select this check box to make deletion of the virtual machine impossible. It is possible to delete the virtual machine only when this check box is not selected.
|
Table 8.4. Virtual Machine: Initial Run Settings
|
Field Name
|
Description
|
|---|---|
|
General - Time Zone
|
The time zone in which the virtual machine is to run. It is not necessarily the time zone for the physical host on which the virtual machine is running.
|
|
Windows - Domain
|
The domain in which the virtual machine is to run. This option is only available when Windows is selected as the operating system on the Virtual Machine - General tab.
|
Table 8.5. Virtual Machine: Console Settings
|
Field Name
|
Description
|
|---|---|
|
Protocol
|
Defines the display protocol to be used. SPICE is the recommended protocol for Linux and Windows virtual machines, excepting Windows 8 and Windows Server 2012. Optionally, select VNC for Linux virtual machines. A VNC client is required to connect to a virtual machine using the VNC protocol.
|
|
USB Support
|
Defines whether USB devices can be used on the virtual machine. This option is only available for virtual machines using the SPICE protocol. Select either:
|
|
Monitors
|
The number of monitors for the virtual machine. This option is only available for virtual desktops using the SPICE display protocol. You can choose 1, 2 or 4. Since Windows 8 and Windows Server 2012 virtual machines do not support the SPICE protocol, they do not support multiple monitors.
|
|
Enable Smartcard
|
Smartcards are an external hardware security feature, most commonly seen in credit cards, but also used by many businesses as authentication tokens. Smartcards can be used to protect Red Hat Enterprise Virtualization virtual machines. Tick or untick the checkbox to activate and deactivate Smartcard authentication for individual virtual machines.
|
|
Disable strict user checking
|
Click the Advanced Parameters arrow and select the checkbox to use this option. With this option selected, the virtual machine does not need to be rebooted when a different user connects to it.
By default, strict checking is enabled so that only one user can connect to the console of a virtual machine. No other user is able to open a console to the same virtual machine until it has been rebooted. The exception is that a
SuperUser can connect at any time and replace a existing connection. When a SuperUser has connected, no normal user can connect again until the virtual machine is re-booted.
Disable strict checking with caution, because you can expose the previous user's session to the new user
|
Table 8.6. Virtual Machine: Host Settings
|
Field Name
|
Description
|
|---|---|
|
Max free Memory for scheduling new VMs
|
Reports the maximum amount of memory that remains for the hypervisor to use when creating new virtual machines. The value in this field is calculated prior to taking into account other scheduling policies, which may further reduce the amount of memory available for creating virtual machines. If an attempt to create a virtual machine fails and Max free Memory for scheduling new VMs only narrowly exceeds the amount of memory you need to create the virtual machine, the other scheduling policies have most likely reduced the amount of free memory to a level at which Red Hat Enterprise Virtualization cannot create a new virtual machine.
|
|
Run On
|
Defines the host on which the virtual machine is to run. Select either:
|
|
Migration Options
|
Defines options to run and migrate the virtual machine. If the options here are not used, the virtual machine will run or migrate according to its cluster's policy.
|
|
CPU Pinning topology
|
Enables the virtual machine's virtual CPU (vCPU) to run on a specific physical CPU (pCPU) in a specific host. This option is not supported if the virtual machine's cluster compatibility version is set to 3.0. The syntax of CPU pinning is
v#p[_v#p], for example:
In order to pin a virtual machine to a host, you must select under , and select the
Use Host CPU check box.
|
Table 8.7. Virtual Machine: High Availability Settings
|
Field Name
|
Description
|
|---|---|
|
Highly Available
|
Select this check box if the virtual machine is to be highly available. For example, in cases of host maintenance or failure, the virtual machine will be automatically re-run on another host. If the host is manually shut down by the system administrator, the virtual machine is not automatically moved to another host.
|
|
Priority for Run/Migration queue
|
Sets the priority level for the virtual machine to be migrated or restarted on another host.
|
Table 8.8. Virtual Machine: Resource Allocation Settings
|
Field Name
|
Sub-element
|
Description
|
|---|---|---|
|
Memory Allocation
| The amount of physical memory guaranteed for this virtual machine. | |
|
Storage Allocation
|
The Template Provisioning option is only available when the virtual machine is created from a template.
| |
|
Thin
|
Provides optimized usage of storage capacity. Disk space is allocated only as it is required.
| |
|
Clone
|
Optimized for the speed of guest read and write operations. All disk space requested in the template is allocated at the time of the clone operation.
| |
|
Alias
|
The name of the virtual disk.
| |
|
Allocation policy
|
Storage allocation policy for disks created when creating a virtual machine from a template as a Clone.
| |
|
Target
|
The storage domain for the virtual disk.
| |
|
Quota
|
The type of quota enforced on the virtual disk.
|
Table 8.9. Virtual Machine: Boot Options Settings
|
Field Name
|
Description
|
|---|---|
|
First Device
|
After installing a new virtual machine, the new virtual machine must go into Boot mode before powering up. Select the first device that the virtual machine must try to boot:
|
|
Second Device
|
Select the second device for the virtual machine to use to boot if the first device is not available. The first device selected in the previous option does not appear in the options.
|
|
Attach CD
|
If you have selected CD-ROM as a boot device, tick this check box and select a CD-ROM image from the drop-down menu. The images must be available in the ISO domain.
|
|
Boot Options
|
Defines the virtual machine's boot sequence, running options, and source images for installing the operating system and required drivers.
|
|
Linux Boot Options
|
The following options boot a Linux kernel directly instead of through the BIOS bootloader.
|
Table 8.10. Virtual Machine: Custom Properties Settings
|
Field Name
|
Description
|
Recommendations and Limitations
|
|---|---|---|
|
sap_agent
|
Enables SAP monitoring on the virtual machine. Set to true or false.
|
-
|
|
sndbuf
|
Enter the size of the buffer for sending the virtual machine's outgoing data over the socket. Default value is 0.
|
-
|
|
vhost
|
Disables vhost-net, which is the kernel-based virtio network driver on virtual network interface cards attached to the virtual machine. To disable vhost, the format for this property is:
This will explicitly start the virtual machine without the vhost-net setting on the virtual NIC attached to LogicalNetworkName.
|
vhost-net provides better performance than virtio-net, and if it is present, it is enabled on all virtual machine NICs by default. Disabling this property makes it easier to isolate and diagnose performance issues, or to debug vhost-net errors, for example if migration fails for virtual machines on which vhost does not exist.
|
|
viodiskcache
|
Caching mode for the virtio disk. writethrough writes data to the cache and the disk in parallel, writeback does not copy modifications from the cache to the disk, and none disables caching.
|
For Red Hat Enterprise Virtualization 3.1, if viodiskcache is enabled, the virtual machine cannot be live migrated.
|
Warning
Procedure 8.3. Creating a Cloned Virtual Machine from an Existing Template
- Click the Virtual Machines resource tab to list all the virtual machines in the results list.
- Click the button to open the New Server Virtual Machine window, or the button to open the New Desktop Virtual Machine window.
- Select an existing template from the Based on Template drop-down menu.
- Enter a Name and appropriate Description, and accept the default values inherited from the template in the rest of the fields. You can change them if needed.
- Click the Resource Allocation tab. The template you selected is displayed on the Template Provisioning field. Select Clone.
Select the disk provisioning mode in the Allocation field. This selection impacts both the speed of the clone operation and the amount of disk space it requires.- Selecting
Thin Provisionresults in a faster clone operation and provides optimized usage of storage capacity. Disk space is allocated only as it is required. This is the default selection. - Selecting
Preallocatedresults in a slower clone operation and is optimized for the speed of guest read and write operations. All disk space requested in the template is allocated at the time of the clone operation.
- Select the Target storage domain for the virtual machine.
- Click OK.
Note
Cloning a virtual machine may take some time. A new copy of the template's disk must be created. During this time, the virtual machine's status is firstImage Locked, thenDown.
Procedure 8.4. Completing the Configuration of a Virtual Machine by Defining Network Interfaces and Hard Disks
- On the New Virtual Machine - Guide Me window, click the button to open the New Network Interface window. You can accept the default values or change them as necessary.
Enter the Name of the network interface. - Use the drop-down menus to select the Network and the Type of network interface for the new virtual machine. The Link State is set to Up by default when the NIC is defined on the virtual machine and connected to the network.
Note
The options on the Network and Type fields are populated by the networks available to the cluster, and the NICs available to the virtual machine. - If applicable, select the Specify custom MAC address check box and enter the network interface's MAC address.
- Click the arrow next to Advanced Parameters to configure the Port Mirroring and Card Status fields, if necessary.
- Click to close the New Network Interface window and open the New Virtual Machine - Guide Me window.
- Click the button to open the New Virtual Disk window.
- Click to close the New Virtual Disk window. The New Virtual Machine - Guide Me window opens with changed context. There is no further mandatory configuration.
- Click to close the window.
See Also:
Prerequisites:
Procedure 8.5. Installing an operating system onto a virtual machine
- Select the created virtual machine. It has a status of
Down. - Click the tab to define the boot sequence and source images for installing the operating system.
- Click the tab to define additional boot options specific to Linux virtual machines.
- Click the tab to join the virtual machine to a domain on the initial run.
- Click the tab and select a suitable protocol to connect to the virtual machine. SPICE is the recommended protocol.
- Click the tab to enter additional running options for virtual machines.
- Click .
virtio-win.vfd floppy image contains Windows drivers for VirtIO optimized disk and network devices. These drivers provide a performance improvement over emulated device drivers.
virtio-win.vfd is placed automatically on ISO storage domains that are hosted on the Manager server. It must be manually uploaded using the rhevm-iso-uploader tool to other ISO storage domains.
Red Hat VirtIO network interface and a disk that uses the VirtIO interface to your virtual machine.
Procedure 8.6. Installing VirtIO Drivers during Windows Installation
- Select your virtual machine from the list in the Virtual Machines tab.
- Click the button, and the Run Once window displays.
- Click Boot Options to expand the Boot Options configuration options.
- Click the Attach Floppy checkbox, and select
virtio-win.vfdfrom the drop down selection box. - Click the Attach CD checkbox, and select from the drop down selection box the ISO containing the version of Windows you want to install.
- Move CD-ROM in the Boot Sequence field.
- Configure the rest of your Run Once options as required, and click OK to start your virtual machine, and then click the button to open a graphical console to your virtual machine.
virtio-win.vfd floppy disk which was attached to your virtual machine as A:.
Table 8.11. Virtual Machine: Run Once Settings
|
Field Name
|
Description
|
|---|---|
|
Boot Options
|
Defines the virtual machine's boot sequence, running options, and source images for installing the operating system and required drivers.
|
|
Linux Boot Options
|
The following options boot a Linux kernel directly instead of through the BIOS bootloader.
|
|
Initial Run
|
Defines the virtual machine's domain and user log in credentials.
|
|
Display Protocol
|
Defines the protocol to connect to virtual machines.
|
|
Custom Properties
|
Additional VDSM options for running virtual machines.
|
- video at more than 30 frames per second
- bi-directional audio (for soft-phones/IP phones)
- bi-directional video (for video telephony/video conferencing)
- connection to multiple monitors with a single virtual machine
- USB redirection from the client's USB port into the virtual machine
- connection to a proxy from outside of the network the hypervisor is attached to
Procedure 8.7. Powering on a Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list with a status of
Down. - Click the
icon.
Alternatively, right-click and select .
Up. The display protocol of the selected virtual machine is displayed. If the virtual machine has the rhevm-guest-agent installed, its IP address is also displayed.
Procedure 8.8. Installing the SPICE plugin for Mozilla Firefox on Red Hat Enterprise Linux
- Open a terminal and run the following command as root:
# yum install spice-xpi
The plugin will be installed the next time Firefox is started.
Procedure 8.9. Installing the SPICE ActiveX component for Internet Explorer on Windows
- The first time you attempt to connect to a virtual machine, an add-on notification bar displays in the browser, prompting you to install the SPICE ActiveX component. You need administrative privileges on your client machine to install the component. Contact your systems administrator if you do not have the necessary permissions.
- When you accept the prompt to install the SPICE ActiveX component, Internet Explorer may issue a security warning. Confirm that you wish to proceed, and the component will be installed.
Important
Procedure 8.10. Logging in to a virtual machine
- On the Virtual Machines resource tab, select a running virtual machine.
- Click the Console button or right-click the virtual machine and select Console from the menu.
- If the virtual machine's display protocol is set to SPICE, a console window to the virtual machine opens. Log in to the virtual machine's guest operating system.
- If the virtual machine's display protocol is set to VNC, a window containing connection details including the IP address, port number and password required opens. Use the details with your VNC client to connect to the virtual machine.
Powering Off status in the Administration Portal. The virtual machine requires manual intervention to shut it down completely because the following Windows message is displayed on the virtual machine:
Warning
Procedure 8.11. Shutting Down a Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Click the (
) button.
Alternatively, right-click the virtual machine and select Shut down.
Down.
Procedure 8.12. Pausing a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Click the (
) button.
Alternatively, right-click the virtual machine and select Suspend
Paused.
- 8.7.1. Editing a Resource
- 8.7.2. Removing a Virtual Machine
- 8.7.3. Adding and Editing Virtual Machine Disks
- 8.7.4. Adding and Editing Virtual Machine Network Interfaces
- 8.7.5. Explanation of Settings in the Virtual Machine Network Interface Window
- 8.7.6. Hot Plugging Virtual Machine Disks
- 8.7.7. Hot Plugging Network Interfaces
- 8.7.8. Removing Disks and Network Interfaces from Virtual Machines
Procedure 8.13. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Procedure 8.14. Removing a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Shut down the virtual machine. The Remove button is only enabled for a virtual machine that has a status of
Down. - Click . On the Remove Virtual Machine(s) confirmation window, the Remove Disk(s) checkbox is automatically selected, which will remove the attached virtual disks together with the virtual machine. If the checkbox is de-selected, the virtual disks will remain in the environment as floating disks.
- Click to remove the virtual machine (and associated virtual disks) and close the window.
Procedure 8.15. Adding Disks to Virtual Machines
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Click the Disks tab in the details pane to display a list of virtual disks currently associated with the virtual machine.
- Click to open the Add Virtual Disk window.
- Use the appropriate radio buttons to switch between Internal and the External (Direct Lun) disks.
- Select the Attach Disk check box to choose an existing disk from the list and select the Activate check box.Alternatively, enter the Size, Alias, and Description of a new disk and use the drop-down menus and check boxes to configure the disk.
- Click to add the disk and close the window.
Procedure 8.16. Adding network interfaces to virtual machines
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Select the Network Interfaces tab in the details pane to display a list of network interfaces that are currently associated with the virtual machine.
- Click to open the New Network Interface window.
- Enter the Name of the network interface.
- Use the drop-down menus to select the Network and the Type of network interface for the new network interface. The Link State is set to Up by default when the NIC is defined on the virtual machine and connected to the network.
Note
The options on the Network and Type fields are populated by the networks available to the cluster, and the NICs available to the virtual machine. - If applicable, select the Specify custom MAC address check box and enter the network interface's MAC address.
- Click the arrow next to Advanced Parameters to configure the Port Mirroring and Card Status fields, if necessary.
- Click to close the New Network Interface window.
Table 8.12. Add a network interface to a virtual machine entries
|
Field Name
|
Description
|
|---|---|
|
Name
|
The name of the network interface. This text field has a 21-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
|
Network
|
Logical network that the network interface is placed on. By default, all network interfaces are put on the rhevm management network.
|
|
Link State
|
Whether or not the network interface is connected to the logical network.
|
|
Type
|
The virtual interface the network interface presents to virtual machines. VirtIO is faster but requires VirtIO drivers. Red Hat Enterprise Linux 5 and higher includes VirtIO drivers. Windows does not include VirtIO drivers, but they can be installed from the guest tools ISO or virtual floppy disk. rtl8139 and e1000 device drivers are included in most operating systems.
|
|
Specify custom MAC address
|
Choose this option to set a custom MAC address. The Red Hat Enterprise Virtualization Manager automatically generates a MAC address that is unique to the environment to identify the network interface. Having two devices with the same MAC address online in the same network causes networking conflicts.
|
|
Port Mirroring
|
A security feature that allows all network traffic going to or leaving from virtual machines on a given logical network and host to be copied (mirrored) to the network interface. If the host also uses the network, then traffic going to or leaving from the host is also copied.
Port mirroring only works on network interfaces with IPv4 IP addresses.
|
|
Card Status
|
Whether or not the network interface is defined on the virtual machine.
|
Procedure 8.17. Hot plugging virtual machine disks
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Select the Disks tab from the details pane of the virtual machine.
- Select the virtual machine disk you would like to hot plug.
- Click the or button.
Procedure 8.18. Hot plugging network interfaces
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.
- Select the Network Interfaces tab from the details pane of the virtual machine.
- Select the network interface you would like to hot plug and click to open the Edit Network Interface window.
- Click the Advanced Parameters arrow to access the Card Status option. Set the Card Status to Plugged if you want to enable the network interface, or set it to Unplugged if you want to disable the network interface.
Procedure 8.19. Removing disks and network interfaces from virtual machines
- Select the virtual machine with virtual hardware you'd like to remove.
- Select the relevant tab, either Network Interfaces or Disks, from the virtual machine details pane.
- Select the disk or network interface you'd like to remove. To remove it, you must have first Deactivated it.
- Click the button. Click in the confirmation window. If you are removing a disk, select the Remove Permanently option to completely remove it from the environment. If you don't select this option, for example because the disk is a shared disk, it will remain in the Disks resource tab.
- Create, edit, and remove virtual machines; and
- Run, suspend, shutdown, and stop virtual machines.
Note
Table 8.13. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| DataCenterAdmin | Data Center Administrator | Can use, create, delete, manage all virtual machines within a specific data center. |
| ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all virtual machines within a specific cluster. |
| NetworkAdmin | Network Administrator | Can configure and manage networks attached to virtual machines. To configure port mirroring on a virtual machine network, apply the NetworkAdmin role on the network and the UserVmManager role on the virtual machine. |
Table 8.14. Red Hat Enterprise Virtualization System User Roles
| Role | Privileges | Notes |
|---|---|---|
| UserRole | Can access and use virtual machines and pools. | Can log in to the User Portal and use virtual machines and pools. |
| PowerUserRole | Can create and manage virtual machines and templates. | Apply this role to a user for the whole environment with the Configure window, or for specific data centers or clusters. For example, if a PowerUserRole is applied on a data center level, the PowerUser can create virtual machines and templates in the data center. |
| UserVmManager | System administrator of a virtual machine. | Can manage virtual machines, create and use snapshots, and migrate virtual machines. A user who creates a virtual machine in the User Portal is automatically assigned the UserVmManager role on the machine. |
| UserTemplateBasedVm | Limited privileges to only use Templates. | Level of privilege to create a virtual machine by means of a template. |
| VmCreator | Can create virtual machines in the User Portal. | This role is not applied to a specific virtual machine; apply this role to a user for the whole environment with the Configure window. When applying this role to a cluster, you must also apply the DiskCreator role on an entire data center, or on specific storage domains. |
| NetworkUser | Logical network and network interface user for virtual machines. | If the Allow all users to use this Network option was selected when a logical network is created, NetworkUser permissions are assigned to all users for the logical network. Users can then attach or detach virtual machine network interfaces to or from the logical network. |
Note
Procedure 8.20. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 8.21. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Note
Procedure 8.22. Creating a snapshot of a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Select the Snapshots tab in the details pane.
- Click in the left side-pane of the details pane to open the Create Snapshot window.
- Enter a description for the snapshot.
- Click to create the snapshot and close the window.
Locked, which changes to Ok. When you click on the snapshot, its details are shown on the General, Disks, Network Interfaces, and Installed Applications tabs in the right side-pane of the details pane.
Prerequisites:
Procedure 8.23. Using a snapshot to restore a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select the virtual machine in the results list. Ensure the status is
Powered Down. - Click the Snapshots tab in the details pane to list the available snapshots.
- Select a snapshot to restore in the left side-pane. The snapshot details display in the right side-pane.
- Click to preview the snapshot. The status of the virtual machine briefly changes to
Image Lockedbefore returning toDown. - Start the virtual machine and it will run with the disk image of the snapshot.
- Click Commit to permanently restore the virtual machine to the condition of the snapshot. Any subsequent snapshots are erased.Alternatively, click the Undo button to deactivate the snapshot and return the virtual machine to its previous state.
Prerequisites:
Procedure 8.24. Creating a virtual machine from a snapshot
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select the virtual machine in the results list.
- Click the Snapshots tab in the details pane to list the available snapshots for the virtual machines.
- Select a snapshot in the list displayed and click to open the Clone VM from Snapshot window.
- Enter the Name and Description of the virtual machine to be created.
- Click to create the virtual machine and close the window.
Image Locked. The virtual machine will remain in this state until Red Hat Enterprise Virtualization completes the creation of the virtual machine. A virtual machine with a preallocated 20GB hard drive takes about fifteen minutes to create. Sparsely-allocated virtual disks take less time to create than do preallocated virtual disks.
Image Locked to Down in the Virtual Machines tab in the navigation pane.
Procedure 8.25. Deleting a Snapshot
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list.
- Click the Snapshots tab in the details pane to list available snapshots for the virtual machine.
- Select the snapshot to delete.
- In the Navagation pane, shut down the running virtual machine associated with the snapshot to be deleted.
- Click to open the Delete Snapshot confirmation window.
- Click to delete the snapshot and close the window.
- Moving virtual resources between Red Hat Enterprise Virtualization environments.
- Move virtual machines and templates between data centers in a single Red Hat Enterprise Virtualization environment.
- Backing up virtual machines and templates.
- First you export your virtual machines and templates to an export domain.
- Second, you detach the export domain from one data center, and attach it to another. You can attach it to a different data center in the same Red Hat Enterprise Virtualization environment, or attach it to a data center in a separate Red Hat Enterprise Virtualizaiton environment that is managed by another installation of the Red Hat Enterprise Virtualization Manager.
- Third, you import your virtual machines and template into the data center you attached the expord domain to.
Note
- an export domain exists, and is attached to the source data center.
- the virtual machine is shut down.
- if the virtual machine was created from a template, the template resides on the destination data center, or is exported alongside the virtual machine.
Procedure 8.26. Performing an export-import of virtual resources
- Attach the export domain to the source data center.
- Export the virtual resource to the export domain.
- Detach the export domain from the source data center.
- Attach the export domain to the destination Data center.
- Import the virtual resource into the destination data center.
See Also:
Procedure 8.27. Exporting a Virtual Machine to the Export Domain
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine in the results list. Ensure the virtual machine has a status of
Down. - Click to open the Export Virtual Machine window.
- Select the Force Override check box to override existing images of the virtual machine on the export domain.Select the Collapse Snapshots check box to create a single export volume per disk. Selecting this option will remove snapshot restore points and include the template in a template-based virtual machine. This removes any dependencies a virtual machine has on a template.
- Click to export the virtual machine and close the window.
Image Locked status as it is exported. Depending on the size of your virtual machine hard disk images, and your storage hardware, this can take up to an hour. Use the Events tab to view the progress.
Procedure 8.28. Importing a Virtual Machine into the Destination Data Center
- Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list. The export domain must have a status of
Active - Select the VM Import tab in the details pane to list the available virtual machines to import.
- Select one or more virtual machines to import and click to open the Import Virtual Machine(s) window.
- Use the drop-down menus to select the Default Storage Domain, Cluster, and Cluster Quota in the data center.
- Select the Collapse All Snapshots check box to remove snapshot restore points and include templates in template-based virtual machines.
- Click to import the virtual machines.The Import Conflict window opens if the virtual machine exists in the virtualized environment.
- Choose one of the following radio buttons:
- Don't import
- Clone and enter a unique name for the virutal machine in the New Name: field.
Or select the Apply to all check box to import all duplicated virtual machines with the same suffix. - Click OK to import the virtual machines and close the window.
- 8.11.1. What is Live Migration?
- 8.11.2. Live Migration Prerequisites
- 8.11.3. Automatic Virtual Machine Migration
- 8.11.4. Preventing Automatic Migration of a Virtual Machine
- 8.11.5. Manually Migrating Virtual Machines
- 8.11.6. Setting Migration Priority
- 8.11.7. Cancelling ongoing virtual machine migrations
- 8.11.8. Event and Log Notification upon Automatic Migration of Highly Available Virtual Servers
- The source and destination host must both be members of the same cluster, ensuring CPU compatibility between them.
- The source and destination host must have a status of
Up. - The source and destination host must have access to the same virtual networks and VLANs.
- The source and destination host must have access to the data storage domain on which the virtual machine resides.
- There must be enough CPU capacity on the destination host to support the virtual machine's requirements.
- There must be enough RAM on the destination host that is not in use to support the virtual machine's requirements.
- The migrating vitual machine must not have the
cache!=nonecustom property set.
Procedure 8.29. Preventing automatic migration of a virtual machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine or virtual server in the results list.
- Click Edit to open the Edit Desktop Virtual Machine or Edit Server Virtual Machine window.
- Click the Host tab.
- Use the Run On radio buttons to designate the virtual machine to run on Any Host in Cluster or a Specific host. If applicable, select a specific host from the drop-down menu.
Warning
Explicitly assigning a virtual machine to a specific host and disabling migration is mutually exclusive with Red Hat Enterprise Virtualization high availability. Virtual machines that are assigned to a specific host can only be made highly available using third party high availability products like Red Hat High Availability. - Use the drop-down menu to affect the Migration Options. Select Do not allow migration to enable the Use Host CPU check box.
- If applicable, enter relevant CPU Pinning topology commands in the text field.
- Click to save the changes and close the window.
cache!=none custom property set.
Procedure 8.30. Manually migrating virtual machines
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a running virtual machine in the results list.Click to open the Migrate Virtual Machine(s) window.
- Use the radio buttons to select whether to Select Host Automatically or to Select Destination Host, specifying the host using the drop-down menu.
Note
Virtual Machines migrate within their designated host cluster. When the Select Host Automatically option is selected, the system determines the host to which the virtual is migrated according to the load balancing and power management rules set up in the cluster policy. - Click to commence migration and close the window.
Note
Procedure 8.31. Setting Migration Priority
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual server in the results list.
- Click to open the Edit Server Virtual Machine window.
- Select the High Availability tab.
- Use the radio buttons to set the Priority for Run/Migrate Queue of the virtual machine to one of Low, Medium, or High.
- Click to save changes and close the window.
Procedure 8.32. Cancelling ongoing virtual machine migrations
- Select the migrating virtual machine. It is displayed in the Virtual Machines resource tab with a status of Migrating from.
- Click the button at the top of the results list. Alternatively, right-click on the virtual machine and select Cancel Migration from the context menu.
Example 8.1. Notification in the Events Tab of the Web Admin Portal
Virtual_Machine_Name failed. It will be restarted automatically.
Virtual_Machine_Name was restarted on Host Host_Name
Example 8.2. Notification in the Manager engine.log
/var/log/ovirt-engine/engine.log:
Virtual_Machine_Name, VM Id:Virtual_Machine_ID_Number
- When a host becomes non-operational due to hardware failure.
- When a host is put into maintenance mode for scheduled downtime.
- When a host becomes unavailable because it has lost communication with an external storage resource.
- Power management must be configured for the hosts running the highly available virtual machines.
- The host running the highly available virtual machine must be part of a cluster which has other available hosts.
- The destination host must be running.
- The source and destination host must have access to the data domain on which the virtual machine resides.
- The source and destination host must have access to the same virtual networks and VLANs.
- There must be enough CPUs on the destination host that are not in use to support the virtual machine's requirements.
- There must be enough RAM on the destination host that is not in use to support the virtual machine's requirements.
Note
Procedure 8.33. Configuring a Highly Available Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual server in the results list.
- Click to open the Edit Server Virtual Machine window.
- Click the High Availability tab.
- Select the Highly Available check box to enable high availability for the virtual server.
- Use the radio buttons to set the Priority for Run/Migrate Queue of the virtual machine to one of Low, Medium, or High. When migration is triggered, a queue is created in which the high priority virtual machines are migrated first. If a cluster is running low on resources, only the high priority virtual machines are migrated.
- Click to save changes and close the window.
See Also:
Procedure 8.34. Enabling SAP monitoring for a Virtual Machine from the Administration Portal
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select a virtual machine with a status of
Downin the results list. - Click button to open the Edit Virtual Machine window.
- Select the Custom Properties tab.
- Use the drop-down menu to select
sap_agent. Ensure the secondary drop-down menu is set to True.If previous properties have been set, select the plus sign to add a new property rule and selectsap_agent. - Click to save changes and close the window.
Note
Procedure 8.35. Installing qxl drivers on a virtual machine
- Log in to a Red Hat Enterprise Linux virtual machine.
- Open a terminal.
- Run the following command as root:
#
yum install xorg-x11-drv-qxl
Procedure 8.36. Configuring qxl drivers in GNOME
- Click System.
- Click Administration.
- Click Display.
- Click the Hardware tab.
- Click Video Cards Configure.
- Select qxl and click OK.
- Restart X-Windows by logging out of the virtual machine and logging back in.
Procedure 8.37. Configuring qxl drivers on the command line:
- Back up
/etc/X11/xorg.conf:#
cp /etc/X11/xorg.conf /etc/X11/xorg.conf.$$.backup - Make the following change to the Device section of
/etc/X11/xorg.conf:Section "Device" Identifier "Videocard0" Driver "qxl" Endsection
/etc/X11/xorg.conf file to enable SPICE for your virtual machine's tablet devices.
Procedure 8.38. Configuring a virtual machine's tablet and mouse to use SPICE
- Verify that the tablet device is available on your guest:
#
If there is no output from the command, do not continue configuring the tablet./sbin/lsusb -v | grep 'QEMU USB Tablet' - Back up
/etc/X11/xorg.confby running this command:#
cp /etc/X11/xorg.conf /etc/X11/xorg.conf.$$.backup - Make the following changes to /etc/X11/xorg.conf:
Section "ServerLayout" Identifier "single head configuration" Screen 0 "Screen0" 0 0 InputDevice "Keyboard0" "CoreKeyboard" InputDevice "Tablet" "SendCoreEvents" InputDevice "Mouse" "CorePointer" EndSection Section "InputDevice" Identifier "Mouse" Driver "void" #Option "Device" "/dev/input/mice" #Option "Emulate3Buttons" "yes" EndSection Section "InputDevice" Identifier "Tablet" Driver "evdev" Option "Device" "/dev/input/event2" Option "CorePointer" "true" EndSection
- Log out and log back into the virtual machine to restart X-Windows.
pvclock provides a stable source of timing for KVM guests that support it.
- Clocks can fall out of synchronization with the actual time which invalidates sessions and affects networks.
- Virtual machines with slower clocks may have issues migrating.
Important
ntpd service:
# service ntpd start
# chkconfig ntpd on
ntpd service should minimize the affects of clock skew in all cases.
constant_tsc flag is present. To determine if your CPU has the constant_tsc flag run the following command:
$ cat /proc/cpuinfo | grep constant_tsc
constant_tsc bit. If no output is given follow the instructions below.
Important
constant_tsc bit, disable all power management features (BZ#513138). Each system has several timers it uses to keep time. The TSC is not stable on the host, which is sometimes caused by cpufreq changes, deep C state, or migration to a host with a faster TSC. Deep C sleep states can stop the TSC. To prevent the kernel using deep C states append "processor.max_cstate=1" to the kernel boot options in the grub.conf file on the host:
term Red Hat Enterprise Linux Server (2.6.18-159.el5)
root (hd0,0)
kernel /vmlinuz-2.6.18-159.el5 ro root=/dev/VolGroup00/LogVol00 rhgb quiet processor.max_cstate=1cpufreq (only necessary on hosts without the constant_tsc) by editing the /etc/sysconfig/cpuspeed configuration file and change the MIN_SPEED and MAX_SPEED variables to the highest frequency available. Valid limits can be found in the /sys/devices/system/cpu/cpu*/cpufreq/scaling_available_frequencies files.
rhevm-config tool to recive alerts when hosts drift out of sync.rhevm-config tool to configure alerts when your hosts drift out of sync.
EnableHostTimeDrift and HostTimeDriftInSec. EnableHostTimeDrift, with a default value of false, can be enabled to recieve alert notifications of host time drift. The HostTimeDriftInSec parameter is used to set the maximum allowable drift before alerts start being sent.
Note
ktune package
ktune package provides an interactive Bourne shell script, fix_clock_drift.sh. When run as the superuser, this script inspects various system parameters to determine if the virtual machine on which it is run is susceptible to clock drift under load. If so, it then creates a new grub.conf.kvm file in the /boot/grub/ directory. This file contains a kernel boot line with additional kernel parameters that allow the kernel to account for and prevent significant clock drift on the KVM virtual machine. After running fix_clock_drift.sh as the superuser, and once the script has created the grub.conf.kvm file, then the virtual machine's current grub.conf file should be backed up manually by the system administrator, the new grub.conf.kvm file should be manually inspected to ensure that it is identical to grub.conf with the exception of the additional boot line parameters, the grub.conf.kvm file should finally be renamed grub.conf, and the virtual machine should be rebooted.
| Red Hat Enterprise Linux | Additional virtual machine kernel parameters |
|---|---|
| 5.4 AMD64/Intel 64 with the para-virtualized clock | Additional parameters are not required |
| 5.4 AMD64/Intel 64 without the para-virtualized clock | notsc lpj=n |
| 5.4 x86 with the para-virtualized clock | Additional parameters are not required |
| 5.4 x86 without the para-virtualized clock | clocksource=acpi_pm lpj=n |
| 5.3 AMD64/Intel 64 | notsc |
| 5.3 x86 | clocksource=acpi_pm |
| 4.8 AMD64/Intel 64 | notsc |
| 4.8 x86 | clock=pmtmr |
| 3.9 AMD64/Intel 64 | Additional parameters are not required |
| 3.9 x86 | Additional parameters are not required |
boot.ini file:
/use pmtimer
See Also:
Note
- 9.2.1. Creating a Template from an Existing Virtual Machine
- 9.2.2. Explanation of Settings and Controls in the New Template Window
- 9.2.3. Editing a Resource
- 9.2.4. Explanation of Settings and Controls in the Edit Template Window
- 9.2.5. Deleting a Template
- 9.2.6. Exporting Templates
- 9.2.7. Importing Templates
Procedure 9.1. Creating a Template from an Existing Virtual Machine
- Use the Virtual Machines resource tab, tree mode, or the search function to find and select the virtual machine in the results list.
- Ensure that the virtual machine is powered down and has a status of
Down. - Click to open the New Template window.
- Enter the Name and Description of the template.
- Select the Host Cluster and storage Target from the drop-down menus; by default, these are set the same as the source virtual machine.
- The Allow all users to access this Template check box is selected by default, which makes it public.
- Click to create the template. The virtual machine displays a status of
Image Lockedwhile the template is being created; this may take up to an hour, depending on the virtual machine disk image size and your storage hardware.
Note
See Also:
Table 9.1. New and Edit Template Properties
|
Field
|
Description/Action
|
|---|---|
Name
|
The name of the template. This text field has a 40-character limit and must be a unique name with any combination of uppercase and lowercase letters, numbers, hyphens, and underscores.
|
Description
|
The description of the template. This field is recommended but not mandatory.
|
Host Cluster
|
The cluster with which the template will be associated. This is the same as the original virtual machines by default; you can select from any cluster in the data center.
|
Target
|
The storage domain with which the template will be associated. This is the same as the original virtual machines by default; you can select from any storage domain in the data center.
|
Allow all users to access the Template
|
A public template can be accessed by all users.
A private template can only be accessed by TemplateAdmin and the SuperUser.
|
Procedure 9.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Table 9.2. Edit Template Window
|
Field Name
|
Description
|
|---|---|
|
Data Center
|
The data center to which the virtual machine is attached.
|
|
Host Cluster
|
The name of the host cluster to which the virtual machine is attached. It can be hosted on any physical machine in the cluster depending on the policy rules.
|
|
Name
|
The name of virtual machine. Names must not contain any spaces, and must contain at least one character from A-Z. The maximum length of a virtual machine name is 15 characters.
|
|
Description
|
A meaningful description of the new virtual machine.
|
|
Memory Size
|
The amount of memory assigned to the virtual machine. When allocating memory, consider the processing and storage needs of the applications that are intended to run on the virtual machine.
Maximum guest memory is constrained by the selected guest architecture and the cluster compatibility level.
|
|
Total Virtual CPUs
|
The processing power allocated to the virtual machine as CPU Cores. Do not assign more cores to a virtual machine than are present on the physical host.
|
|
Cores per Virtual Socket
|
The number of cores assigned to each virtual socket.
|
|
Virtual Sockets
|
The number of CPU sockets for the virtual machine. Do not assign more sockets to a virtual machine than are present on the physical host.
|
|
Operating System
|
The operating system. Valid values include a range of Red Hat Enterprise Linux and Windows variants.
|
|
Stateless (Desktop only)
|
Select this check box if the virtual machine is to run in stateless mode. The stateless mode is used primarily for desktop virtual machines. Running a stateless desktop or server creates a new COW layer on the virtual machine hard disk image where new and changed data is stored. Shutting down the stateless virtual machine deletes the new COW layer, returning the virtual machine to its original state. This type of virtual machine is useful when creating virtual machines that need to be used for a short time, or by temporary staff.
|
Warning
Procedure 9.3. Deleting a Template
- Use the resource tabs, tree mode, or the search function to find and select the template in the results list.
- Click to open the Remove Template(s) window.
- Click to remove the template.
Procedure 9.4. Exporting Individual Templates to the Export Domain
- Use the Templates resource tab, tree mode, or the search function to find and select the template in the results list.
- Click to open the Export Template window.
Note
Select the Force Override check box to replace any earlier version of the template on the export domain. - Click to begin exporting the template; this may take up to an hour, depending on the virtual machine disk image size and your storage hardware.
- Repeat these steps until the export domain contains all the templates to migrate before you start the import process.Use the Storage resource tab, tree mode, or the search function to find and select the export domain in the results list and click the Template Import tab in the details pane to view all exported templates in the export domain.
Prerequisites:
Procedure 9.5. Importing a Template into a Data Center
- Use the resource tabs, tree mode, or the search function to find and select the newly attached export domain in the results list.
- Select the Template Import tab of the details pane to display the templates that migrated across with the export domain.
- Select a template and click to open the Import Template(s) window.
- Select the templates to import.
- Use the drop-down menus to select the Destination Cluster and Storage domain. Alter the Suffix if applicable.Alternatively, clear the Clone All Templates check box.
- Click OK to import templates and open a notification window. Click to close the notification window.
Procedure 9.6. Sealing a Linux Virtual Machine
- Log in to the virtual machine. Flag the system for re-configuration by running the following command as root:
# touch /.unconfigured - Remove ssh host keys. Run:
# rm -rf /etc/ssh/ssh_host_* - Set
HOSTNAME=localhost.localdomainin/etc/sysconfig/network - Remove /etc/udev/rules.d/70-*. Run:
# rm -rf /etc/udev/rules.d/70-* - Remove the
HWADDR=line from/etc/sysconfig/network-scripts/ifcfg-eth*. - Optionally delete all the logs from
/var/logand build logs from/root. - Shut down the virtual machine. Run:
# poweroff
Important
Sysprep process, verify the following settings are configured:
- The Windows Sysprep parameters have been correctly defined.If not, click and enter the required information in the Operating System and Domain fields.
- The correct product key has been entered in the
rhevm-configconfiguration tool.If not, run the configuration tool on the Manager as the root user, and enter the required information. The configuration keys that you need to set areProductKeyandSysPrepPath. For example, the Windows 7 configuration value isProductKeyWindow7andSysPrepWindows7Path. Set these values with this command:# rhevm-config --set ProductKeyWindow7=<validproductkey> --cver=general
Note
Procedure 9.7. Sealing a Windows XP Template
- Download
sysprepto the virtual machine to be used as a template.The Windows XP Sysprep tool is available at http://www.microsoft.com/download/en/details.aspx?id=11282 - Create a new directory:
c:\sysprep. - Open the
deploy.cabfile and add its contents toc:\sysprep. - Execute
sysprep.exefrom within the folder and click on the welcome message to display the Sysprep tool. - Select the following check boxes:
- Don't reset grace period for activation
- Use Mini-Setup
- Ensure that the shutdown mode is set to
Shut downand click . - Acknowledge the pop-up window to complete the sealing process; the virtual machine shuts down automatically upon completion.
Procedure 9.8. Sealing a Windows 7 or Windows 2008 Template
- In the virtual machine to be used as a template, open a command line terminal and type
regedit. - The Registry Editor window opens. On the left pane, expand → → .
- On the main window, right-click to add a new string value using → .
- Right-click on the file and select Modify to open the Edit String window.
- Enter the following information in the provided fields:
- Value name:
UnattendFile - Value data:
a:\sysprep.inf
- Launch Sysprep from
C:\Windows\System32\sysprep\sysprep.exe. - Enter the following information into the Sysprep tool:
- Under System Cleanup Action, select Enter System Out-of-Box-Experience (OOBE).
- Select the Generalize check box if you need to change the computer's system identification number (SID).
- Under Shutdown Options, select Shutdown.
Click to complete the sealing process; the virtual machine shuts down automatically upon completion.
- Create, edit, export, and remove associated templates; and
- import and export templates.
Note
Table 9.3. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| TemplateAdmin | Can perform all operations on templates. | Has privileges to create, delete and configure templates' storage domains and network details, and to move templates between domains. |
| NetworkAdmin | Network Administrator | Can configure and manage networks attached to templates. |
Table 9.4. Red Hat Enterprise Virtualization Template User Roles
| Role | Privileges | Notes |
|---|---|---|
| TemplateCreator | Can create, edit, manage and remove virtual machine templates within assigned resources. | The TemplateCreator role is not applied to a specific template; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers, clusters, or storage domains. |
| TemplateOwner | Can edit and delete the template, assign and manage user permissions for the template. | The TemplateOwner role is automatically assigned to the user who creates a template. Other users who do not have TemplateOwner permissions on a template cannot view or use the template. |
| UserTemplateBasedVm | Can use the template to create virtual machines. | Cannot edit template properties. |
| NetworkUser | Logical network and network interface user for templates. | If the Allow all users to use this Network option was selected when a logical network is created, NetworkUser permissions are assigned to all users for the logical network. Users can then attach or detach template network interfaces to or from the logical network. |
Procedure 9.9. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 9.10. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Note
Procedure 10.1. Creating a Virtual Machine Pool
- In flat mode, click the Pools resource tab to display a list of virtual machine pools.
- Click the button to open the New Pool window.
- Use the drop-down menus to select the Data Center and Host Cluster.
- Enter the Name, Description, and Number of VMs for the pool.
- If applicable, use the drop-down menu to select a template.
- Enter the Memory Size to be used for each virtual machine in the pool and the Total Virtual CPUs.
- If applicable, click the Advanced Parameters expansion button and use the drop-down menus to select the Cores per Virtual Socket and Virtual Sockets.
- Use the drop-down menu to select the Operating System to be used for the virtual machines in the pool.
- In the Pool tab, select one of the following pool types:
- Manual - The administrator is responsible for explicitly returning the virtual machine to the pool. The virtual machine reverts to the original base image after the administrator returns it to the pool.
- Automatic - When the virtual machine is shut down, it automatically reverts to its base image and is returned to the virtual machine pool.
- The Initial Run, Console, Host, Resource Allocation, Boot Options, and Custom Properties tabs are not mandatory but define options for your pool. These tabs feature identical settings and controls as the New Virtual Machines window.
- Click to create the pool.
See Also:
Procedure 10.2. Editing a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click to open the Edit window.
- Change the necessary properties and click .
Prerequisites:
Procedure 10.3. Prestarting Virtual Machines in a Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Click to open the Edit Pool window.
- Enter the number of virtual machines to be prestarted in the Prestarted VMs field.
- Select the Pool tab. Ensure that the Pool Type is set to Automatic.
- Click .
Procedure 10.4. Adding Virtual Machines to a Virtual Machine Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Click to open the Edit Pool window.
- Enter the number of additional virtual machines to add in the Increase number of VMs in pool by field.
- Click .The total number of virtual machines in the pool has increased.
Procedure 10.5. Detaching Virtual Machines from a Virtual Machine Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Ensure the virtual machine has a status of
Downas you cannot detach a running virtual machine.Click the Virtual Machines tab in the details pane to list the virtual machines in the pool. - Select the virtual machine that you want to remove and click to open the Detach Virtual Machine(s) confirmation window.
- Click to detach the virtual machine from the pool.
Note
The virtual machine still exists in the environment and can be viewed and accessed from the Virtual Machines resource tab. Note that the icon changes to denote that the detached virtual machine is an independent virtual machine.
Procedure 10.6. Removing a Virtual Machine Pool
- Use the Pools resource tab, tree mode, or the search function to find and select the virtual machine pool in the results list.
- Click to open the Remove Pool(s) confirmation window.
- Click to remove the pool.
- Create, edit, and remove pools; and
- Add and detach virtual machines from the pool.
Note
Table 10.1. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| VmPoolAdmin | System Administrator role of a virtual pool. | Can create, delete, and configure a virtual pool, assign and remove virtual pool users, and perform basic operations on a virtual machine. |
| ClusterAdmin | Cluster Administrator | Can use, create, delete, manage all virtual machine pools in a specific cluster. |
Procedure 10.7. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 10.8. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
- 11.1. Understanding Virtual Machine Storage
- 11.2. Understanding Virtual Disks
- 11.3. Shareable Disks in Red Hat Enterprise Virtualization
- 11.4. Creating Unassociated Virtual Machine Hard Disks
- 11.5. Explanation of Settings in the New Virtual Machine Disk and Edit Virtual Machine Disk Windows
- 11.6. Moving a Virtual Machine Hard Disk Between Data Domains
- 11.7. Virtual Disks and Permissions
kpartx, vgscan, vgchange and mount to investigate the virtual machine's processes or problems.
- PreallocatedA preallocated virtual disk has reserved storage of the same size as the virtual disk itself. The backing storage device (file/block device) is presented as is to the virtual machine with no additional layering in between. This results in better performance because no storage allocation is required during runtime.On SAN (iSCSI, FCP) this is achieved by creating a block device with the same size as the virtual disk. On NFS this is achieved by filling the backing hard disk image file with zeros. Preallocating storage on an NFS storage domain presumes that the backing storage is not Qcow2 formatted and zeroes will not be deduplicated in the hard disk image file. (If these assumptions are incorrect, do not select Preallocated for NFS virtual disks).
- Thin ProvisionedFor sparse virtual disks backing storage is not reserved and is allocated as needed during runtime. This allows for storage over commitment under the assumption that most disks are not fully utilized and storage capacity can be utilized better. This requires the backing storage to monitor write requests and can cause some performance issues. On NFS backing storage is achieved simply by using files. On SAN this is achieved by creating a block device smaller than the virtual disk's defined size and communicating with the hypervisor to monitor necessary allocations. This does not require support from the underlying storage devices.
Table 11.1. Permitted Storage Combinations
| Storage | Format | Type | Note |
|---|---|---|---|
| NFS or iSCSI/FCP | RAW or Qcow2 | Sparse or Preallocated | |
| NFS | RAW | Preallocated | A file with an initial size which equals the amount of storage defined for the virtual disk, and has no formatting. |
| NFS | RAW | Sparse | A file with an initial size which is close to zero, and has no formatting. |
| NFS | Qcow2 | Sparse | A file with an initial size which is close to zero, and has RAW formatting. Subsequent layers will be Qcow2 formatted. |
| SAN | RAW | Preallocated | A block device with an initial size which equals the amount of storage defined for the virtual disk, and has no formatting. |
| SAN | Qcow2 | Preallocated | A block device with an initial size which equals the amount of storage defined for the virtual disk, and has Qcow2 formatting. |
| SAN | Qcow2 | Sparse | A block device with an initial size which is much smaller than the size defined for the VDisk (currently 1GB), and has Qcow2 formatting for which space is allocated as needed (currently in 1GB increments). |
Procedure 11.1. Creating Unassociated Virtual Machine Hard Disks
- Select the Disks resource tab.
- Click to open the Add Virtual Disk window.
- Use the radio buttons to select Internal or External(Direct Lun).
- Enter the Size(GB), Alias, and Description of the virtual disk.
- Use the drop-down menus to select the Interface, Format, Data Center, and Storage Domain of the virtual disk.
- Select the appropriate check boxes to wipe the disk after delete, make the disk bootable, and make the disk shareable.
- Click OK to create the virtual disk and close the window.
Table 11.2. Add a disk settings: Internal
|
Field Name
|
Description
|
|---|---|
Size(GB)
|
Size of new virtual disk in GB.
|
Alias
|
The name of the template, limited to 40 characters.
|
Description
|
Optionally describe the new virtual disk.
|
Interface
|
The virtual interface the disk presents to virtual machines. VirtIO is faster but requires VirtIO drivers. Red Hat Enterprise Linux 5 and higher includes VirtIO drivers. Windows does not include VirtIO drivers, but they can be installed from the guest tools ISO or virtual floppy disk. IDE devices do not require special drivers.
|
Format
|
The provisioning policy for the new virtual disk. Preallocated allots the entire size of the disk on the data domain at creation time. Thin provision starts at 1 GB and sets a maximum limit on the size the disk can grow to. Preallocated disks take more time to create than thin provisioned ones, but have better read and write performance. Preallocated is the recommended format for server disks. Thin provisioned disks are faster to create and allow for storage over-commitment. Thin provisioned is the recommended format for desktop disks.
|
Data Center
|
The data center in which this disk is available.
|
Storage Domain
|
The data domain that the disk is stored on.
|
Wipe after delete
|
Enhanced security for deletion of sensitive material when the disk is deleted.
|
Is bootable
|
Sets the bootable flag on the disk.
|
Is shareable
|
This disk can be attached to more than one virtual machine at a time.
|
Size(GB) and some additional entries.
Table 11.3. Add a disk settings: External(Direct LUN)
|
Field Name
|
Description
|
|---|---|
Use Host
|
The host to use to mount the LUN.
|
Storage Type
|
Type of external LUN to add. Either iSCSI or Fibre Channel targets are allowed.
|
Discover Targets
|
Can be expanded when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
Address
|
The hostname or IP address of the target server. The
Address field is visible when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
Port
|
The port that has been opened on the target server. The default is 3260. The
Port field is visible when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
User Authentication
|
The iSCSI server requires User Authentication.The
User Authentication field is visible when you are using iSCSI external LUNs and Targets > LUNs is selected.
|
CHAP username and password
|
The username and password of a user with permission to login to LUNs. The
CHAP username and password fields are accessible when you are using password protected iSCSI external LUNs and Targets > LUNs is selected.
|
Fill in all the fields correctly and your external LUNs are displayed to be used as virtual disks.
- Live storage migration of direct LUN hard disk images is not supported.
- Direct LUN disks are not included in virtual machine exports.
- Direct LUN disks are not included in virtual machine snapshots.
Procedure 11.2. Moving a Virtual Machine Hard Disk Between Data Domains
- Select the Disks resource tab.
- Select the virtual disk or disks to move.
- Click Move to open the Move Disk(s) window.
- Use the drop-down menu or menus to select the Target data domain.
- Click to move the disks and close the window.
Locked status while being moved. Upon completion, the virtual disk has been moved from the source domain to the target domain.
- Create, edit, and remove virtual disks associated with a virtual machine or other resources; and
- Edit user permissions for virtual disks.
Note
Table 11.4. Red Hat Enterprise Virtualization System Administrator Roles
| Role | Privileges | Notes |
|---|---|---|
| DiskOperator | Virtual disk user. | Can use, view and edit virtual disks. Inherits permissions to use the virtual machine to which the virtual disk is attached. |
| DiskCreator | Can create, edit, manage and remove virtual machine disks within assigned clusters or data centers. | This role is not applied to a specific virtual disk; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers, clusters, or storage domains. |
Procedure 11.3. Assigning a Role to a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Click to open the Add Permission to User window.
- Enter the name or user name of an existing user into the Search text box and click . Select a user from the resulting list of possible matches.
- Select a role from the Role to Assign: drop-down menu.
- Click to assign the role and close the window.
Procedure 11.4. Removing a Role from a Resource
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
- Select the user to remove from the resource.
- Click . The Remove Permission window opens to confirm permissions removal.
- Click to remove the user role.
Table of Contents
- 12. Users and Roles
- 13. Quotas
- 13.1. Introduction to Quota
- 13.2. Shared Quota and Individually-defined Quota
- 13.3. Quota Accounting
- 13.4. Enabling and Changing a Quota Mode in a Data Center
- 13.5. Creating a New Quota Policy
- 13.6. Explanation of Quota Threshold Settings
- 13.7. Assigning a Quota to an Object
- 13.8. Using Quota to Limit Resources by User
- 13.9. Editing Quotas
- 13.10. Removing Quotas
- 14. Event Notifications
- 15. Utilities
- 15.1. Managing Domains with the Domain Management Tool
- 15.2. Editing the Configuration of the Red Hat Virtualization Manager with the Configuration Tool
- 15.3. Uploading Virtual Machine Images with the Image Uploader Tool
- 15.4. Editing USB Filters with the USB Filter Editor
- 15.5. Collecting Logs with the Log Collector Tool
- 15.6. Uploading ISO Files with the ISO Uploader Tool
- 15.7. Guest Drivers and Agents
- 16. Log Files
- 17. Updating the Red Hat Enterprise Virtualization Environment
- 18. Backups
admin user which resides in the internal domain created during installation.
User roles and admin roles can be assigned to Red Hat Enterprise Virtualization Manager users for individual resources like virtual machines and hosts, or on a hierarchy of objects like clusters and data centers.
admin. This account is intended for use when initially configuring the environment, and for troubleshooting. To add other users to Red Hat Enterprise Virtualization you will need to attach a directory server to the Manager using the Domain Management Tool, rhevm-manage-domains.
user@domain. Attachment of more than one directory server to the Manager is also supported.
- Active Directory;
- Identity Management (IdM); and
- Red Hat Directory Server 9 (RHDS 9).
- A valid pointer record (PTR) for the directory server's reverse look-up address.
- A valid service record (SRV) for LDAP over TCP port
389. - A valid service record (SRV) for Kerberos over TCP port
88. - A valid service record (SRV) for Kerberos over UDP port
88.
rhevm-manage-domains.
- Active Directory - http://technet.microsoft.com/en-us/windowsserver/dd448614.
- Identity Management (IdM) - http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/index.html
- Red Hat Directory Server (RHDS) - http://docs.redhat.com/docs/en-US/Red_Hat_Directory_Server/index.html
Important
Important
Important
sysprep in the creation of Templates and Virtual Machines, then the Red Hat Enterprise Virtualization administrative user must be delegated control over the Domain to:
- Join a computer to the domain
- Modify the membership of a group
Note
- Configure the
memberOfplug-in for RHDS to allow group membership. In particular ensure that the value of thememberofgroupattrattribute of thememberOfplug-in is set touniqueMember.Consult the Red Hat Directory Server 9.0 Plug-in Guide for more information on configuring thememberOfplug-in. - Define the directory server as a service of the form
ldap/in the Kerberos realm. Replacehostname@REALMNAMEhostnamewith the fully qualified domain name associated with the directory server andREALMNAMEwith the fully qualified Kerberos realm name. The Kerberos realm name must be specified in capital letters. - Generate a
keytabfile for the directory server in the Kerberos realm. Thekeytabfile contains pairs of Kerberos principals and their associated encrypted keys. These keys will allow the directory server to authenticate itself with the Kerberos realm.Consult the documentation for your Kerberos principle for more information on generating akeytabfile. - Install the
keytabfile on the directory server. Then configure RHDS to recognize thekeytabfile and accept Kerberos authentication using GSSAPI.Consult the Red Hat Directory Server 9.0 Administration Guide for more information on configuring RHDS to use an externalkeytabfile. - Test the configuration on the directory server by using the
kinitcommand to authenticate as a user defined in the Kerberos realm. Once authenticated run theldapsearchcommand against the directory server. Use the-Y GSSAPIparameters to ensure the use of Kerberos for authentication.
- The user performing the action
- The type of action being performed
- The object on which the action is being performed
user must have the appropriate permission for the object being acted upon. Each type of action corresponds to a permission. There are many different permissions in the system, so for simplicity:
Important
- Administrator Role: Allows access to the Administration Portal for managing physical and virtual resources. An administrator role does not confer any permissions for the User Portal.
- User Role: Allows access to the User Portal for managing and accessing virtual machines and templates. A user role does not confer any permissions for the Administration Portal.
administrator role on a cluster, you can manage all virtual machines in the cluster using the Administration Portal. However, you cannot access any of these virtual machines in the User Portal; this requires a user role.
See Also:
Table 12.1. Red Hat Enterprise Virtualization User Roles - Basic
| Role | Privileges | Notes |
|---|---|---|
| UserRole | Can access and use virtual machines and pools. | Can log in to the User Portal, use assigned virtual machines and pools, view virtual machine state and details. |
| PowerUserRole | Can create and manage virtual machines and templates. | Apply this role to a user for the whole environment with the Configure window, or for specific data centers or clusters. For example, if a PowerUserRole is applied on a data center level, the PowerUser can create virtual machines and templates in the data center. |
| UserVmManager | System administrator of a virtual machine. | Can manage virtual machines, create and use snapshots, and migrate virtual machines. A user who creates a virtual machine in the User Portal is automatically assigned the UserVmManager role on the machine. |
Note
Table 12.2. Red Hat Enterprise Virtualization User Roles - Advanced
| Role | Privileges | Notes |
|---|---|---|
| UserTemplateBasedVm | Limited privileges to only use Templates. | Can use templates to create virtual machines. |
| DiskOperator | Virtual disk user. | Can use, view and edit virtual disks. Inherits permissions to use the virtual machine to which the virtual disk is attached. |
| VmCreator | Can create virtual machines in the User Portal. | This role is not applied to a specific virtual machine; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers or clusters. When applying this role to a cluster, you must also apply the DiskCreator role on an entire data center, or on specific storage domains. |
| TemplateCreator | Can create, edit, manage and remove virtual machine templates within assigned resources. | This role is not applied to a specific template; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers, clusters, or storage domains. |
| DiskCreator | Can create, edit, manage and remove virtual machine disks within assigned clusters or data centers. | This role is not applied to a specific virtual disk; apply this role to a user for the whole environment with the Configure window. Alternatively apply this role for specific data centers or storage domains. |
| TemplateOwner | Can edit and delete the template, assign and manage user permissions for the template. | This role is automatically assigned to the user who creates a template. Other users who do not have TemplateOwner permissions on a template cannot view or use the template. |
| NetworkUser | Logical network and network interface user for virtual machine and template. | Can attach or detach network interfaces from specific logical networks. |
Table 12.3. Red Hat Enterprise Virtualization System Administrator Roles - Basic
| Role | Privileges | Notes |
|---|---|---|
| SuperUser | System Administrator of the Red Hat Enterprise Virtualization environment. | Has full permissions across all objects and levels, can manage all objects across all data centers. |
| ClusterAdmin | Cluster Administrator. | Can use, create, delete, manage all resources in a cluster, including hosts, templates and virtual machines. |
| DataCenterAdmin | Data Center Administrator. | Can use, create, delete, manage all resources in a data center, including clusters, hosts, templates and virtual machines. |
Important
Table 12.4. Red Hat Enterprise Virtualization System Administrator Roles - Advanced
| Role | Privileges | Notes |
|---|---|---|
| TemplateAdmin | Administrator of a virtual machine template. | Can create, delete, and configure the storage domains and network details of templates, and move templates between domains. |
| StorageAdmin | Storage Administrator. | Can create, delete, configure, and manage an assigned storage domain. |
| HostAdmin | Host Administrator. | Can attach, remove, configure, and manage a specific host. |
| NetworkAdmin | Network Administrator. | Can configure and manage the network of a particular data center or cluster. A network administrator of a data center or cluster inherits network permissions for virtual pools within the cluster. |
| VmPoolAdmin | System Administrator of a virtual pool. | Can create, delete, and configure a virtual pool; assign and remove virtual pool users; and perform basic operations on a virtual machine in the pool. |
| GlusterAdmin | Gluster Storage Administrator. | Can create, delete, configure, and manage Gluster storage volumes. |
Procedure 12.1. Adding Users to Red Hat Enterprise Virtualization
- Click the Users tab to display the list of authorized users.
- Click . The Add Users and Groups window opens.
- In the Search drop down menu, select the appropriate domain. Enter a name or part of a name in the search text field, and click . Alternatively, click to view a list of all users and groups.
- Select the check boxes for the appropriate users or groups.
- Click .
Procedure 12.2. Viewing User Information
- Click the Users tab to display the list of authorized users.
- Select the user, or perform a search if the user is not visible on the results list.
- The details pane displays for the selected user, usually with the General tab displaying general information, such as the domain name, email and status of the user.
- The other tabs allow you to view groups, permissions, quotas, and events for the user.For example, to view the groups to which the user belongs, click the Directory Groups tab.
Procedure 12.3. Viewing User Permissions on Resources
- Use the resource tabs, tree mode, or the search function to find and select the resource in the results list.
- Click the Permissions tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.
Procedure 12.4. Removing Users
- Select the user to be removed. Ensure the user is not running any virtual machines.
- Click the button. A message displays prompting you to confirm the removal. Click .
Procedure 12.5. Creating a New Role
- On the header bar, click the Configure button to open the Configure window. The window shows a list of default User and Administrator roles, and any custom roles.
- Click New. The New Role dialog box displays.
- Enter the Name and Description of the new role.
- Select either Admin or User as the Account Type.
- Use the or buttons to view more or fewer of the permissions for the listed objects in the Check Boxes to Allow Action list. You can also expand or collapse the options for each object.
- For each of the objects, select or deselect the actions you wish to permit or deny for the role you are setting up.
- Click to apply the changes you have made. The new role displays on the list of roles.
Procedure 12.6. Editing or Copying a Role
- On the header bar, click the Configure button to open the Configure window. The window shows a list of default User and Administrator roles, and any custom roles.
- Select the role you wish to change. Click Edit to open the Edit Role window, or click Copy to open the Copy Role window.
- If necessary, edit the Name and Description of the role.
- Use the or buttons to view more or fewer of the permissions for the listed objects. You can also expand or collapse the options for each object.
- For each of the objects, select or deselect the actions you wish to permit or deny for the role you are editing.
- Click to apply the changes you have made.
Example 12.1. Cluster Permissions
cluster called Accounts. She is assigned the ClusterAdmin role on the accounts cluster. This enables her to manage all virtual machines in the cluster, since the virtual machines are child objects of the cluster. Managing the virtual machines includes editing, adding, or removing virtual resources such as disks, and taking snapshots. It does not allow her to manage any resources outside this cluster. Because ClusterAdmin is an administrator role, it allows her to use the Administration Portal to manage these resources, but does not give her any access via the User Portal.
Example 12.2. VM PowerUser Permissions
johndesktop for him. John is assigned the UserVmManager role on the johndesktop virtual machine. This allows him to access this single virtual machine using the User Portal. Because he has UserVmManager permissions, he can modify the virtual machine and add resources to it, such as new virtual disks. Because UserVmManager is a user role, it does not allow him to use the Administration Portal.
Example 12.3. Data Center Power User Role Permissions
PowerUserRole permissions for the data center in which her new virtual machine will reside. This is because to create a new virtual machine, she needs to make changes to several components within the data center, including creating the virtual machine disk image in the storage domain.
DataCenterAdmin privileges to Penelope. As a PowerUser for a data center, Penelope can log in to the User Portal and perform virtual machine-specific actions on virtual machines within the data center. She cannot perform data center-level operations such as attaching hosts or storage to a data center.
Example 12.4. Network Administrator Permissions
NetworkAdmin privileges on the IT department's data center, she can add and remove networks in the data center, and attach and detach networks for all virtual machines belonging to the data center.
NetworkUser permissions and UserVmManager permissions for the virtual machines used by the internal training department. With these permissions, Pat can perform simple administrative tasks such as adding network interfaces onto virtual machines in the Power User Portal. However, he does not have permissions to alter the networks for the hosts on which the virtual machines run, or the networks on the data center to which the virtual machines belong.
Example 12.5. Custom Role Permissions
The custom role shown above allows manipulation of users, permissions and roles. These actions are organized under
System - the top level object of the hierarchy shown in Figure 12.7, “UserManager Custom Role”. This means they apply to all other objects in the system. The role is set to have an Account Type of Admin. This means that when she is assigned this role, Rachel can only use the Administration Portal, not the User Portal.
- 13.1. Introduction to Quota
- 13.2. Shared Quota and Individually-defined Quota
- 13.3. Quota Accounting
- 13.4. Enabling and Changing a Quota Mode in a Data Center
- 13.5. Creating a New Quota Policy
- 13.6. Explanation of Quota Threshold Settings
- 13.7. Assigning a Quota to an Object
- 13.8. Using Quota to Limit Resources by User
- 13.9. Editing Quotas
- 13.10. Removing Quotas
Table 13.1. The Two Different Kinds of Quota
| Quota type | Definition |
|---|---|
| Run-time Quota | This quota limits the consumption of run time resources, like CPU and memory. |
| Storage Quota | This quota limits the amount of storage available. |
Table 13.2. Quota Modes
| Quota Mode | Function |
|---|---|
| Enforced | This mode puts into effect the Quota that you have set in audit mode, limiting resources to the group or user affected by the quota. |
| Audit | This mode allows you to change Quota settings. Choose this mode to increase or decrease the amount of run-time quota and the amount of storage quota available to users affected by it. |
| Disabled | This mode turns off the run-time and storage limitations defined by the quota. |
Important
Example 13.1. Accounting example
Procedure 13.1. Enabling and Changing Quota in a Data Center
- Click the Data Centers tab in the Navigation Pane.
- From the list of data centers displayed in the Navigation Pane, choose the data center whose quota policy you plan to edit.
- Click in the top left of the Navigation Pane.
- An Edit Data Center window opens. In the Quota Mode drop-down, change the quota mode to Enforced.
- Click the OK button.
Procedure 13.2. Creating a New Quota Policy
- In tree mode, select the data center. The Quota tab appears in the Navigation Pane.
- Click the Quota tab in the Navigation Pane.
- Click in the Navigation Pane. The New Quota window opens.
- Fill in the Name field with a meaningful name.Fill in the Description field with a meaningful name.
- In the Memory & CPU section of the New Quota window, use the green slider to set Cluster Threshold.
- In the Memory & CPU section of the New Quota window, use the blue slider to set Cluster Grace.
- Click on the bottom-right of the Memory & CPU field. An Edit Quota window opens.
- Under the Memory field, select either the Unlimited radio button (to allow limitless use of Memory resources in the cluster), or select the limit to radio button to set the amount of memory set by this quota. If you select the limit to radio button, input a memory quota in megabytes (MB) in the MB field.
- Under the CPU field, select either the Unlimited radio button or the limit to radio button to set the amount of CPU set by this quota. If you select the limit to radio button, input a number of vCPUs in the vCpus field.
- Click in the Edit Quota window.
- In the Storage section of the New Quota window, use the green slider to set Storage Threshold.
- In the Storage section of the New Quota window, use the blue slider to set Storage Grace.
- Click in the Storage field. The Edit Quota window opens.
- Under the Storage Quota field, select either the Unlimited radio button (to allow limitless use of Storage) or the limit to radio button to set the amount of storage to which quota will limit users. If you select the limit to radio button, input a storage quota size in gigabytes (GB) in the GB field.
- Click in the Edit Quota window. You are returned to the New Quota window.
- Click in the New Quota window.
See Also:
Table 13.3. Quota thresholds and grace
| Setting | Definition |
|---|---|
| Cluster Threshold | The amount of cluster resources available per data center. |
| Cluster Grace | The amount of the cluster available for the data center after exhausting the data center's Cluster Threshold. |
| Storage Threshold | The amount of storage resources available per data center. |
| Storage Grace | The amount of storage available for the data center after exhausting the data center's Storage Threshold. |
Prerequisites:
Procedure 13.3. Assigning a Quota to a Virtual Machine
- In the navigation pane, select the Virtual Machine to which you plan to add a quota.
- Click . The Edit Desktop Virtual Machine window appears.
- Select the quota you want the virtual machine to consume. Use the Quota drop-down to do this.
- Click .
Procedure 13.4. Assigning a Quota to a Virtual Disk
- In the navigation pane, select the Virtual Machine whose disk(s) you plan to add a quota.
- In the details pane, select the disk you plan to associate with a quota.
- Click . The Edit Virtual Disk window appears.
- Select the quota you want the virtual disk to consume.
- Click .
Important
Prerequisites:
Procedure 13.5. Assigning a User to a Quota
- In the tree, click the Data Center with the quota you want to associate with a User.
- Click the Quota tab in the navigation pane.
- Select the target quota in the list in the navigation pane.
- Click the tab in the details pane.
- Click at the top of the details pane.
- In the Search field, type the name of the user you want to associate with the quota.
- Click .
- Select the check box at the left side of the row containing the name of the target user.
- Click in the bottom right of the Assign Users and Groups to Quota window.
Procedure 13.6. Editing Quotas
- On the tree pane, click on the data center whose quota you want to edit.
- Click on the Quota tab in the Navigation Pane.
- Click the name of the quota you want to edit.
- Click Edit in the Navigation pane.
- An Edit Quota window opens. If required, enter a meaningful name in the Name field.
- If required, you can enter a meaningful description in the Description field.
- Select either the All Clusters radio button or the Specific Clusters radio button. Move the Cluster Threshold and Cluster Grace sliders to the desired positions on the Memory & CPU slider.
- Select either the All Storage Domains radio button or the Specific Storage Domains radio button. Move the Cluster Threshold and Cluster Grace sliders to the desired positions on the Memory & CPU slider.
- Click in the Edit Quota window to confirm the new quota settings.
Procedure 13.7. Removing Quotas
- On the tree pane, click on the data center whose quota you want to edit.
- Click on the Quota tab in the Navigation Pane.
- Click the name of the quota you want to remove.
- Click at the top of the Navigation pane, under the row of tabs.
- Click in the Remove Quota(s) window to confirm the removal of this quota.
Procedure 14.1. Configuring Event Notifications
- Ensure that you have set up the MTA agent with the appropriate variables.
- Use the Users resource tab, tree mode, or the search function to find and select the user.
- Click the Event Notifier tab in the details pane to list events for which the user will be notified. This list will be blank if the user does not have event notification configured.
- Click to open the Add Event Notification window.
- Use the button, or the subject-specific expansion buttons, to view the events.
- Select the appropriate check boxes.
- Enter an email address in the Mail Recipient: field.
- Click to save changes and close the window.
- Add and start the engine-notifierd service on the Red Hat Enterprise Virtualization Manager. This activates the changes you have just made:
# chkconfig --add engine-notifierd# chkconfig engine-notifierd on# service engine-notifierd restart
/etc/rhevm/notifier/notifier.conf.
Table 14.1. notifier.conf variables
| Variable name | Default | Remarks |
|---|---|---|
| INTERVAL_IN_SECONDS | 120 | The interval in seconds between instances of dispatching messages to subscribers. |
| MAIL_SERVER | none | The SMTP mail server address. Required. |
| MAIL_PORT | 25 | The default port of a non-secured SMTP server is 25. The default port of a secured SMTP server (one with SSL enabled) is 465. |
| MAIL_USER | none | If SSL is enabled to authenticate the user, then this variable must be set. This variable is also used to specify the "from" user address when the MAIL_FROM variable is not set. Some mail servers do not support this functionality. The address is in RFC822 format. |
| MAIL_PASSWORD | none | This variable is required to authenticate the user if the mail server requires authentication or if SSL is enabled. |
| MAIL_ENABLE_SSL | false | This indicates whether SSL should be used to communicate with the mail server. |
| HTML_MESSAGE_FORMAT | false | The mail server sends messages in HTML format if this variable is set to "true". |
| MAIL_FROM | none | This variable specifies a "from" address in RFC822 format, if supported by the mail server. |
| MAIL_REPLY_TO | none | This variable specifies "reply-to" addresses in RFC822 format on sent mail, if supported by the mail server. |
| DAYS_TO_KEEP_HISTORY | none | This variable sets the number of days dispatched events will be preserved in the history table. If this variable is not set, events remain on the history table indefinitely. |
Procedure 14.2. Canceling Event Notifications
- In the Users tab, select the user or the user group.
- Select the Event Notifier tab in the details pane to list events for which the user receives notifications.
- Click to open the Add Event Notification window.
- Use the button, or the subject-specific expansion buttons, to view the events.
- Clear the appropriate check boxes to remove notification for that event.
- Click to save changes and close the window.
- 15.1. Managing Domains with the Domain Management Tool
- 15.2. Editing the Configuration of the Red Hat Virtualization Manager with the Configuration Tool
- 15.3. Uploading Virtual Machine Images with the Image Uploader Tool
- 15.4. Editing USB Filters with the USB Filter Editor
- 15.5. Collecting Logs with the Log Collector Tool
- 15.6. Uploading ISO Files with the ISO Uploader Tool
- 15.7. Guest Drivers and Agents
- 15.1.1. What is the Domain Management Tool?
- 15.1.2. Syntax for the Domain Management Tool
- 15.1.3. Using the Domain Management Tool
- 15.1.4. Adding Domains to Configuration
- 15.1.5. Editing a Domain in the Configuration
- 15.1.6. Deleting a Domain from the Configuration
- 15.1.7. Validating Domain Configuration
- 15.1.8. Listing Domains in Configuration
- 15.1.9. Getting a Configuration Value
- 15.1.10. Setting a Configuration Value
admin user to add the directory service that the users must be authenticated against. You add and remove directory services domains using the included domain management tool, rhevm-manage-domains.
rhevm-manage-domains command is only accessible on the machine on which Red Hat Enterprise Virtualization Manager is installed. The rhevm-manage-domains command must be run as the root user.
rhevm-manage-domains -action=ACTION [options]add- Add a domain to Red Hat Enterprise Virtualization Manager's directory services configuration.
edit- Edit a domain in Red Hat Enterprise Virtualization Manager's directory services configuration.
delete- Delete a domain from Red Hat Enterprise Virtualization Manager's directory services configuration.
validate- Validate Red Hat Enterprise Virtualization Manager's directory services configuration. This command attempts to authenticate each domain in the configuration using the configured user name and password.
list- List Red Hat Enterprise Virtualization Manager's current directory services configuration.
-domain=DOMAIN- Specifies the domain on which the action will be performed. The
-domainparameter is mandatory foradd,edit, anddelete. -provider=PROVIDER- Specifies the LDAP provider type of the directory server for the domain. Valid values are:
ActiveDirectory- Active Directory.IPA- Identity Management (IdM).RHDS- Red Hat Directory Server. Red Hat Directory Server does not come with Kerberos. Red Hat Enterprise Virtualization requires Kerberos authentication. RHDS must be made a service within a Kerberos domain to provide directory services to the Manager.Note
If you want to use RHDS as your directory server, you must have thememberofplugin installed in RHDS. To use thememberofplugin, your users must beinetusers. For more information about using thememberofplugin, see the Red Hat Directory Server Plug-in Guide.
-user=USER- Specifies the domain user to use. The
-userparameter is mandatory foradd, and optional foredit. -passwordFile=FILE- Specifies that the domain user's password is on the first line of the provided file. This option, or the
-interactiveoption, must be used to provide the password for use with theaddaction. -addPermissions- Specifies that the domain user will be given the SuperUser role in Red Hat Enterprise Virtualization Manager. By default, if the
-addPermissionsparameter is not specified, the SuperUser role is not assigned to the domain user. The-addPermissionsoption is optional. It is only valid when used in combination with theaddandeditactions. -interactive- Specifies that the domain user's password is to be provided interactively. This option, or the
-passwordFileoption, must be used to provide the password for use with theaddaction. -configFile=FILE- Specifies an alternate configuration file that the command must load. The
-configFileparameter is always optional. -report- In conjunction with the
validateaction results in the output of a report of all encountered validation errors.
rhevm-manage-domains command's help output:
# rhevm-manage-domains --help
rhevm-manage-domains command to perform basic manipulation of the Red Hat Enterprise Virtualization Manager domain configuration.
rhevm-manage-domains command is used to add the IdM domain directory.demo.redhat.com to the Red Hat Enterprise Virtualization Manager configuration. The configuration is set to use the admin user when querying the domain; the password is provided interactively.
Example 15.1. rhevm-manage-domains Add Action
# rhevm-manage-domains -action=add -domain=directory.demo.redhat.com -provider=IPA -user=admin -interactive loaded template kr5.conf file setting default_tkt_enctypes setting realms setting domain realm success User guid is: 80b71bae-98a1-11e0-8f20-525400866c73 Successfully added domain directory.demo.redhat.com. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart).
rhevm-manage-domains command is used to edit the directory.demo.redhat.com domain in the Red Hat Enterprise Virtualization Manager configuration. The configuration is updated to use the admin user when querying this domain; the password is provided interactively.
Example 15.2. rhevm-manage-domains Edit Action
# rhevm-manage-domains -action=edit -domain=directory.demo.redhat.com -user=admin -interactive loaded template kr5.conf file setting default_tkt_enctypes setting realms setting domain realmo success User guide is: 80b71bae-98a1-11e0-8f20-525400866c73 Successfully edited domain directory.demo.redhat.com. oVirt Engine restart is required in order for the changes to take place (service ovirt-engine restart).
rhevm-manage-domains command is used to remove the directory.demo.redhat.com domain from the Red Hat Enterprise Virtualization Manager configuration. Users defined in the removed domain will no longer be able to authenticate with the Red Hat Enterprise Virtualization Manager. The entries for the affected users will remain defined in the Red Hat Enterprise Virtualization Manager until they are explicitly removed.
admin user from the internal domain will be able to log in until another domain is added.
Example 15.3. rhevm-manage-domains Delete Action
# rhevm-manage-domains -action=delete -domain='directory.demo.redhat.com' WARNING: Domain directory.demo.redhat.com is the last domain in the configuration. After deleting it you will have to either add another domain, or to use the internal admin user in order to login. Successfully deleted domain directory.demo.redhat.com. Please remove all users and groups of this domain using the Administration portal or the API.
rhevm-manage-domains command is used to validate the Red Hat Enterprise Virtualization Manager configuration. The command attempts to log into each listed domain with the credentials provided in the configuration. The domain is reported as valid if the attempt is successful.
Example 15.4. rhevm-manage-domains Validate Action
# rhevm-manage-domains -action=validate User guide is: 80b71bae-98a1-11e0-8f20-525400866c73 Domain directory.demo.redhat.com is valid.
rhevm-manage-domains command is used to list the domains defined in the Red Hat Enterprise Virtualization Manager configuration. For each configuration entry the command displays the domain, the user name — in User Principle Name (UPN) format — and whether the domain is local or remote.
Example 15.5. rhevm-manage-domains List Action
# rhevm-manage-domains -action=list
Domain: directory.demo.redhat.com
User name: admin@DIRECTORY.DEMO.REDHAT.COM
This domain is a remote domain.
Example 15.6. Retrieving the Value of the SearchResultsLimit Key
# rhevm-config --get=SearchResultsLimit --cver=general
100
rhevm-config.
- list all available configuration keys,
- list all available configuration values,
- retrieve the value of a specific configuration key, and
- set the value of a specific configuration key.
--cver parameter to specify the configuration version to be used when retrieving or setting a value for a configuration key. The default configuration version is general.
rhevm-config command:
# rhevm-config --helpCommon tasks
- List available configuration keys
- Use the
--listparameter to list available configuration keys.#
rhevm-config--listEach available configuration key is listed by name and description. - List available configuration values
- Use the
--allparameter to list available configuration values.#
rhevm-config--allEach available configuration key is listed by name, current value of the key, and the configuration version. - Retrieve value of configuration key
- Use the
--getparameter to retrieve the value of a specific key.#
rhevm-config--getKEY_NAMEReplaceKEY_NAMEwith the name of the specific key to retrieve the key name, value, and the configuration version. Use the--cverparameter to specify the configuration version of the value to be retrieved. - Set value of configuration key
- Use the
--setparameter to set the value of a specific key. You must also set the configuration version to which the change is to apply using the--cverparameter.#
rhevm-config--setKEY_NAME=KEY_VALUE--cver=VERSIONReplaceKEY_NAMEwith the name of the specific key to set; replaceKEY_VALUEwith the value to be set. Environments with more than one configuration version require theVERSIONto be specified.
admin@internal user account is automatically created upon installation of the Red Hat Enterprise Virtualization Manager. This account is stored locally in the Red Hat Enterprise Virtualization Manager's PostgreSQL database, separate from external directory services such as IdM or Active Directory. Unlike external directory domains, users cannot be added or deleted from the internal domain. The admin@internal user is the SuperUser of the Red Hat Enterprise Virtualization Manager and has administrative privileges over the environment via the Administration Portal.
admin@internal user is set during the installation of the Red Hat Enterprise Virtualization Manager. Use the rhevm-config utility if you need to reset the password.
- Log in to the Red Hat Enterprise Virtualization Manager server as the
rootuser. - Use the rhevm-config utility to set a new password for the
admin@internaluser.# rhevm-config -s AdminPassword=interactiveUse escape characters if your password includes any special characters. - Restart the ovirt-engine service for the changes to take effect.
# service ovirt-engine restart
Example 15.8. Getting a Configuration Value
# rhevm-config --get=SearchResultsLimit --cver=general
100
Example 15.9. Setting a Configuration Value
# rhevm-config --set SearchResultsLimit=50 --cver=general
Table 15.1. Red Hat Enterprise Virtualization Manager Configuration Options, Explanations, Limitations, and Best Practices
| Option Name | Description | Possible values | Recommended (default) values | Comments |
|---|---|---|---|---|
| AsyncTaskPollingRate | Async Task Polling Rate (in seconds) | Integer | 10 | How often (in seconds) RHEV-M queries the status of an async task currently running. |
| AsyncTaskZombieTaskLifeInMinutes | Zombie tasks lifetime in minutes | Integer | 3000 | How long (in minutes) a task is allowed to run before assuming it has become a zombie and should be killed. The value affects large storage manipulations especially. When using slow storage and large virtual images, or when a task is known to take longer than 3000 minutes (50 hours), the value should be increased. |
| AuditLogAgingThreshold | Audit Log Aging Threshold (in days) | Integer | 30 | How long an audit log is kept before being rotated. |
| AuditLogCleanupTime | Time to check for Audit Log cleanup | Time | 03:35:35 | At what time the Audit Log is checked for Aging and cleaned up. |
| AuthenticationMethod | Authentication Method used by RHEV-M | String | LDAP | The API used for querying users. Currently LDAP is the only supported value. |
| BlockMigrationOnSwapUsagePercentage | Host swap percentage threshold (for scheduling) | Integer | 0 | The maximum percentage of swap space on the host that a VM run or migration is allowed to consume on the host. If the host is swapping beyond this percentage, a VM will not migrate over and will not be started. |
| BootstrapMinimalVdsmVersion | Minimum VDSM version | String | 4.9 | The minimum version of VDSM that is acceptable when adding hosts to the Engine. Newer versions have more features. |
| CABaseDirectory | CA Base Directory | String | /etc/pki/ovirt-engine | Where the RHEV-M Certificate Authority is located on the RHEV-M host. |
| CertificateFileName | Certificate File Name | String | /etc/pki/ovirt-engine/certs/engine.cer | Points to the certificate file used by RHEV-M for SSL/TLS communication with VDSM. |
| CpuOverCommitDurationMinutes | The duration in minutes of CPU consumption to activate selection algorithm | Integer | 2 | When the cluster policy is set to Even Distribution, wait for this amount of minutes after detecting CPU overcommit before triggering virtual machine migrations to rebalance the host load. This configuration value applies only for the default. |
| DisableFenceAtStartupInSec | Disable Fence Operations At RHEV-M Startup in Seconds | Integer | 300 | Allow this amount of seconds after RHEV-M starts to detect hosts, before assuming the hosts are non-responsive and proceed to fence hosts. This value should be increased when RHEV-M is on a machine that has slow network startup (a VMWare guest, for example). |
| EmulatedMachine | Supported machine types | String | RHEL 6.2.0: v3.0 RHEL 6.3.0: v3.1 RHEL 6.4.0: v3.2 | |
| WANDisableEffects | Disabled WAN Effects value to send to the SPICE console | StringMultiple | animation |
The list of effects which will be disabled for SPICE. Possible values: animation, wallpaper, font-smooth, and all.
|
| WANColorDepth | WAN Color Depth value to send to the SPICE console | Integer | 16 |
The color depth used by the SPICE. Possible values are 16 and 32.
|
| EnableSpiceRootCertificateValidation | Enable Spice Root Certification Validation | String | true | If 'true', the certificate of the host on which the virtual machine is running and the RHEV-M setup CA certificate are sent to the SPICE client when attempting to connect to the virtual machine with SPICE, as an extra security mechanism. |
| EnableUSBAsDefault | Enable USB devices attachment to the virtual machine by default | String | true | - |
| EnableVdsLoadBalancing | Enables Host Load Balancing system | String | true | This config value allows the user to turn on or off (true and false, respectively) the virtual machine load balancing according to the policy configured for the cluster. |
| FreeSpaceCriticalLowInGB | Critical low disk space alert threshold (in GB) | Integer | 5 | Produces an alert when a Storage Domain has this amount of space left. This setting is also used in various preliminary tests for action sanity when users try to use storage domains, to prevent reaching this critical amount. Adding and importing disks will fail if the amount of space is less than the value specified here. |
| FreeSpaceLow | Limit of percentage of free disk space below which it is considered low | Integer | 10 | When a storage domain has this percentage of space left, it is considered low on disk space. |
| HighUtilizationForEvenlyDistribute | High Utilization Limit For Evenly Distribute selection algorithm | Integer | 75 | Maximum number of virtual machines per host in the Evenly Distribute algorithm. |
| HighUtilizationForPowerSave | High Utilization Limit For Power Save selection algorithm | Integer | 75 | A default for newly created clusters, in use with PowerSave load balancing algorithm, marks the higher limit of host utilization for populating hosts. |
| LDAPQueryTimeout | Read Timeout in seconds for LDAP queries | Integer | 30 | The amount of time an LDAP query will read before the query is stopped. |
| LDAPOperationTimeout | Search timeout at LDAP server side | Integer | 30 | The amount of time an LDAP search will operate before it is stopped. |
| LDAPConnectTimeout | Connect timeout in seconds for LDAP queries | Integer | 30 | The amount of time an LDAP query will connect before it is stopped. |
| LocalAdminPassword | Local Administrator Password | Password | Populated during initial setup |
The password for admin@local default user.
|
| LogPhysicalMemoryThresholdInMB | Threshold for logging low host memory in MB | Integer | 1024 | The minimum amount of RAM left before a host is considered low on memory. If a host's RAM is lower than this setting, it is recorded on the audit log and no action is taken. |
| LowUtilizationForEvenlyDistribute | Low Utilization Limit for Evenly Distribute selection algorithm | Integer | 0 | Minimum number of virtual machines per host in the Evenly Distribute algorithm. |
| LowUtilizationForPowerSave | Low Utilization Limit for Power Save selection algorithm | Integer | 20 | A default for newly created clusters, in use with PowerSave load balancing algorithm, marks the lower limit of host utilization for populating hosts. |
| MacPoolRanges | MAC Addresses Pool Ranges | String | 00:1A:4A:23:18:00-00:1A:4A:23:18:FF | The MAC address pool range to be automatically assigned to virtual machines. |
| MaxDiskSize | Max size of newly created disk (in GB) | Integer | 16384 | The maximum size (in GB) for a new virtual disk image assigned to virtual machines. |
| MaxMacsCountInPool | Maximum MAC Addresses count in Pool | Integer | 100000 | Maximum number of MAC addresses allowed in the MAC pool. |
| MaxNumberofHostsInStoragePool | Maximum number of hosts in Storage Pool | Integer | 250 | Limits the maximum number of hosts assigned to the clusters of a single Data Center. This can be increased after testing more hosts, if necessary. |
| MaxNumOfCpuPerSocket | Maximum Number of CPU per socket | Integer | 16 | Maximum number of virtual CPU cores that can be assigned to a single virtual CPU socket. |
| MaxNumOfVMCpus | Total Numbers of Virtual Machine CPUs | Integer | 160 | Maximum total amount of CPU cores assigned to a virtual machine (determined by number of cores multiplied by number of sockets). |
| MaxNumofVmSockets | Maximum number of sockets per virtual machine | Integer | 16 | Maximum number of virtual CPU sockets assigned to a virtual machine. |
| MaxRerunVmOnVdsCount | Maximum virtual machine rerun attempts on a host | Integer | 3 | Maximum number of attempts to start a virtual machine on a host before an error ("unable to start VM") is reported. |
| MaxStorageVdsDelayCheckSec | Max delay for check of domain in seconds | Integer | 5 | Maximum amount of seconds to wait for storage domain status to be returned before reporting an error. |
| MaxStorageVdsTimeoutCheckSec | Maximum timeout for last check of domain in seconds | Integer | 30 | When monitoring storage, vdsmd on the hosts reports a "lastCheck" value for each domain. This setting is used to decide whether the last check happened too long ago and domain is considered in error. |
| MaxVDSMemOverCommit | Max Host Memory Over-Commit (%) for virtual desktops load | Integer | 200 | The percentage of memory overcommit permitted to occur when using virtual desktop loads. |
| MaxVdsMemOverCommitForServers | Maximum Host Memory Over-Commit (%) for Virtual Servers load | Integer | 150 | The percentage of memory overcommit permitted to occur when using virtual server loads. |
| MaxVdsNameLength | Max VDS name length | Integer | 255 | Maximum name length for a Hypervisor host. |
| MaxVmNameLengthNonWindows | Maximum virtual machine name length for non-Windows operating system | Integer | 64 | Maximum name length for a non-Windows virtual machine. |
| MaxVmNameLengthWindows | Maximum name length in Windows | Integer | 15 | Maximum name length for Windows virtual machine (limitation imposed by Windows hostnames). |
| MaxVmsInPool | Max virtual machines in pool | Integer | 1000 | Maximum number of virtual machines in a single data center. |
| VmPoolMaxSubsequentFailures | Maximum number of subsequent VM creation failures before giving up | Integer | 3 | The maximum number of subsequent failed virtual machine creations that can occur in a virtual machine pool before the operation is stopped. |
| NumberofFailedRunsOnVds | Number of Failed Runs on Host | Integer | 3 | Number of attempts to run virtual machines on hosts before setting host status to "Error". |
| NumberOfVmsForTopSizeVms | Number of virtual machines with highest disk size to display | Integer | 10 | Number of virtual machines to display in the storage domain's virtual machine tab. Will display this amount of virtual machines, sorted by the most storage space per used virtual machine. |
| NumberVmRefreshesBeforeSave | Number of Virtual Machine Data Refreshes Before Saving to Database | Integer | 5 | The number of host monitor iterations between refreshing virtual machines from VDSM (determines if virtual machines should be refreshed one upon each iteration) |
| oVirtISOsRepositoryPath | The RHEV-H installation files path | String | /usr/share/rhev-hypervisor | The location of RHEV-H ISO images used for upgrading Hypervisor hosts. |
| ProductKey2003 | Product Key (for Windows 2003) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2003x64 | Product Key (for Windows 2003 x64) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2008 | Product Key (for Windows 2008) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2008R2 | Product Key (for Windows 2008 R2) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey2008x64 | Product Key (for Windows 2008 x64) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKey | Product Key (for Windows XP) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKeyWindow7 | Product Key (for Windows 7) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductKeyWindow7x64 | Product Key (for Windows 7 x64) | String | - | Windows serial key to be used with sysprepped virtual machines created from a template. |
| ProductRPMVersion | Red Hat Enterprise Virtualization Manger RPM Version | String | Automatically populated | The PRM version of the currently used rhevm package. |
| RDPLoginWithFQN | Connect to RDP console with Fully Qualified User-Name (user@domain) | String | true | - |
| SANWipeAfterDelete | Initializing disk image is more secure but it can be time consuming and I/O intensive depending on the size of the image | String | false | Represents the default value (checked/unchecked) of the "wipe after delete" check box in the "New Virtual Disk" dialog if the newly-created Disk belongs to a SAN (FC/iSCSI) Data Center (i.e. about to be created on a SAN storage domain). |
| SearchResultsLimit | Max Quantity of Search Results | Integer | 100 | The number of results to return for search queries if no specific figure is given in the web administration portal or REST. |
| ServerRebootTimeout | Host Reboot Timeout (in seconds) | Integer | 300 |
Wait this amount of seconds when a host is rebooted or fenced, before determining that the host is Non Responsive. Can be increased for hosts that take longer to reboot.
|
| SpiceProxyDefault | The address of the SPICE Proxy. | String | none | When this key is set to a value, the SPICE proxy is activated (turned on). When this key is not set to a value, the SPICE proxy is not activated (turned off). |
| SpiceReleaseCursorKeys | Keyboard keys combination that causes the mouse cursor to be released from its grab on SPICE | String | Shift+F12 | - |
| SpiceSecureChannels | SPICE Secure Channels | String | smain, sinputs, scursor, splayback, srecord, sdisplay, susbredir, ssmartcard | Which SPICE channels should be secured with SSL. |
| SpiceToggleFullScreenKeys | Keyboard keys combination that toggles the full-screen state of SPICE client window | String | Shift+F11 | - |
| SpiceUsbAutoShare | Enable USB devices sharing by default in SPICE | String | true | Represents the default value (checked/unchecked) of the "Enable USB Auto-Share" check box in the SPICE Console Options dialog in the User Portal. |
| SpmCommandFailOverRetries | Number of retries to failover the Storage Pool Manager on failed commands | Integer | 3 | Number of SPM selection failover retries. In case an SPM command fails, backend performs a failover - it selects a new SPM and re-runs the command. |
| SPMFailOverAttempts | Number of attempts to connect to the Storage Pool Manager before Failover | Integer | 3 | When monitoring a Storage Pool, if the current SPM fails, failover does not happen immediately (see description of SpmCommandFailOverRetries). This setting defines the number of retries before deciding that the current SPM is down and a failover is required. |
| SpmVCpuConsumption | The CPI consumption of SPM embodied as number of VCPUs on the Host | Integer | 1 | When a host is the SPM, it is considered to be using this amount of extra virtual CPUs, to make up for the overhead that SPM operations generate. |
| SSHInactivityTimeoutSeconds | SSH Inactivity Timeout (in seconds) | Integer | 600 | The maximum amount of time backend allows for an SSH session to remote hosts. After this timeout the session is killed. |
| SSHInactivityHardTimoutSeconds | SSH Inactivity Hard Timeout (in seconds) | Integer | - | |
| NumberOfUSBSlots | Number of USB slots in VMs with native USB support | Integer | 4 | - |
| SSLEnabled | SPICE SSL Enabled | String | true | Whether SPICE Secure channels should be SSL encrypted. |
| StorageDomainFailureTimeoutInMinutes | Storage Domain failure timeout | Integer | 5 | Defines the amount of time taken before deciding domain is problematic, starting at the first failure reported by VDSM (in minutes). |
| StoragePoolRefreshTimeInSeconds | Storage Pool Manager Polling Rate (in seconds) | Integer | 10 | Storage Pool monitoring frequency. |
| SysPrep2K3Path | Path to a Windows 2003 machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.2k3 | Path to the operating system specific sysprep file template. |
| SysPrep2K8Path | Path to a Windows 2008 machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.2k8x86 | Path to the operating system specific sysprep file template. |
| SysPrep2K8R2Path | Path to a Windows 2008 R2 machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.2k8 | Path to the operating system specific sysprep file template. |
| SysPrep2K8x64Path | Path to a Windows 2008 machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.2k8 | Path to the operating system specific sysprep file template. |
| SysPrepWindows7Path | Path to a Windows 7 machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.w7 | Path to the operating system specific sysprep file template. |
| SysPrepWindows7x64Path | Path to a Windows 7 x64 machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.w7x64 | Path to the operating system specific sysprep file template. |
| SysPrepWindows8Path | Path to a Windows 8 machine Sys-Prep file | String | /etc/ovirt-engine/sysprep/sysprep.w8 | Path to the operating system specific sysprep file template. |
| SysPrepWindows8x64Path | Path to a Windows 8 x64 machine Sys-Prep file | String | /etc/ovirt-engine/sysprep/sysprep.w8x64 | Path to the operating system specific sysprep file template. |
| SysPrepWindows2012x64Path | Path to a Windows 2012 x64 machine Sys-Prep file | String | /etc/ovirt-engine/sysprep/sysprep.2k12x64 | Path to the operating system specific sysprep file template. |
| SysPrepXPPath | Path to a Windows XP machine sysprep file | string | /etc/ovirt-engine/sysprep/sysprep.xp | Path to the operating system specific sysprep file template. |
| TimeoutToResetVdsInSeconds | Communication timeout in seconds before attempting reset | Integer | 60 |
The amount of time a host is nonresponsive before a fence command is issued. This is used in conjunction with VDSAttemptsToResetCount.
|
| TimeToReduceFailedRunOnVdsInMinutes | Time to Reduce Failed Run on Host (in minutes) | Integer | 30 | The amount of time that the host will be in Error status after failing to run virtual machines. |
| UserDefinedVMProperties | User-defined virtual machine properties | String | Custom properties set by user | Mostly used with VDSM hooks. |
| UserRefreshRate | Refresh Rate of Users' Data from Active Directory (in seconds) | Integer | 3600 | How often the directory server is polled for user account updates. |
| UtilizationThresholdInPercent | The Utilization Threshold (in percent) | Integer | 80 | In load balancing, this is a default value used to calculate the maximum CPU limit to determine if the host is over-utilized. This is the percent of the value that the user set in high-utilization in the cluster. |
| ValidNumOfMonitors | Valid Numbers of Monitors | Integer | 1,2,4 | Number of monitors available for SPICE-enabled virtual machines. |
| VdcVersion | Red Hat Enterprise Virtualization Manager Version | String | Automatically set to the current version of RHEV-M | - |
| VDSAttemptstoResetCount | Number of attempts to communicate with Host before trying to reset | Integer | 2 |
The amount of times to retry communications with a host before a fence command is issued. Used in conjunction with TimeoutToResetVdsInSeconds.
|
| VdsLoadBalancingIntervalInMinutes | Host Load Balancing Interval (in minutes) | Integer | 1 | The interval between running the virtual machines' load balancer in minutes (also defines the first invocation of the load balancer). |
| VdsRecoveryTimeoutInMinutes | Host Timeout when Recovering (in minutes) | Integer | 3 | When VDSM fails/restarts, it can sometimes be in recovering mode (VDSM reports "initializing" or "recovering from reports"). |
| VdsRefreshRate | Time interval in seconds to poll a Host's status | Integer | 2 | How often a Hypervisor host's status is checked. |
| vdsTimeout | Host Control Communication Timeout (in seconds) | Integer | 180 | Timeout for a VDSM call - the time engine will wait for sync call to VDSM. |
| VMGracefulShutdownMessage | Message displayed in Virtual Machine when Virtual Machine is being shut down from Red Hat Enterprise Virtualization Manager | String | The Red Hat Enterprise Virtualization Manager is shutting down this Virtual Machine | - |
| VMMinMemorySizeInMB | Minimal memory size of virtual machine in MB | Integer | 256 | - |
| VncKeyboardLayout | Keyboard Layout configuration for VNC | String | en-us | Possible values: ar, da, de-ch, en-us, et, fo, fr-be, fr-ch, hu, it, li, mk, nl, no, pt, ru, sv, tr, de en-gb, es, fi, fr, fr-ca, hr, is, ja, lv, nl-be, pl, pt-br, sl, th. |
| WaitForVdsInitInSec | Wait for a host to complete init in SPM selection | Integer | 60 |
This is a timeout for initializing host as in VdsRecoveryTimeoutInMinutes, but this timeout is shorter and is used during the SPM selection algorithm. If the selected host is initialized, wait for it to recover.
|
| FenceQuietTimeBetweenOperationsInSec | Quiet time between Power Management operations in seconds | Integer | 180 | The minimum time in seconds between two power management operations activated manually by a user. |
| MaxAuditLogMessageLength | Maximum length of an Audit Log message | Integer | 10000 | - |
| SysPrepDefaultUser | Default sysprep user name | String | - | This user is used if the domain for sysprep is unknown or no domain is specified. |
| SysPrepDefaultPassword | Default SysPrep user password | Password | Empty | This password is used if the domain for sysprep is unknown or no domain is specified. |
| UserSessionTimeOutInterval | Session timeout interval in minutes | Integer | 30 | User session timeout. Global for all types of access - User Portal/Admin Portal/Web Admin/API. |
| AdminPassword | admin user password | Password | ****** | Password of admin user (used if no directory service is used for authentication). |
| IPTablesConfig | Iptables configuration used to autoconfigure the Manager. | String | The complete set of iptables rules that are used when automatic firewall configuration is selected during rhevm-setup | |
| OvirtIsoPrefix | oVirt ISOs files prefix | String | rhevh | |
| OvirtInitialSupportedIsoVersion | oVirt node initial Supported ISO Version | String | 5.8 | |
| VdsLocalDisksLowFreeSpace | Amount of free disk space on a host local storage domain that should be considered low, in MB. | Integer | 1000 | Setting this value lower than the default of 1000MB reduces the time available to add additional space to your data domains before virtual machine performance is affected. If you have many virtual machines, generating or recieving data, it may make sense to set this value higher. |
| VdsLocalDisksCriticallyLowFreeSpace | Amount of free disk space on a host local storage domain that should be considered critically low, in MB. | Integer | 500 | Setting this value lower than the default of 500MB reduces the time between when critical disk shortage messages begin being displayed and when virtual machine performance is affected. If you have many virtual machines, generating or receiving data quickly, you might find that the default value is too low, and does not provide enough time to add more storage. |
| AllowDuplicateMacAddresses | Enable duplicate MAC address for VM network interface | String | false | If enabled, allows that the same MAC address be set explicitly on several virtual NICs. Otherwise, setting a MAC address that is already in use on another virtual NIC is prohibited. |
| JobCleanupRateInMinutes | Frequency of jobs clean-up process | Integer | 10 | |
| SucceededJobCleanupTimeInMinutes | Time to keep successfully ended jobs | Integer | 10 | |
| FailedJobCleanupTimeInMinutes | Time to keep failed jobs | Integer | 60 | |
| VmPoolMonitorIntervalInMinutes | Interval in minutes for monitoring number of Prestarted Vms in Vm Pools | Integer | 5 | |
| VmPoolMonitorBatchSize | Maximum number of Vms that the Vm Pool Monitor will attempt to Prestart in a single cycle | Integer | 5 | |
| NetworkConnectivityCheckTimeoutInSeconds | The time to wait before rolling back network changes in case the engine losses connectivity with the host in seconds | Integer | 120 | |
| AllowClusterWithVirtGlusterEnabled | Allows to create a Cluster with both Virt and Gluster services enabled | String | false | If enabled, the user can create a cluster with both Virt and Gluster support or one of them, otherwise the user cannot create a cluster that supports both. |
| EnableMACAntiSpoofingFilterRules | Indicates if Network Filtering should be enabled or not | String | v3.0: false v3.1: false v3.2: true | If enabled, MAC anti-spoofing rules are set on each virtual NIC, enforcing that the ethernet frames this NIC sends have the source MAC that is assigned to it in the engine. |
| EnableHostTimeDrift | Indicates if host time-drift validation is enabled | String | false | If time drift validation is enabled, the Manager will require that host system time be within a given variation of the Manager system time. The allowed difference is set by HostTimeDriftInSec |
| EngineMode | Engine working mode | String | Active | |
| HostTimeDriftInSec | Allowed time drift between any Host and Engine | Integer | 300 |
|-- images | |-- [Image Group UUID] | |--- [Image UUID (this is the disk image)] | |--- [Image UUID (this is the disk image)].meta |-- master | |---vms | |--- [UUID] | |--- [UUID].ovf
rhevm-image-uploader[options]listrhevm-image-uploader[options]upload[file].[file]...[file]
list and upload.
- The
listparameter lists the valid export storage domains available for image uploads. - The
uploadparameter uploads selected image file(s) to the specified image storage domain.
list or upload parameter be included for basic usage. The upload parameter requires a minimum of one local file name to upload.
rhevm-image-uploader command. You can set defaults for any of these in the /etc/ovirt-engine/imageuploader.conf file.
General Options
-h,--help- Displays command usage information and returns to prompt.
--conf-file=PATH- Sets
PATHas the configuration file the tool is to use. The default isetc/ovirt-engine/imageuploader.conf. --log-file=PATH- Sets
PATHas the specific file name the command should use for the log output. --quiet- Sets quiet mode, reducing console output to a minimum. Quiet mode is off by default.
-v,--verbose- Sets verbose mode, providing more console output. Verbose mode is off by default.
-f,--force- Force mode is necessary when the source file being uploaded has an identical file name as an existing file at the destination; it forces the existing file to be overwritten. Force mode is off by default.
Red Hat Enterprise Virtualization Manager Options
-u,USER--user=USER- Sets the user associated with the file to be uploaded. The
USERis specified in the formatuser@domain, whereuseris the user name anddomainis the directory services domain in use. The user must exist in directory services and be known to the Red Hat Enterprise Virtualization Manager. -r,FQDN--rhevm=FQDN- Sets the fully qualified domain name of the Red Hat Enterprise Virtualization Manager server from which to upload images, where
FQDNis replaced by the fully qualified domain name of the Manager. It is assumed that the image uploader is being run on the same client machine as the Red Hat Enterprise Virtualization Manager; the default value islocalhost:443.
Export Storage Domain Options
-e,--export-domain=EXPORT_DOMAIN- Sets the storage domain
EXPORT_DOMAINas the destination for uploads. -n,--nfs-server=NFSSERVER- Sets the NFS path
NFSSERVERas the destination for uploads. -i,--ovf-id- Use this option if you do not want to update the UUID of the image. By default, the tool will generate a new UUID for the image. This ensures that there is no conflict between the id of the incoming image and those already in the environment.
-d,-disk-instance-id- Use this option if you do not want to rename the instance ID for each disk (i.e. InstanceId) in the image. By default, this tool will generate new UUIDs for disks within the image to be imported. This ensures that there are no conflicts between the disks on the imported image and those within the environment.
-m,--mac-address- Use this option if you do not want to remove the network components from the image that will be imported. By default, this tool will remove any network interface cards from the image to prevent conflicts with network cards on other virtual machines within the environment. Once the image has been imported, use the Administration Portal to add network interface cards back and the Manager will ensure that there are no MAC address conflicts.
-N,NEW_IMAGE_NAME--name=NEW_IMAGE_NAME- Supply this option if you want to rename the image.
rhevm-image-uploader tool.
Procedure 15.1. Creating an OVF Archive That is Compatible with the Image Uploader
- Use the Manager to create an empty export domain. An empty export domain makes it easy to see which directory contains your virtual machine.
- Export your virtual machine to the empty export domain you just created.
- Log in to the storage server that serves as the export domain, find the root of the NFS share and change to the subdirectory under that mount point. You started with a new export domain, there is only one directory under the exported directory. It contains the
images/andmaster/directories. - Run the
tar -zcvf my.ovf images/ master/command to create the tar/gzip ovf archive. - Anyone you give the resulting ovf file to (in this example, called
my.ovf) can import it to Red Hat Enterprise Virtualization Manager using therhevm-image-uploadercommand.
rhevm-image-uploader command to upload your image into their Red Hat Enterprise Virtualization environment.
rhevm-image-uploader to list storage domains:
Example 15.10. Uploading a file Using the rhevm-image-uploader Tool
# rhevm-image-uploader list Please provide the REST API username for RHEV-M: admin@internal Please provide the REST API password for the admin@internal RHEV-M user: ********** Export Storage Domain Name | Datacenter | Export Domain Status myexportdom | Myowndc | active
-n NFSSERVER) or export domain (-e EXPORT_STORAGE_DOMAIN) and the name of the .ovf file:
# rhevm-image-uploader -e myexportdom upload myrhel6.ovf Please provide the REST API username for RHEV-M: admin@internal Please provide the REST API password for the admin@internal RHEV-M user: **********
usbfilter.txt policy file. The policy rules defined in this file allow or deny the pass-through of specific USB devices from client machines to virtual machines managed using the Red Hat Enterprise Virtualization Manager. The policy file resides on the Red Hat Enterprise Virtualization Manager in the following location:
/etc/ovirt-engine/usbfilter.txt
ovirt-engine service on the Red Hat Enterprise Virtualization Manager server is restarted.
USBFilterEditor.msi file from the Red Hat Enterprise Virtualization Manager (version.number x86_64) channel of the Red Hat Network.
Note
Procedure 15.2. Installing the USB Filter Editor
- On a Windows machine, launch the
USBFilterEditor.msiinstaller obtained from Red Hat Network. - Follow the steps of the installation wizard. Unless otherwise specified, the USB Filter Editor will be installed by default in either
C:\Program Files\RedHat\USB Filter EditororC:\Program Files(x86)\RedHat\USB Filter Editordepending on your version of Windows. - A USB Filter Editor shortcut icon is created on your desktop.
Important
Table 15.2. USB Editor Fields
| Name | Description |
|---|---|
| Class | Type of USB device; for example, printers, mass storage controllers. |
| Vendor | The manufacturer of the selected type of device. |
| Product | The specific USB device model. |
| Revision | The revision of the product. |
| Action | Allow or block the specified device. |
Procedure 15.3. Adding a USB Policy
- Click the button. The Edit USB Criteria window opens:
- Use the USB Class, Vendor ID, Product ID, and Revision check boxes and lists to specify the device.Click the button to permit virtual machines use of the USB device; click the button to prohibit the USB device from virtual machines.Click to add the selected filter rule to the list and close the window.
Example 15.11. Adding a Device
The following is an example of how to add USB ClassSmartcard, deviceEP-1427X-2 Ethernet Adapter, from manufacturerAcer Communications & Multimediato the list of allowed devices.
- Click → to save the changes.
Procedure 15.4. Removing a USB Policy
- Click . A message displays prompting you to confirm that you want to remove the policy.
- Click to confirm that you want to remove the policy.
- Click → to save the changes.
Procedure 15.5. Searching for USB Device Policies
- Select the device and click or as appropriate. Double-click the selected device to close the window. A policy rule for the device is added to the list.
- Use the Up and Down buttons to change the position of the new policy rule in the list.
- Click → to save the changes.
ovirt-engine service.
Procedure 15.6. Exporting a USB Policy
- Click ; the window opens.
- Save the file with a file name of
usbfilter.txt. - Using a Secure Copy client, such as WinSCP, upload the
usbfilter.txtfile to the server running Red Hat Enterprise Virtualization Manager. The file must be placed in the following directory on the server:/etc/ovirt-engine/ - As the
rootuser on the server running Red Hat Enterprise Virtualization Manager, restart theovirt-engineservice.# service ovirt-engine restart
Procedure 15.7. Importing a USB Policy
- Using a Secure Copy client, such as WinSCP, upload the
usbfilter.txtfile to the server running Red Hat Enterprise Virtualization Manager. The file must be placed in the following directory on the server:/etc/ovirt-engine/ - Double-click the USB Filter Editor shortcut icon on your desktop to open the editor.
- Click to open the window.
- Open the
usbfilter.txtfile that was downloaded from the server.
rhevm-log-collector. You are required to log in as the root user and provide the administration credentials for the Red Hat Enterprise Virtualization environment. The rhevm-log-collector -h command displays usage information, including a list of all valid options for the rhevm-log-collector command.
rhevm-log-collector[options]list[all, clusters, datacenters]rhevm-log-collector[options]collect
list and collect.
- The
listparameter lists either the hosts, clusters, or data centers attached to the Red Hat Enterprise Virtualization Manager. You are able to filter the log collection based on the listed objects. - The
collectparameter performs log collection from the Red Hat Enterprise Virtualization Manager. The collected logs are placed in an archive file under the/tmp/logcollectordirectory. Therhevm-log-collectorcommand assigns each log a specific file name.
rhevm-log-collector command.
General options
--version- Displays the version number of the command in use and returns to prompt.
-h,--help- Displays command usage information and returns to prompt.
--conf-file=PATH- Sets
PATHas the configuration file the tool is to use. --local-tmp=PATH- Sets
PATHas the directory in which logs are saved. The default directory is/tmp/logcollector. --ticket-number=TICKET- Sets
TICKETas the ticket, or case number, to associate with the SOS report. --upload=FTP_SERVER- Sets
FTP_SERVERas the destination for retrieved logs to be sent using FTP. Do not use this option unless advised to by a Red Hat support representative. --log-file=PATH- Sets
PATHas the specific file name the command should use for the log output. --quiet- Sets quiet mode, reducing console output to a minimum. Quiet mode is off by default.
-v,--verbose- Sets verbose mode, providing more console output. Verbose mode is off by default.
Red Hat Enterprise Virtualization Manager Options
rhevm-log-collector --user=admin@internal --cluster ClusterA,ClusterB --hosts "SalesHost"* specifies the user as admin@internal and limits the log collection to only SalesHost hosts in clusters A and B.
--no-hypervisors- Omits virtualization hosts from the log collection.
-u,USER--user=USER- Sets the user name for login. The
USERis specified in the formatuser@domain, whereuseris the user name anddomainis the directory services domain in use. The user must exist in directory services and be known to the Red Hat Enterprise Virtualization Manager. -r,FQDN--rhevm=FQDN- Sets the fully qualified domain name of the Red Hat Enterprise Virtualization Manager server from which to collect logs, where
FQDNis replaced by the fully qualified domain name of the Manager. It is assumed that the log collector is being run on the same local host as the Red Hat Enterprise Virtualization Manager; the default value islocalhost. -c,CLUSTER--cluster=CLUSTER- Collects logs from the virtualization hosts in the nominated
CLUSTERin addition to logs from the Red Hat Enterprise Virtualization Manager. The cluster(s) for inclusion must be specified in a comma-separated list of cluster names or match patterns. -d,DATACENTER--data-center=DATACENTER- Collects logs from the virtualization hosts in the nominated
DATACENTERin addition to logs from the Red Hat Enterprise Virtualization Manager. The data center(s) for inclusion must be specified in a comma-separated list of data center names or match patterns. -H,HOSTS_LIST--hosts=HOSTS_LIST- Collects logs from the virtualization hosts in the nominated
HOSTS_LISTin addition to logs from the Red Hat Enterprise Virtualization Manager. The hosts for inclusion must be specified in a comma-separated list of host names, fully qualified domain names, or IP addresses. Match patterns are also valid.
SOS Report Options
--jboss-home=JBOSS_HOME- JBoss installation directory path. The default is
/var/lib/jbossas. --java-home=JAVA_HOME- Java installation directory path. The default is
/usr/lib/jvm/java. --jboss-profile=JBOSS_PROFILE- Displays a quoted and space-separated list of server profiles; limits log collection to specified profiles. The default is
'rhevm-slimmed'. --enable-jmx- Enables the collection of run-time metrics from Red Hat Enterprise Virtualization's JBoss JMX interface.
--jboss-user=JBOSS_USER- User with permissions to invoke JBoss JMX. The default is
admin. --jboss-logsize=LOG_SIZE- Maximum size in MB for the retrieved log files.
--jboss-stdjar=STATE- Sets collection of JAR statistics for JBoss standard JARs. Replace
STATEwithonoroff. The default ison. --jboss-servjar=STATE- Sets collection of JAR statistics from any server configuration directories. Replace
STATEwithonoroff. The default ison. --jboss-twiddle=STATE- Sets collection of twiddle data on or off. Twiddle is the JBoss tool used to collect data from the JMX invoker. Replace
STATEwithonoroff. The default ison. --jboss-appxml=XML_LIST- Displays a quoted and space-separated list of applications with XML descriptions to be retrieved. Default is
all.
SSH Configuration
--ssh-port=PORT- Sets
PORTas the port to use for SSH connections with virtualization hosts. -k,KEYFILE--key-file=KEYFILE- Sets
KEYFILEas the public SSH key to be used for accessing the virtualization hosts. --max-connections=MAX_CONNECTIONS- Sets
MAX_CONNECTIONSas the maximum concurrent SSH connections for logs from virtualization hosts. The default is10.
PostgreSQL Database Options
pg-pass parameter includes the Red Hat Enterprise Virtualization Manager database in the log. The database user name and database name must be specified if they have been changed from the default values.
pg-dbhost parameter if the database is not on the local host. Use the optional pg-host-key parameter to collect remote logs. The PostgreSQL SOS plugin must be installed on the database server for remote log collection to be successful.
--no-postgresql- Disables collection of database. Database collection is performed by default.
--pg-user=USER- Sets
USERas the user name to use for connections with the database server. The default ispostgres. --pg-dbname=DBNAME- Sets
DBNAMEas the database name to use for connections with the database server. The default isrhevm. --pg-dbhost=DBHOST- Sets
DBHOSTas the host name for the database server. The default islocalhost. --pg-host-key=KEYFILE- Sets
KEYFILEas the public identity file (private key) for the database server. This value is not set by default; it is required only where the database does not exist on the local host.
Example 15.12. Log Collector Usage
#rhevm-log-collectorPlease provide the username for rhevm (CTRL+D to abort): admin@directory.demo.redhat.com Please provide the password for rhevm (CTRL+D to abort): Host list (datacenter=None, cluster=None, host=None): Data Center | Cluster | Hostname/IP Address SalesDataCenter | SalesCluster | 192.168.122.250 EngineeringDataCenter | EngineeringCluster | 192.168.122.251 FinanceDataCenter | FinanceCluster | 192.168.122.252 #rhevm-log-collector collectPlease provide the username for rhevm (CTRL+D to abort): admin@directory.demo.redhat.com Please provide the password for rhevm (CTRL+D to abort): About to collect information from 3 hypervisors. Continue? (Y/n): Y INFO: Gathering information from selected hypervisors... INFO: collecting information from 192.168.122.250 INFO: collecting information from 192.168.122.251 INFO: collecting information from 192.168.122.252 INFO: finished collecting information from 192.168.122.250 INFO: finished collecting information from 192.168.122.251 INFO: finished collecting information from 192.168.122.252 Please provide the password to dump the PostgreSQL database (CTRL+D to abort): INFO: Gathering PostgreSQL the RHEV-M database and log files from localhost... INFO: Gathering RHEV-M information... Please provide the password for jboss (CTRL+D to abort): INFO: Log files have been collected and placed in /tmp/logcollector/sosreport-rhn-account-20110804121320-ce2a.tar.xz. The MD5 for this file is 6d741b78925998caff29020df2b2ce2a and its size is 26.7M
rhevm-iso-uploader. You are required to log in as the root user and provide the administration credentials for the Red Hat Enterprise Virtualization environment. The rhevm-iso-uploader -h command displays usage information, including a list of all valid options for the rhevm-iso-uploader command.
rhevm-iso-uploader[options]listrhevm-iso-uploader[options]upload[file].[file]...[file]
list and upload.
- The
listparameter lists the valid ISO storage domains available for ISO uploads. The Red Hat Enterprise Virtualization Manager sets this list on the local machine upon installation. - The
uploadparameter uploads single or multiple space-separated ISO files to the specified ISO storage domain. NFS is used as default; SSH is available.
list or upload parameter be included for basic usage. The upload parameter requires a minimum of one local file name to upload.
rhevm-iso-uploader command.
General Options
--version- Displays the version number of the command in use and returns to prompt.
-h,--help- Displays command usage information and returns to prompt.
--conf-file=PATH- Sets
PATHas the configuration file the tool is to use. --log-file=PATH- Sets
PATHas the specific file name the command should use for the log output. --quiet- Sets quiet mode, reducing console output to a minimum. Quiet mode is off by default.
-v,--verbose- Sets verbose mode, providing more console output. Verbose mode is off by default.
-f,--force- Force mode is necessary when the source file being uploaded has an identical file name as an existing file at the destination; it forces the existing file to be overwritten. Force mode is off by default.
Red Hat Enterprise Virtualization Manager Options
-u,USER--user=USER- Sets the user associated with the file to be uploaded. The
USERis specified in the formatuser@domain, whereuseris the user name anddomainis the directory services domain in use. The user must exist in directory services and be known to the Red Hat Enterprise Virtualization Manager. -r,FQDN--rhevm=FQDN- Sets the fully qualified domain name of the Red Hat Enterprise Virtualization Manager server from which to upload ISOs, where
FQDNis replaced by the fully qualified domain name of the Manager. It is assumed that the ISO uploader is being run on the same client machine as the Red Hat Enterprise Virtualization Manager; the default value islocalhost.
ISO Storage Domain Options
-i,--iso-domain=ISODOMAIN- Sets the storage domain
ISODOMAINas the destination for uploads. -n,--nfs-server=NFSSERVER- Sets the NFS path
NFSSERVERas the destination for uploads.
Connection Options
--ssh-user=USER- Sets
USERas the SSH user name to use for the upload. --ssh-port=PORT- Sets
PORTas the port to use when connecting to SSH. -k,KEYFILE--key-file=KEYFILE- Sets
KEYFILEas the public key to use for SSH authentication. You will be prompted to enter the password of the user specified with--ssh-user=if no key is set.USER
Example 15.13. Uploading to an NFS Server
# rhevm-iso-uploader --nfs-server=storage.demo.redhat.com:/iso/path upload RHEL6.0.isoISODomain.
Example 15.14. List Domains and Upload Image
#rhevm-iso-uploader listPlease provide the REST API username for RHEV-M (CTRL+D to abort):admin@directory.demo.redhat.comPlease provide the REST API password for RHEV-M (CTRL+D to abort): ISO Storage Domain List: ISODomain #rhevm-iso-uploader --iso-domain=Please provide the REST API username for RHEV-M (CTRL+D to abort):ISODomainuploadRHEL6.isoadmin@directory.demo.redhat.comPlease provide the REST API password for RHEV-M (CTRL+D to abort):
virtio-win.iso, virtio-win.vfd, and rhev-tools-setup.iso image files to the ISODomain.
Example 15.15. Uploading the VirtIO and Guest Tool Image Files
# rhevm-iso-uploader --iso-domain=ISODomain upload /usr/share/virtio-win/virtio-win.iso /usr/share/virtio-win/virtio-win.vfd /usr/share/rhev-guest-tools-iso/rhev-tools-setup.iso/usr/share/virtio-win/virtio-win.iso/usr/share/virtio-win/virtio-win.vfd/usr/share/rhev-guest-tools-iso/rhev-tools-setup.iso
rhevm-iso-uploader command to upload these images to your ISO storage domain. Once uploaded, the image files can be attached to and used by virtual machines.
- Installing the agents and drivers on Red Hat Enterprise Linux guests
- All of the drivers are included in the base channel for RHN registered Red Hat Enterprise Linux virtual machines. They can be installed using the
yum install rhevm-guest-agentcommand.Your guest must be subscribed to theRed Hat Enterprise Virt Agentchannel to install the agents.In Red Hat Enterprise Enterprise Linux 5, this channel is labelledrhel-x86_64-rhev-agent-5-server. In Red Hat Enterprise Linux 6, the channel is labelledrhel-x86_64-rhev-agent-6-server. - Installing the agents and drivers on Windows guests
- The agents and drivers are installed on Windows virtual machines using the
rhev-tools-setup.isodisk image. The guest tools ISO is distributed using the Red Hat Network asrhev-guest-tools-iso.rpm, an RPM file installed on the Red Hat Enterprise Virtualization Manager.After installing the Manager, the guest tools ISO can be found at/usr/share/rhev-guest-tools-iso/rhev-tools-setup.iso. When setting up the Manager, if you have created a local storage share for an ISO storage domain, the ISO file is automatically copied to the ISO storage domain. In this case the ISO image is automatically attached to Windows guests when they are created. Otherwise, the ISO must be manually attached to Windows guests for the tools and agents to be installed.Updated versions of the ISO file must be manually attached to running Windows virtual machines to install updated versions of the tools and drivers. If the APT service is enabled on virtual machines, the updated ISO files will be automatically attached.
See Also:
Table 15.3. Red Hat Enterprise Virtualization Guest Drivers
|
Driver
|
Description
|
Works on
|
|---|---|---|
virtio-net
|
Paravirtualized network driver provides enhanced performance over emulated devices like rtl.
|
Server and Desktop.
|
virtio-block
|
Paravirtualized HDD driver offers increased I/O performance over emulated devices like IDE by optimizing the coordination and communication between the guest and the hypervisor. The driver complements the software implementation of the virtio-device used by the host to play the role of a hardware device.
|
Server and Desktop.
|
virtio-serial
|
Virtio-serial provides support for multiple serial ports. The improved performance is used for fast communication between the guest and the host that avoids network complications. This fast communication is required for the guest agents and for other features such as clipboard copy-paste between the guest and the host and logging.
|
Server and Desktop.
|
virtio-balloon
|
Virtio-balloon is used to control the amount of memory a guest actually accesses. It offers improved memory over-commitment. The balloon drivers are installed for future compatibility but not used by default in Red Hat Enterprise Virtualization 3.1 or higher.
|
Server and Desktop.
|
qxl
|
A paravirtualized display driver reduces CPU usage on the host and provides better performance through reduced network bandwidth on most workloads.
|
Server and Desktop.
|
Table 15.4. Red Hat Enterprise Virtualization Guest Agents and Tools
|
Guest agent/tool
|
Description
|
Works on
|
|---|---|---|
rhevm-guest-agent
|
Allows the Red Hat Enterprise Virtualization Manager to receive guest internal events and information such as IP address and installed applications. Also allows the Manager to execute specific commands, such as shut down or reboot, on a guest.
On Red Hat Enterprise Linux 6 and higher guests, the rhev-guest-agent installs tuned on your virtual machine and configures it to use an optimized, virtualized-guest profile.
|
Server and Desktop.
|
spice-agent
|
The SPICE agent supports multiple monitors and is responsible for client-mouse-mode support to provide a better user experience and improved responsiveness than the QEMU emulation. Cursor capture is not needed in client-mouse-mode. The SPICE agent reduces bandwidth usage when used over a wide area network by reducing the display level, including color depth, disabling wallpaper, font smoothing, and animation. The SPICE agent enables clipboard support allowing cut and paste operations for both text and images between client and guest, and automatic guest display setting according to client-side settings. On Windows guests, the SPICE agent consists of vdservice and vdagent.
|
Server and Desktop.
|
rhev-sso
|
An agent that enables users to automatically log in to their virtual machines based on the credentials used to access the Red Hat Enterprise Virtualization Manager.
|
Desktop.
|
rhev-usb
|
A component that contains drivers and services for Legacy USB support (version 3.0 and earlier) on guests. It is needed for accessing a USB device that is plugged into the client machine.
RHEV-USB Client is needed on the client side.
|
Desktop.
|
Procedure 15.8. Subscribing to Channels Using Subscription Manager
- Run the
subscription-managercommand to register the system with Red Hat Network. To complete registration successfully you will need to supply your Red Hat Network Username and Password when prompted.register# subscription-manager register
Identify available entitlement pools
To subscribe the system to channels, you must locate the identifiers for the relevant entitlement pools. Use thelistaction of thesubscription-managerto find these.For example, to identify available subscription pools forRed Hat Enterprise Virtualizationuse the command:# subscription-manager list --available | grep -A8 "Red Hat Enterprise Virtualization"
Subscribe system to entitlement pools
Using the pool identifiers located in the previous step, subscribe the system to the required entitlements. When a system is subscribed to an entitlement pool, the system is automatically subscribed to the channels in the entitlement. The main channel is automatically enabled, other channels in the entitlement must be enabled manually. Use thesubscribeaction of thesubscription-managercommand, replacingPOOLIDwith one of the pool identifiers each time the command is run:# subscription-manager subscribe --pool=
POOLIDEnable additional subscription channels
When a system is subscribed to an entitlement with a main channel and some additional channel, only the main channel is enabled by default. Other channels are available, but disabled. The additional channels must be enabled using theyum-config-managercommand as therootuser:# yum-config-manager --enable
CHANNEL
Procedure 15.9. Subscribing to the channels using RHN Classic
- Run the
rhn_registercommand to register the system with Red Hat Network. To complete registration successfully you will need to supply your Red Hat Network username and password. Follow the onscreen prompts to complete registration of the system.# rhn_register
Subscribe to Required Channels
You must subscribe the system to the required channels using either the web interface to Red Hat Network or the command linerhn-channelcommand.Using the
rhn-channelCommandRun therhn-channelcommand to subscribe the system to each of the required channels. The commands which need to be run are:# rhn-channel --add --channel=
CHANNELImportant
If you are not the administrator for the machine as defined in Red Hat Network, or the machine is not registered to Red Hat Network, then use of therhn-channelcommand will result in an error:Error communicating with server. The message was: Error Class Code: 37 Error Class Info: You are not allowed to perform administrative tasks on this system. Explanation: An error has occurred while processing your request. If this problem persists please enter a bug report at bugzilla.redhat.com. If you choose to submit the bug report, please be sure to include details of what you were trying to do when this error occurred and details on how to reproduce this problem.If you encounter this error when usingrhn-channelthen to add the channel to the system you must use the web user interface.Using the Web Interface to Red Hat Network
To add a channel subscription to a system from the web interface:- Log on to Red Hat Network (http://rhn.redhat.com).
- Move the mouse cursor over the Subscriptions link at the top of the screen, and then click the Registered Systems link in the menu that appears.
- Select the system to which you are adding channels from the list presented on the screen, by clicking the name of the system.
- Click Alter Channel Subscriptions in the Subscribed Channels section of the screen.
- Select the channels to be added from the list presented on the screen.
- Click the Change Subscription button to finalize the change.
Table 16.1. Installation
| Log File | Description |
|---|---|
/var/log/ovirt-engine/engine-cleanup_
|
Log from the engine-cleanup command. This is the command used to reset a Red Hat Enterprise Virtualization Manager installation. A log is generated each time the command is run. The date and time of the run is used in the filename to allow multiple logs to exist.
|
/var/log/ovirt-engine/engine-db-install-
|
Log from the rhevm-setup command detailing the creation and configuration of the rhevm database.
|
/var/log/ovirt-engine/rhevm-dwh-setup-
|
Log from the rhevm-dwh-setup command. This is the command used to create the rhevm_history database for reporting. A log is generated each time the command is run. The date and time of the run is used in the filename to allow multiple logs to exist concurrently.
|
/var/log/ovirt-engine/ovirt-engine-reports-setup-
|
Log from the rhevm-reports-setup command. This is the command used to install the Red Hat Enterprise Virtualization Manager Reports modules. A log is generated each time the command is run. The date and time of the run is used in the filename to allow multiple logs to exist concurrently.
|
/var/log/ovirt-engine/engine-setup_
|
Log from the rhevm-setup command. A log is generated each time the command is run. The date and time of the run is used in the filename to allow multiple logs to exist concurrently.
|
/var/log/ovirt-engine/ovirt-engine-upgrade_
|
Log from the rhevm-upgrade command. A log is generated each time the command is run. The date and time of the run is used in the filename to allow multiple logs to exist concurrently.
|
Table 16.2. Service Activity
| Log File | Description |
|---|---|
/var/log/ovirt-engine/engine.log
| Reflects all Red Hat Enterprise Virtualization Manager GUI crashes, Active Directory look-ups, Database issues, and other events. |
/var/log/ovirt-engine/host-deploy
| Log files from hosts deployed from the Red Hat Enterprise Virtualization Manager. |
Table 16.3. Installation
| Log File | Description |
|---|---|
/var/log/vdsm/libvirt.log
|
Log file for libvirt.
|
/var/log/vdsm/spm-lock.log
| Log file detailing the host's ability to obtain a lease on the Storage Pool Manager role. The log details when the host has acquired, released, renewed, or failed to renew the lease. |
/var/log/vdsm/vdsm.log
| Log file for VDSM, the Manager's agent on the virtualization host(s). |
/tmp/ovirt-host-deploy-
|
Host deployment log, copied to engine as /var/log/ovirt-engine/host-deploy/ovirt-@DATE@-@HOST@-@CORRELATION_ID@.log after the host has been successfully deployed.
|
Procedure 16.1. Setting up a Virtualization Host Logging Server
- Configure SELinux to allow rsyslog traffic.
# semanage port -a -t syslogd_port_t -p udp 514
- Edit
/etc/rsyslog.confand add below lines:$template TmplAuth, "/var/log/%fromhost%/secure" $template TmplMsg, "/var/log/%fromhost%/messages" authpriv.* ?TmplAuth *.info,mail.none;authpriv.none,cron.none ?TmplMsg
Un-comment the following:#$ModLoad imudp #$UDPServerRun 514
- Restart the rsyslog service:
# service rsyslog restart
messages and secure logs from your virtualization hosts.
Procedure 16.2. Configuring Red Hat Enterprise Virtualization Hypervisor Hosts to Use a Logging Server
- Log in to your Red Hat Enterprise Virtualization Hypervisor host as
adminto access the Hypervisors text user interface (TUI) setup screen. - Select Logging from the list of options on the left of the screen.
- Press the key to reach the text entry fields. Enter the IP address or FQDN of your centralized log server and the port it uses.
- Press the key to reach the , and press the Key.
Procedure 16.3. Configuring Red Hat Enterprise Linux Hosts to Use a Logging Server
- Ensure that you have rsyslog installed:
# rpm -qi rsyslog
If rsyslog is not installed, install it:# yum install rsyslog
- Edit
/etc/rsyslog.conf, and specify the address of your centralized log server by adding the following:*.* @@YOURSERVERADDRESS:YOURSERVERPORT
For example:*.* @@192.168.20.254:514
Or:*.* @@log-server.company.com:514
The@@specifies the TCP protocol for transmission. Use a single@to specify UDP. - Restart the rsyslog service:
# service rsyslog restart
- 17.1.1. Checking for Red Hat Enterprise Virtualization Manager Updates
- 17.1.2. Updating Red Hat Enterprise Virtualization Manager
- 17.1.3. Updating Red Hat Enterprise Virtualization Manager Reports
- 17.1.4. Updating Red Hat Enterprise Virtualization Hypervisors
- 17.1.5. Updating Red Hat Enterprise Linux Virtualization Hosts
- 17.1.6. Updating the Red Hat Enterprise Virtualization Guest Tools
rhevm-check-update command, included in Red Hat Enterprise Virtualization Manager, to check for updates.
Procedure 17.1. Checking for Red Hat Enterprise Virtualization Manager Updates
- Run
rhevm-check-updateas therootuser.#
rhevm-check-update - Where no updates are available the command will output the text
No updates available.# rhevm-check-update Loaded plugins: product-id, versionlock Checking for updates... (This may take several minutes) No updates available
- Where updates are available the command will list the packages to be updated.
# rhevm-check-update Loaded plugins: product-id Checking for updates... (This may take several minutes) 10 Updates available: * rhevm-3.2.0-10.14.beta1.el6ev.noarch * rhevm-backend-3.2.0-10.14.beta1.el6ev.noarch * rhevm-config-3.2.0-10.14.beta1.el6ev.noarch * rhevm-dbscripts-3.2.0-10.14.beta1.el6ev.noarch * rhevm-genericapi-3.2.0-10.14.beta1.el6ev.noarch * rhevm-notification-service-3.2.0-10.14.beta1.el6ev.noarch * rhevm-restapi-3.2.0-10.14.beta1.el6ev.noarch * rhevm-tools-common-3.2.0-10.14.beta1.el6ev.noarch * rhevm-userportal-3.2.0-10.14.beta1.el6ev.noarch * rhevm-webadmin-portal-3.2.0-10.14.beta1.el6ev.noarch
- stopping the
ovirt-engineservice, - downloading and installing the updated packages,
- backing up and updating the database,
- performing post installation configuration, and
- restarting the
ovirt-engineservice.
root user.
Procedure 17.2. Updating Red Hat Enterprise Virtualization Manager
- Run the
yumcommand to update the rhevm-setup package.# yum update rhevm-setup
- Run the
rhevm-upgradecommand to update the Red Hat Enterprise Virtualization Manager.# rhevm-upgrade
Note
Be aware that the upgrade process may take some time. Allow time for the upgrade process to complete and do not stop it once initiated. Once the upgrade has been completed you will also be instructed to separately upgrade the data warehouse and reports functionality. These additional steps are only required if these optional packages are installed.
root user.
Procedure 17.3. Updating Red Hat Enterprise Virtualization Manager Reports
- Use the
yumcommand to update the rhevm-reports and rhevm-dwh packages.# yum update -y rhevm-reports rhevm-dwh
- Run the
rhevm-dwh-setupcommand to update therhevm_historydatabase.# rhevm-dwh-setup
- Run the
rhevm-reports-setupcommand to update the reporting engine.# rhevm-reports-setup
Warning
Important
Procedure 17.4. Updating Red Hat Enterprise Virtualization Hypervisors
- Log in to the system hosting Red Hat Enterprise Virtualization Manager as the
rootuser. - Ensure that:
- the system is subscribed to the
Red Hat Enterprise Virtualizationentitlement — if using certificate-based Red Hat Network; or - the system is subscribed to the
Red Hat Enterprise Virtualization Hypervisor (v.6 x86-64)(labeledrhel-x86_64-server-6-rhevh) — if using classic Red Hat Network.
- Run the
yumcommand with theupdaterhev-hypervisorparameters to ensure that you have the most recent version of the rhev-hypervisor package installed.# yum update rhev-hypervisor
- Use your web browser to log in to the Administration Portal as a Red Hat Enterprise Virtualization administrative user.
- Click the Hosts tab, and then select the host that you intend to upgrade. If the host is not displayed, or the list of hosts is too long to filter visually, perform a search to locate the host.
- With the host selected, click the General tab on the Details pane.
- If the host requires updating, an alert message indicates that a new version of the Red Hat Enterprise Virtualization Hypervisor is available.
- If the host does not require updating, no alert message is displayed and no further action is required.
- Ensure the host remains selected and click the Maintenance button, if the host is not already in maintenance mode. This will cause any virtual machines running on the host to be migrated to other hosts. If the host is the SPM, this function will be moved to another host. The status of the host changes as it enters maintenance mode. When the host status is
Maintenance, the message in the general tab changes, providing you with a link which when clicked will re-install or upgrade the host. - Ensure that the host remains selected, and that you are on the General tab of the the Details pane. Click the Upgrade link. The Install Host dialog box displays.
- Select
rhev-hypervisor.iso, which is symbolically linked to the most recent hypervisor image. - Click OK to update and re-install the host. The dialog closes, the details of the host are updated in the Hosts tab, and the status changes.The host status will transition through these stages:These are all expected, and each stage will take some time.
Installing,Reboot,Non Responsive, andUp.
- Once successfully updated, the host displays a status of
Up. Any virtual machines that were migrated off the host, are at this point able to be migrated back to it.Important
After a Red Hat Enterprise Virtualization Hypervisor is successfully registered to the Red Hat Enterprise Virtualization Manager and then upgraded, it may erroneously appear in the Administration Portal with the status of Install Failed. Click on the button, and the hypervisor will change to an Up status and be ready for use.
yum. It is highly recommended that you use yum to update your systems regularly, to ensure timely application of security and bug fixes. All steps in this task must be run while logged into the Red Hat Enterprise Linux virtualization host as the root user.
Procedure 17.5. Updating Red Hat Enterprise Linux Virtualization Hosts
- On the administration portal, navigate to the Hosts tab and select the host to be updated. Click to place it into maintenance mode.
- On the Red Hat Enterprise Linux virtualization host, run the
yumcommand with theupdateparameter to update all installed packages.# yum update
- If a package such as the kernel was updated, you must reboot the host to get the new functionality. If a package such as VDSM or libvirt was updated, you must restart that service to get the new functionality.
Procedure 17.6. Updating the Red Hat Enterprise Virtualization Guest Tools
- On the Manager, as root user, use the
yum upgradeto upgrade therhev-guest-tools-isopackage.# yum update -y rhev-guest-tools-iso*
- When the
rhev-guest-tools-isopackage has been successfully upgraded, use therhevm-iso-uploaderto upload it to your ISO storage domain. ReplaceISODomainwith the name of your ISO storage domain.rhevm-iso-uploader --iso-domain=
ISODomainupload /usr/share/rhev-guest-tools-iso/rhev-tools-setup.isoTherhev-tools-setup.isofile is actually a link to the most recently updated ISO file. The link is automatically changed to point to the newest ISO file every time you upgrade therhev-guest-tools-isopackage. - Using the web portal or REST API, attach the rhev-tools-setup.iso file to each of your guests, and from within each guest, upgrade the tools installed on each guest using the installer on the ISO.
rhev-tools-setup.iso file, uploaded the updated ISO to your ISO storage domain, and attached it to your virtual machines.
rhevm-upgrade command. Virtualization hosts, and the virtual machines running upon them, will continue to operate independently while the Manager is being upgraded. Once the Manager upgrade is complete you will be able to upgrade your hosts, if you haven't already, to the latest versions of Red Hat Enterprise Linux and Red Hat Enterprise Virtualization Hypervisor.
Important
Note
rhevm-upgrade command will attempt to roll your Red Hat Enterprise Virtualization Manager installation back to its previous state. Where this also fails detailed instructions for manually restoring the installation are displayed.
Procedure 17.7. Upgrading to Red Hat Enterprise Virtualization Manager 3.2
Add Red Hat Enterprise Virtualization 3.2 Subscription
Ensure that the system is subscribed to the required channels and entitlements to receive Red Hat Enterprise Virtualization Manager 3.2 packages. This procedure assumes that the system is already subscribed to required channels and entitlements to receive Red Hat Enterprise Virtualization 3.1 packages. These must also be available to complete the upgrade process.Certificate-based Red Hat NetworkThe Red Hat Enterprise Virtualization 3.2 packages are provided by therhel-6-server-rhevm-3.2-rpmsrepository associated with theRed Hat Enterprise Virtualizationentitlement. Use theyum-config-managercommand to enable the repository in youryumconfiguration. Theyum-config-managercommand must be run while logged in as therootuser.# yum-config-manager --enable rhel-6-server-rhevm-3.2-rpms
Red Hat Network ClassicThe Red Hat Enterprise Virtualization 3.2 packages are provided by theRed Hat Enterprise Virtualization Manager (v.3.2 x86_64)channel, also referred to asrhel-x86_64-server-6-rhevm-3.2in Red Hat Network Classic.rhn-channel --add --channel=rhel-x86_64-server-6-rhevm-3.2
Use therhn-channelcommand, or the Red Hat Network Web Interface, to subscribe to theRed Hat Enterprise Virtualization Manager (v.3.2 x86_64)channel.Update the rhevm-setup Package
To ensure that you have the most recent version of therhevm-upgradecommand installed you must update the rhevm-setup package. Log in as therootuser and useyumto update the rhevm-setup package.# yum update rhevm-setup
Run the
rhevm-upgradeCommandTo upgrade Red Hat Enterprise Virtualization Manager run therhevm-upgradecommand. You must be logged in as therootuser to run this command.# rhevm-upgrade Loaded plugins: product-id, rhnplugin Info: RHEV Manager 3.1 to 3.2 upgrade detected Checking pre-upgrade conditions...(This may take several minutes)
- If the ipa-server package is installed then an error message is displayed. Red Hat Enterprise Virtualization Manager 3.2 does not support installation on the same machine as Identity Management (IdM).
Error: IPA was found to be installed on this machine. Red Hat Enterprise Virtualization Manager 3.2 does not support installing IPA on the same machine. Please remove ipa packages before you continue.
To resolve this issue you must migrate the IdM configuration to another system before re-attempting the upgrade. For further information see https://access.redhat.com/knowledge/articles/233143.
- Ensure that all of your virtualization hosts are up to date and running the most recent Red Hat Enterprise Linux packages or Hypervisor images.
- Change all of your clusters to use compatibility version 3.2.
- Change all of your data centers to use compatibility version 3.2.
rhevm-upgrade command. Virtualization hosts, and the virtual machines running upon them, will continue to operate independently while the Manager is being upgraded. Once the Manager upgrade is complete you will be able to upgrade your hosts, if you haven't already, to the latest versions of Red Hat Enterprise Linux and Red Hat Enterprise Virtualization Hypervisor.
Important
Important
Note
rhevm-upgrade command will attempt to roll your Red Hat Enterprise Virtualization Manager installation back to its previous state. Where this also fails detailed instructions for manually restoring the installation are displayed.
Procedure 17.8. Upgrading to Red Hat Enterprise Virtualization Manager 3.1
Add JBoss Enterprise Application Platform 6 Subscription
Ensure that the system is subscribed to the required channels and entitlements to receive JBoss Enterprise Application Platform 6 packages. JBoss Enterprise Application Platform 6 is a required dependency of Red Hat Enterprise Virtualization Manager 3.1.Certificate-based Red Hat NetworkThe JBoss Enterprise Application Platform 6 packages are provided by theJBoss Enterprise Application Platformentitlement in certificate-based Red Hat Network.Use thesubscription-managercommand to ensure that the system is subscribed to theJBoss Enterprise Application Platformentitlement.# subscription-manager list
Red Hat Network ClassicThe JBoss Enterprise Application Platform 6 packages are provided by theJBoss Application Platform (v 6) for 6Server x86_64channel, also referred to asjbappplatform-6-x86_64-server-6-rpm, in Red Hat Network Classic. The Channel Entitlement Name for this channel isJBoss Enterprise Application Platform (v 4, zip format).Use therhn-channelcommand, or the Red Hat Network Web Interface, to subscribe to theJBoss Application Platform (v 6) for 6Server x86_64channel.Add Red Hat Enterprise Virtualization 3.1 Subscription
Ensure that the system is subscribed to the required channels and entitlements to receive Red Hat Enterprise Virtualization Manager 3.1 packages.Certificate-based Red Hat NetworkThe Red Hat Enterprise Virtualization 3.1 packages are provided by therhel-6-server-rhevm-3.1-rpmsrepository associated with theRed Hat Enterprise Virtualizationentitlement. Use theyum-config-managercommand to enable the repository in youryumconfiguration. Theyum-config-managercommand must be run while logged in as therootuser.# yum-config-manager --enable rhel-6-server-rhevm-3.1-rpms
Red Hat Network ClassicThe Red Hat Enterprise Virtualization 3.1 packages are provided by theRed Hat Enterprise Virtualization Manager (v.3.1 x86_64)channel, also referred to asrhel-x86_64-server-6-rhevm-3.1in Red Hat Network Classic.Use therhn-channelcommand, or the Red Hat Network Web Interface, to subscribe to theRed Hat Enterprise Virtualization Manager (v.3.1 x86_64)channel.Remove Red Hat Enterprise Virtualization 3.0 Subscription
Ensure that the system does not use any Red Hat Enterprise Virtualization Manager 3.0 packages by removing the Red Hat Enterprise Manager 3.0 channels and entitlements.Certificate-based Red Hat NetworkUse theyum-config-managercommand to disable the Red Hat Enterprise Virtualization 3.0 repositories in youryumconfiguration. Theyum-config-managercommand must be run while logged in as therootuser.# yum-config-manager --disablerepo=rhel-6-server-rhevm-3-rpms
# yum-config-manager --disablerepo=jb-eap-5-for-rhel-6-server-rpms
Red Hat Network ClassicUse therhn-channelcommand, or the Red Hat Network Web Interface, to remove theRed Hat Enterprise Virtualization Manager (v.3.0 x86_64)channels.# rhn-channel --remove --channel=rhel-6-server-rhevm-3
# rhn-channel --remove --channel=jbappplatform-5-x86_64-server-6-rpm
Update the rhevm-setup Package
To ensure that you have the most recent version of therhevm-upgradecommand installed you must update the rhevm-setup package. Log in as therootuser and useyumto update the rhevm-setup package.# yum update rhevm-setup
Run the
rhevm-upgradeCommandTo upgrade Red Hat Enterprise Virtualization Manager run therhevm-upgradecommand. You must be logged in as therootuser to run this command.# rhevm-upgrade Loaded plugins: product-id, rhnplugin Info: RHEV Manager 3.0 to 3.1 upgrade detected Checking pre-upgrade conditions...(This may take several minutes)
- If the ipa-server package is installed then an error message is displayed. Red Hat Enterprise Virtualization Manager 3.1 does not support installation on the same machine as Identity Management (IdM).
Error: IPA was found to be installed on this machine. Red Hat Enterprise Virtualization Manager 3.1 does not support installing IPA on the same machine. Please remove ipa packages before you continue.
To resolve this issue you must migrate the IdM configuration to another system before re-attempting the upgrade. For further information see https://access.redhat.com/knowledge/articles/233143. - A list of packages that depend on JBoss Enterprise Application Platform 5 is displayed. These packages must be removed to install JBoss Enterprise Application Platform 6, required by Red Hat Enterprise Virtualization Manager 3.1.
Warning: the following packages will be removed if you proceed with the upgrade: * objectweb-asm Would you like to proceed? (yes|no):You must enteryesto proceed with the upgrade, removing the listed packages.
- Ensure that all of your virtualization hosts are up to date and running the most recent Red Hat Enterprise Linux packages or Hypervisor images.
- Change all of your clusters to use compatibility version 3.1.
- Change all of your data centers to use compatibility version 3.1.
See Also:
Prerequisites:
Procedure 17.9. Changing the Cluster Compatibility Version
- Log in to the Administration Portal as the administrative user. By default this is the
adminuser. - Click the Hosts tab.
- Select all the hosts from the cluster you wish to change.
- Click the Maintenance button to put the hosts in maintenance mode.
- Click the Clusters tab.
- Select the cluster that you wish to change from the list displayed. If the list of clusters is too long to filter visually then perform a search to locate the desired cluster.
- Click the button.
- Change the Compatibility Version to the desired value.
- Click .
Prerequisites:
Procedure 17.10. Changing the Data Center Compatibility Version
- Log in to the Administration Portal as the administrative user. By default this is the
adminuser. - If you can endure virtual machine downtime, you will put all of your hosts in maintenance mode at once. Click the Hosts tab.
- Select all the hosts from the data center you wish to change.
- Click the button to put the hosts in maintenance mode.
- Upgrade each cluster's compatibility level individually before upgrading the data center's compatibility level if you cannot put all of your hosts into maintenance mode at once.This process is described in Changing the Cluster Compatibility Version.
- Click the Data Centers tab.
- Select the data center that you wish to change from the list displayed. If the list of data centers is too long to filter visually then perform a search to locate the desired data center.
- Click the button.
- Change the Compatibility Version to the desired value.
- Click .
Important
Procedure 18.1. Backing up the engine database using the backup.sh script
- Change into the
/usr/share/ovirt-engine/dbscripts/directory. - Invoke
backup.shwith the-hparameter to see the available options.Usage: backup.sh [-h] [-s SERVERNAME] [-p PORT] [-d DATABASE] [-l DIR] -u USERNAME [-v] -s SERVERNAME - The database servername for the database (def. localhost) -p PORT - The database port for the database (def. 5432) -d DATABASE - The database name (def. engine) -u USERNAME - The username for the database. -v - Turn on verbosity (WARNING: lots of output) -l DIR - Backup file directory. -h - This help text. for more options please run pg_dump --help
- Invoke the
backup.shcommand again with parameters appropriate for your environment. If you are backing up the localenginedatabase, the-s, -p,and-dparameters are not necessary. Use the-lto specify the backup directory. This will cause a.sqlfile to be created in the directory you give. - Copy the
.sqlyou just created from the directory you specified to a safe remote location.
engine database.
Important
Procedure 18.2. Restoring the Engine Database Using the restore.sh Script
- Change into the
/usr/share/ovirt-engine/dbscripts/directory. - Invoke
restore.shwith the-hparameter to see the available options.Usage: restore.sh [-h] [-s SERVERNAME] [-p PORT] -u USERNAME -d DATABASE -f FILE [-r] -s SERVERNAME - The database servername for the database (def. localhost) -p PORT - The database port for the database (def. 5432) -u USERNAME - The username for the database. -d DATABASE - The database name -f File - Backup file name to restore from. -r - Remove existing database with same name -h - This help text. for more options please run pg_restore --help
- Invoke the
restore.shcommand again with parameters appropriate for your environment. If you are restoring the localenginedatabase, the-sand-pparameters are not necessary. Use the-dto specify name of the database you are creating. Red Hat Enterprise Virtualization expects a primary database namedengine. Use the-fto specify the.sqlfile you are restoring from.
engine database.
Important
Table 18.1. Configuration files and directories requiring backup.
| Location | What is it? |
|---|---|
| /etc/ovirt-engine/ | Contains Red Hat Enterprise Virtualization Manager configuration files. |
| /etc/sysconfig/ovirt-engine | It is the ovirt-engine service configuration file. |
| /etc/yum/pluginconf.d/versionlock.list | Contains version information about currently installed Red Hat Enterprise Virtualization components. |
| /etc/pki/ovirt-engine/ | Security certificates provided by the Red Hat Enterprise Virtualization Manager to clients. |
| /usr/share/jasperreports-server-pro/buildomatic | Contains files required to build the Red Hat Enterprise Virtualization reports server. |
| /var/lib/ovirt-engine/backups | A folder where all backup data is stored. |
| /var/lib/ovirt-engine/deployments | A folder where all deployment data is stored. |
| /usr/share/ovirt-engine-reports/reports/users/rhevm-002dadmin.xml | Contains plain-text, un-encrypted user and password information for the rhev-admin user. |
| /usr/share/ovirt-engine-reports/default_master.properties | Contains settings to handle the configuration and deployment of JasperServer. |
| /root/.rnd | Random seed file, used to generate secure certificates. |
/var/log/ovirt-engine/engine-setup_SETUPDATE.log
| Contains the answers you gave to the setup configuration questions. Restoring the Manager requires running the setup again, and giving the same answers. |
Prerequisites:
Important
Procedure 18.3. Restoring Red Hat Enterprise Virtualization Manager Configuration Files
- Stop the Engine service:
# service ovirt-engine stop
- Completely remove all previous installations of the Red Hat Enterprise Virtualization Manager:
# yum remove rhevm
- Remove /etc/pki/ovirt-engine:
# rm -rf /etc/pki/ovirt-engine
- Remove the main rhevm directory:
# rm -rf /etc/ovirt-engine
- Install the Red Hat Enterprise Virtualization Manager:
# yum install -y rhevm
- Run rhevm-setup, giving the same answers as when you originally installed rhevm:
# rhevm-setup
Your answers can be found in/var/log/engine-setup-, which you backed up.SETUP-DATE.log - Stop the Engine service, which was restarted as a part of the previous command:
# service ovirt-engine stop
- Restore the backed up configuration files to their original locations.
- Make sure the ownership of the .keystore file is correct:
# chown ovirt:ovirt /etc/pki/ovirt-engine/.keystore
- Make sure the permissions of the notifier.conf file is correct:
# chmod 640 /etc/ovirt-engine/notifier/notifier.conf
- Start the
Engineservice:# service ovirt-engine start
Table of Contents
- 19.1.1. Reports
- 19.1.2. JasperReports and JasperServer in Red Hat Enterprise Virtualization
- 19.1.3. Online Help for JasperReports
- 19.1.4. Jasper Reports System Requirements
- 19.1.5. Users in the Red Hat Enterprise Virtualization Reports Portal
- 19.1.6. Logging in to Access the Reports Portal
- 19.1.7. Accessing the Red Hat Enterprise Virtualization Reports User Management Menu
- 19.1.8. Reports Portal User Roles
- 19.1.9. Navigating Reports and Dashboards
- 19.1.10. Report Parameters
- 19.1.11. Right-click Reporting Integration with the Red Hat Enterprise Virtualization Administration Portal
- 19.1.12. Executive Reports
- 19.1.13. Inventory Reports
- 19.1.14. Service Level Reports
- 19.1.15. Trend Reports
- 19.1.16. Ad Hoc Reports
- 19.1.17. Reports Schema: Tag History and ENUM Views
Warning
SELECT statement. The result of the SELECT statement populates the virtual table that the view returns. A user references the view name in PL/PGSQL statements the same way a table is referenced.
- In Red Hat Enterprise Linux 5.7 - Firefox 17 or later
- In Red Hat Enterprise Linux 6 - Firefox 17 or later
- In Windows 7 - Internet Explorer 9
- In Windows Server 2008 - Internet Explorer 9
rhevm-admin and superuser. The passwords for these users were set during the installation of Red Hat Enterprise Virtualization Reports. Generally, additional users must be added manually.
superuser and rhevm-admin accounts when you installed Red Hat Enterprise Virtualization Reports. Red Hat Enterprise Virtualization Reports does not provide default passwords.
https://YOUR.MANAGER.URL/rhevm-reports/login.html. A login screen for Red Hat Enterprise Virtualization Reports is displayed.
Note
ovirt-user. Click the button.
rhevm-admin and superuser. Generally, additional users need to be created within the Reports Portal.
rhevm-admin.
- In to Red Hat Enterprise Virtualization reports portal, hover over the Manage button on the top menu bar.
- Click on Users in the drop-down menu that appears to access the Manage Users interface. It contains three panes:
- Organizations
- Users
- Properties
- Select a user in the Users pane by clicking on the name of the user. Information about the user displays in the Properties pane.
- Click the button at the bottom of the user's Properties pane.The Properties pane contains these fields:
- User name,
- User ID,
- Email,
- Password (required),
- Confirm Password (required),
- A User is enabled check box,
- A The user is defined externally check box,
- A list of Roles Available to the user, and
- A list of Roles Assigned to the user.
- Click the button.
- ROLE_ADMINISTRATOR - Can create/edit/delete reports, dashboards, ad hoc reports, and manage the server.
- ROLE_USER - Can create/edit/delete ad hoc reports and view reports and dashboards.
- ROLE_ANONYMOUS - Can log in and look at reports and dashboards.
) button in the navigation bar at the top of the reports portal to return to this page.
Table 19.1. Navigation Filters
| Filter | Description |
|---|---|
Available Resources
| Select from All, Modified by me, or Viewed by me. |
Resource type
| Choose from the types of available resources including Reports, Ad Hoc views, Dashboards, and more. |
Timeframe
| Choose a time frame you'd like to see information from. |
Schedule
| Filter by data collection schedule. |
Note
Active Virtual Machines by OS report shows a summary of the number of active virtual machines in a given time period, broken down by operating system. The following parameters are provided to run this report:
Table 19.2. Active Virtual Machines by OS Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
| The report includes only virtual machines in the selected data center. The options list shows only data centers that contain virtual machines. |
Cluster
|
The report only includes virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report only includes virtual machines of the selected type. Possible types are Server and Desktop. The options list shows only types that exist in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Cluster Capacity Vs Usage report shows the relationship between system capacity and usage (workload) over a given time period. Capacity is expressed in terms of CPU cores and physical memory, while usage is expressed as vCPUs and virtual machine memory. The following parameters must be provided to run this report:
Table 19.3. Cluster Capacity Vs Usage Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list contains only data centers that contain clusters.
|
Cluster
|
The report only includes the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all clusters in the selected data center.
|
Host OS Break Down report indicates the number of hosts running each operating system version over a given time period. The following parameters must be provided to run this report:
Table 19.4. Host OS Break Down Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Summary of Host Usage Resources report shows a scatter plot of average host resource utilization for a given time period in terms of CPU and memory usage. The following parameters must be provided to run this report:
Table 19.5. Summary of Host Usage Resources Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Hosts Inventory report shows a list of all hosts in the selected data center and cluster. The following parameters must be provided to run this report:
Table 19.6. Hosts Inventory Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Storage Domain Size Over Time report shows a line graph contrasting the total available and total used space for a single storage domain over time for a given period. The following parameters must be provided to run this report:
Table 19.7. Storage Domain Size Over Time Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
|
The report covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. The list of options for the Storage Domain name parameter includes only storage domains that were attached during the specified period.
|
Data Center
|
The options list for the Storage Domain Name parameter shows only storage domains in this selected data center.
|
Storage Domain Type
|
The options list for the Storage Domain Name parameter shows only storage domains of this selected type.
|
Storage Domain Name
| The report refers to the storage domain selected. A report is only for a single storage domain and the user must select a storage domain. The list of options shows only storage domains that were attached to the data center during the selected period. |
Virtual Machines Inventory report shows a list of all virtual machines in the selected data center and cluster. The following parameters must be provided to run this report:
Table 19.8. Virtual Machines Inventory Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Table 19.9. Cloud Provider Virtual Machine Inventory Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Cluster Host Uptime report shows the weighted average uptime of hosts within a cluster for a given period of time. This report also provides a table listing the total planned (maintenance) and unplanned down time for each host. The following parameters must be provided to run this report:
Table 19.10. Cluster Host Uptime Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Cluster Quality of Services - Hosts report shows the amount of time hosts sustain load above a specified threshold for a given time period. Load is defined in terms of CPU usage percent and memory usage percent. The following parameters must be provided to run this report:
Table 19.11. Cluster Quality of Service - Hosts Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
CPU Threshold
|
The report measures the quality of service as the amount of time hosts sustain load above a given threshold. The CPU Threshold defines a load threshold as a percentage of total CPU usage on the host. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A CPU Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Memory Threshold
|
The report measures the quality of service as the amount of time hosts sustain load above a given threshold. The Memory Threshold defines a load threshold as a percentage of total memory usage on the host. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A Memory Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Cluster Quality of Service - Virtual Machines report shows the amount of time virtual machines sustain load above a specified threshold for a given time period. Load is defined in terms of CPU usage percent and memory usage percent. The following parameters must be provided to run this report:
Table 19.12. Cluster Quality of Service - Virtual Machines Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
CPU Threshold
|
The report measures quality of service as the amount of time virtual machines sustain load above a given threshold. The CPU Threshold defines a load threshold as a percentage of total CPU usage on the virtual machine. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A CPU Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Memory Threshold
|
The reports measures quality of service as the amount of time virtual machines sustain load above a given threshold. The Memory Threshold defines a load threshold as a percentage of total memory usage on the virtual machine. The load is measured by one-minute samples, averaged over an hour. The report therefore shows sustained load, not short term peaks. A Memory Threshold of 60 per cent is a suggested starting point to produce a meaningful quality of service report.
|
Single Host Uptime report shows the total proportion of uptime, planned downtime and unplanned downtime for a single host. The following parameters must be provided to run this report:
Table 19.13. Single Host Uptime Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host Name parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and a user must select a host. |
Top 10 Downtime Hosts report shows the total proportion of uptime, planned downtime and unplanned downtime for the 10 hosts with the greatest amount of downtime. The following parameters must be provided to run this report:
Table 19.14. Top 10 Downtime Hosts Parameters
Parameter
| Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list contains only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
High Availability Virtual Servers Uptime report shows the weighted average uptime of high availability virtual servers within a cluster for a given period of time. The report also provides a table listing the total uptime and unplanned down time for each virtual server. The following parameters must be provided to run this report:
Table 19.15. High Availability Virtual Servers Uptime Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual servers in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual servers in the selected data center.
|
Five Least Utilized Hosts (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five hosts with the lowest load factor for a given period of time. The following parameters must be provided to run this report:
Table 19.16. Five Least Utilized Hosts (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Five Least Utilized Virtual Machines (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five virtual machines with the lowest load factor for a given period of time. The following parameters must be provided to run this report:
Table 19.17. Five Least Utilized Virtual Machines (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Five Most Utilized Hosts (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five hosts with the highest load factor for a given period of time. The following parameters must be provided to run this report:
Table 19.18. Five Most Utilized Hosts (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The report includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all hosts in the selected data center.
|
Host Type
|
The report includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the report includes all host types.
|
Five Most Utilized Virtual Machines (Over Time) report shows the weighted average daily peak load, in terms of CPU and memory usage, for the five virtual machines with the highest load factor for a given period of time. The following parameters must be provided to run this report:
Table 19.19. Five Most Utilized Virtual Machines (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers which contain clusters.
|
Cluster
|
The report includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the report includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The report includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the report includes all virtual machine types.
|
Multiple Hosts Resource Usage (Over Time) report shows the daily peak load, in terms of CPU and memory usage, for up to five selected hosts over a given period of time. The following parameters must be provided to run this report:
Table 19.20. Multiple Hosts Resource Usage (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Hosts list parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Hosts list parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Hosts list parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Hosts list parameter includes all host types.
|
Hosts list
| The report includes all hosts selected in the host list. Select any number of hosts up to a maximum of five. |
Multiple Virtual Machines Resource Usage (Over Time) report shows the daily peak load, in terms of CPU and memory usage, for up to five selected virtual machines over a given period of time. The following parameters must be provided to run this report:
Table 19.21. Multiple Virtual Machines Resource Usage (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM List parameter include only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM List parameter includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The list of options for the VM List parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM List parameter includes all virtual machine types.
|
Virtual Machine List
| The report includes all virtual machines selected in the virtual machine list. Select any number of virtual machines up to a maximum of five. |
Single Host Resource Usage (Days of Week) report shows various resource utilization metrics for a single host over a given period of time and broken down by day of the week. The metrics include CPU usage, memory usage, number of active virtual machines and network usage. The following parameters must be provided to run this report:
Table 19.22. Single Host Resource Usage (Days of Week) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
The list of options for the Host Name parameter includes only hosts of the selected type. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and the user must select a host. |
Single Host Resource Usage (Hour of Day) report shows a variety of resource utilization metrics for a single host over a given period of time, broken down by hour of the day (0-23). The metrics include CPU usage, memory usage, number of active virtual machines and network usage. The following parameters must be provided to run this report:
Table 19.23. Single Host Resource Usage (Hour of Day) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the Host Name parameter includes only hosts in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the Host Name parameter includes all hosts in the selected data center.
|
Host Type
|
Only hosts of the selected type will be included in the list of options for the Host Name parameter. The options list shows only host types present in the selected data center and cluster. If All is selected, the list of options for the Host Name parameter includes all host types.
|
Host Name
| The report refers to the host selected. A report is only for a single host and the user must select a host. |
Single Virtual Machine Resources (Days of Week) report shows a variety of resource utilization metrics for a single virtual machine over a given period of time, broken down by day of the week. The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 19.24. Single Virtual Machine Resources (Days of Week) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The list of options for the VM Name parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
Virtual Machine Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Single Virtual Machine Resources (Hour of Day) report shows a variety of resource utilization metrics for a single virtual machine over a given period of time, broken down by hour of the day (0-23). The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 19.25. Single Virtual Machine Resources (Hour of Day) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers which contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The list of options for the VM Name parameter includes only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
Virtual Machine Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Single Virtual Machine Resources (Over Time) report shows a variety of resource utilization metrics for a single virtual machine over a given period of time. The metrics include CPU usage, memory usage, disk usage and network usage. The following parameters must be provided to run this report:
Table 19.26. Single Virtual Machine Resources (Over Time) Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The report is for the period range selected. Daily reports cover a single day. Monthly reports cover a single month. Quarterly reports cover a three-month quarter, beginning on the month specified in the Dates parameter. Yearly reports cover a year, beginning on the month specified in the Dates parameter.
|
Dates
| The report covers the selected period range, beginning on this date. Daily period ranges pass in one day increments. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. A yearly period range also starts on the selected month. |
Data Center
|
The list of options for the Cluster parameter includes only clusters in the selected data center. The options list shows only data centers that contain clusters.
|
Cluster
|
The list of options for the VM Name parameter includes only virtual machines in the selected cluster. The options list shows only clusters in the selected data center. If All is selected, the list of options for the VM Name parameter includes all virtual machines in the selected data center.
|
Virtual Machine Type
|
The list of options for the VM Name parameter lists only virtual machines of the selected type. The options list shows only virtual machine types present in the selected data center and cluster. If All is selected, the list of options for the VM Name parameter includes all virtual machine types.
|
Virtual Machine Name
| The report refers to the virtual machine selected. A report is only for a single virtual machine and the user must select a virtual machine. |
Working with the Ad Hoc Editor section of the online help explains the ad hoc report interface in detail.
Note
delete_date and detach_date do not appear in latest views because these views provide the latest configuration of living entities, which, by definition, have not been deleted.
Table 19.27. Tag Relations History in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| entity_id | uuid | Unique ID of the entity or tag in the system. |
| entity_type | smallint |
|
| parent_id | uuid | Unique ID of the entity or tag in the system. |
| attach_date | timestamp with time zone | The date the entity or tag was attached to the entity or tag. |
| detach_date | timestamp with time zone | The date the entity or tag was detached from the entity or tag. |
Table 19.28. v3_2_tag_details_view\v3_2_latest_tag_details_view
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| tag_id | uuid | Unique ID of the tag in the system. |
| tag_name | varchar(50) | Name of the tag, as displayed in the tag tree. |
| tag_description | varchar(4000) | Description of the tag, as displayed in the edit dialog. |
| tag_path | varchar(4000) | The path to the tag in the tree. |
| tag_level | smallint | The tag level in the tree. |
| create_date | timestamp with time zone | The date this tag was added to the system. |
| update_date | timestamp with time zone | The date this tag was changed in the system. |
| delete_date | timestamp with time zone | The date this tag was deleted from the system. |
Table 19.29. v3_2_enum_translator_view
| Name | Type | Description |
|---|---|---|
| enum_type | varchar(40) | The type of ENUM. |
| enum_key | smallint | The key of the ENUM. |
| value | varchar(40) | The value of the ENUM. |
- 19.2.1. Red Hat Enterprise Virtualization History Database
- 19.2.2. Tracking Configuration History
- 19.2.3. Recording Statistical History
- 19.2.4. Tracking Tag History
- 19.2.5. Connecting to the History Database
- 19.2.6. Allowing Read-only Access to the History Database
- 19.2.7. History Database Report Examples
- 19.2.8. Statistics History Views
- 19.2.9. Configuration History Views
ovirt_engine_history) which tracks the engine database over time.
Important
ovirt-engine-dwhd, tracks three types of changes:
- A new entity is added to the engine database - the ETL Service replicates the change to the ovirt_engine_history database as a new entry.
- An existing entity is updated - the ETL Service replicates the change to the ovirt_engine_history database as a new entry.
- An entity is removed from the engine database - A new entry in the ovirt_engine_history database flags the corresponding entity as removed. Removed entities are only flagged as removed. To maintain correctness of historical reports and representations, they are not physically removed.
- a
history_idto indicate the configuration version of the entity; - a
create_datefield to indicate when the entity was added to the system; - an
update_datefield to indicate when the entity was changed; and - a
delete_datefield to indicate the date the entity was removed from the system.
- A tag is created in the Administration Portal - the ETL Service copies the tag details, position in the tag tree and relation to other objects in the tag tree.
- A entity is attached to the tag tree in the Administration Portal - the ETL Service replicates the addition to the ovirt_engine_history database as a new entry.
- A tag is updated - the ETL Service replicates the change of tag details to the ovirt_engine_history database as a new entry.
- An entity or tag branch is removed from the Administration Portal - the ovirt_engine_history database flags the corresponding tag and relations as removed in new entries. Removed tags and relations are only flagged as removed or detached. In order to maintain correctness of historical reports and representations, they are not physically removed.
- A tag branch is moved - the corresponding tag and relations are updated as new entries. Moved tags and relations are only flagged as updated. In order to maintain correctness of historical reports and representations, they are not physically updated.
ovirt_engine_history database resides within the instance of PostgreSQL that the installer creates during Red Hat Enterprise Virtualization Manager installation.
/var/lib/pgsql/data
Procedure 19.1. Enabling Remote Access to the History Database
- Edit the
postgresql.conffile, and add two parameters.listen_addresses = "*"
If you want to allow access by specific hosts, use a comma seperated list of IP addresses or hostnames instead of "*".ssl=on
- Edit
pg_hba.confto add:hostssl all all
<net address/mask>md5Replace<net address/mask>with the IP address and netmask of allowed hosts. For example, 192.168.0.0/24. - You can use the certificate and key created by the Red Hat Enterprise Virtualization Manager at installation,
/etc/pki/ovirt-engine/certs/engine.cerand/etc/pki/ovirt-engine/keys/engine_id_rsarespectively.- PostgreSQL requires that the certificate and key be named server.crt and server.key, respectively. You can use the
ln -sto create a soft link to put the Manager's cerificate and key files where PostgreSQL expects them.# ln -s /etc/pki/ovirt-engine/certs/engine.cer /var/lib/pgsql/data/server.crt
# ln -s /etc/pki/ovirt-engine/keys/engine_id_rsa /var/lib/pgsql/data/server.key
- Alternatively, you can create a new certificate and key file. Using the commands documented in the PostgreSQL Manual, create
server.crtandserver.keyfiles.
- Stop the engine service.
# service ovirt-engine stop
- Restart the PostgreSQL service
# service postgresql restart
- Un-deploy and re-deploy the Jasper WAR files
- Remove the
.deployedfile:# rm /var/lib/ovirt-engine/deployments/rhevm-reports.war.deployed
This causes an.undeployedfile to be created:/var/lib/ovirt-engine/deployments/rhevm-reports.war.undeployed - When the
.undeployedfile is there, you know the app is down. Remove the.undeployedfile:# rm /var/lib/ovirt-engine/deployments/rhevm-reports.war.undeployed
- Then you can redeploy:
# touch /var/lib/ovirt-engine/deployments/rhevm-reports.war.dodeploy
Which causes a.deployedfile to be created:/var/lib/ovirt-engine/deployments/rhevm-reports.war.deployed
- Add an iptables rule to allow external machines to connect to the Manager and access PosgreSQL. For example, in a default iptables configuration, the following will insert a new rule after the SSH rule:
iptables -I INPUT 5 -p tcp -m state --state NEW --dport 5432 -j ACCEPT
- Start the engine service.
# service ovirt-engine start
Procedure 19.2. Allowing Read-only Access to the History Database
- Create the user that you will grant read-only access to the history database with, called history-readonly.
# psql -U postgres -c "CREATE ROLE history-readonly WITH LOGIN;" ovirt_engine_history
- Grant the history-readonly user permssion to connect to the history database.
# psql -U postgres -c "GRANT CONNECT ON DATABASE mydb TO history-readonly;" ovirt_engine_history
- Grant usage of the public schema to the history-readonly user.
# psql -U postgres -c "GRANT USAGE ON SCHEMA public TO history-readonly;" ovirt_engine_history
- Generate the rest of the permissions to grant to the history-readonly user and save them to a file.
# psql -U postgres -c "SELECT 'GRANT SELECT ON ' || relname || ' TO history-readonly;' FROM pg_class JOIN pg_namespace ON pg_namespace.oid = pg_class.relnamespace WHERE nspname = 'public' AND relkind IN ('r', 'v');" --pset=tuples_only=on ovirt_engine_history > grant.sql - Use the file you generated in the previous step to grant permissions to the history-readonly user.
# psql -U postgres -f grant.sql ovirt_engine_history
- Remove the file you used to grant permissions to history-readonly user.
# rm grant.sql
psql -U history-readonly ovirt_engine_history command. Select statements against tables and views in the ovirt_engine_history database succeed, while modifications fail.
where clause are substituted with the appropriate values for your environment and that the latest configuration is in use.
Example 19.1. Report query for resource utilization on a single host
select history_datetime as DateTime, cpu_usage_percent as CPU, memory_usage_percent as Memory
from host_configuration, host_samples_history
where host_configuration.host_id = host_samples_history.host_id
and host_name = 'example.labname.abc.company.com'
and host_configuration.history_id in (select max(a.history_id)
from host_configuration as a
where host_configuration.host_id = a.host_id)
and history_datetime >= '2011-07-01 18:45'
and history_datetime <= '2011-07-31 21:45'
Table 19.30. Resource Utilization for a Single Host Example Data
| DateTime | CPU | Memory |
|---|---|---|
| 2010-07-01 18:45 | 42 | 0 |
| 2010-07-01 18:46 | 42 | 0 |
| 2010-07-01 18:47 | 42 | 1 |
| 2010-07-01 18:48 | 33 | 0 |
| 2010-07-01 18:49 | 33 | 0 |
| 2010-07-01 18:50 | 25 | 1 |
where clause are substituted with appropriate values for your environment.
Example 19.2. Report query for resource utilization across all hosts
select extract(hour from history_datetime) as Hour, avg(cpu_usage_percent) as CPU, avg(memory_usage_percent) as Memory
from host_hourly_history
where history_datetime >= '2011-07-01' and history_datetime < '2011-07-31'
group by extract(hour from history_datetime)
order by extract(hour from history_datetime)
Table 19.31. Resource utilization across all hosts example data
| Hour | CPU | Memory |
|---|---|---|
| 0 | 39 | 40 |
| 1 | 38 | 38 |
| 2 | 37 | 32 |
| 3 | 35 | 45 |
| 4 | 35 | 37 |
| 5 | 36 | 37 |
where clause are substituted with appropriate values for your environment.
Example 19.3.
SELECT vm_name FROM vm_configuration inner join latest_tag_relations_history on (vm_configuration.vm_id = latest_tag_relations_history.entity_id) inner join latest_tag_details on (latest_tag_details.tag_id = latest_tag_relations_history.parent_id) WHERE getpathinnames(latest_tag_details.history_id) like '/root/tlv%'
Table 19.32. Tag Filtering of Latest VM Configuration
| vm_name |
|---|
| RHEL6-Pool-67 |
| RHEL6-Pool-5 |
| RHEL6-Pool-6 |
| RHEL6-23 |
Example 19.4.
SELECT vm_name, vm_type, operating_system FROM vm_configuration inner join enum_translator as vm_type_value on (vm_type_value.enum_type = 'VM_TYPE' and vm_configuration.vm_type = vm_type_value.enum_key) inner join enum_translator as os_value on (os_value.enum_type = 'OS_TYPE' and vm_configuration.operating_system = os_value.enum_key)
Table 19.33. Current Virtual Machines' Names, Types, and Operating Systems
| vm_name | vm_type | operating_system |
|---|---|---|
| RHEL6-Pool-2 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-1 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-3 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-4 | Desktop | RHEL 6 x64 |
| RHEL6-Pool-5 | Desktop | RHEL 6 x64 |
Table 19.34. Historical Statistics for Each Data Center in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| datacenter_id | uuid | The unique ID of the data center. |
| datacenter_status | smallint |
|
| minutes_in_status | decimal |
The total number of minutes that the data center was in the status shown in the datacenter_status column for the aggregation period. For example, if a data center was up for 55 minutes and in maintenance mode for 5 minutes during an hour, two rows will show for this hour. One will have a datacenter_status of Up and minutes_in_status of 55, the other will have a datacenter_status of Maintenance and a minutes_in_status of 5.
|
| datacenter_configuration_version | integer | The data center configuration version at the time of sample. |
Table 19.35. Historical Statistics for Each Storage Domain in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| storage_domain_id | uuid | Unique ID of the storage domain in the system. |
| available_disk_size_gb | integer | The total available (unused) capacity on the disk, expressed in gigabytes (GB). |
| used_disk_size_gb | integer | The total used capacity on the disk, expressed in gigabytes (GB). |
| storage_configuration_version | integer | The storage domain configuration version at the time of sample. |
Table 19.36. Historical Statistics for Each Storage Domain in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| host_id | uuid | Unique ID of the host in the system. |
| host_status | smallint |
|
| minutes_in_status | decimal |
The total number of minutes that the host was in the status shown in the status column for the aggregation period. For example, if a host was up for 55 minutes and down for 5 minutes during an hour, two rows will show for this hour. One will have a status of Up and minutes_in_status of 55, the other will have a status of Down and a minutes_in_status of 5.
|
| memory_usage_percent | smallint | Percentage of used memory on the host. |
| max_memory_usage | smallint | Percentage of used memory on the host. |
| cpu_usage_percent | smallint | Used CPU percentage on the host. |
| max_cpu_usage | smallint | The maximum CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| ksm_cpu_percent | smallint | CPU percentage ksm on the host is using. |
| max_ksm_cpu_percent | smallint | The maximum KSM usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| active_vms | smallint | The average number of active virtual machines for this aggregation. |
| max_active_vms | smallint | The maximum active number of virtual machines for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| total_vms | smallint | The average number of all virtual machines on the host for this aggregation. |
| max_total_vms | smallint | The maximum total number of virtual machines for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| total_vms_vcpus | smallint | Total number of VCPUs allocated to the host. |
| max_total_vms_vcpus | smallint | The maximum total virtual machine VCPU number for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| cpu_load | smallint | The CPU load of the host. |
| max_cpu_load | smallint | The maximum CPU load for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| system_cpu_usage_percent | smallint | Used CPU percentage on the host. |
| max_system_cpu_usage_percent | smallint | The maximum system CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| user_cpu_usage_percent | smallint | Used user CPU percentage on the host. |
| max_user_cpu_usage_percent | smallint | The maximum user CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| swap_used_mb | integer | Used swap size usage of the host in megabytes (MB). |
| max_swap_used_mb | integer | The maximum user swap size usage of the host for the aggregation period in megabytes (MB), expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| host_configuration_version | integer | The host configuration version at the time of sample. |
Table 19.37. Historical Statistics for Each Host Network Interface in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history view (rounded to minute, hour, day as per the aggregation level). |
| host_interface_id | uuid | Unique identifier of the interface in the system. |
| receive_rate_percent | smallint | Used receive rate percentage on the host. |
| max_receive_rate_percent | smallint | The maximum receive rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| transmit_rate_percent | smallint | Used transmit rate percentage on the host. |
| max_transmit_rate_percent | smallint | The maximum transmit rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| host_interface_configuration_version | integer | The host interface configuration version at the time of sample. |
Table 19.38. Historical statistics for the virtual machines in the system
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| vm_id | uuid | Unique ID of the virtual machine in the system. |
| vm_status | smallint |
|
| minutes_in_status | decimal | The total number of minutes that the virtual machine was in the status shown in the status column for the aggregation period. For example, if a virtual machine was up for 55 minutes and down for 5 minutes during an hour, two rows will show for this hour. One will have a status of Up and minutes_in_status, the other will have a status of Down and a minutes_in_status of 5. |
| cpu_usage_percent | smallint | The percentage of the CPU in use by the virtual machine. |
| max_cpu_usage | smallint | The maximum CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| memory_usage_percent | smallint | Percentage of used memory in the virtual machine. The guest tools must be installed on the virtual machine for memory usage to be recorded. |
| max_memory_usage | smallint | The maximum memory usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. The guest tools must be installed on the virtual machine for memory usage to be recorded. |
| user_cpu_usage_percent | smallint | Used user CPU percentage on the host. |
| max_user_cpu_usage_percent | smallint | The maximum user CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregation, it is the maximum hourly average value. |
| system_cpu_usage_percent | smallint | Used system CPU percentage on the host. |
| max_system_cpu_usage_percent | smallint | The maximum system CPU usage for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| vm_ip | varchar(255) | The IP address of the first NIC. Only shown if the guest agent is installed. |
| current_user_name | varchar(255) | Name of user logged into the virtual machine console, if a guest agent is installed. |
| currently_running_on_host | uuid | The unique ID of the host the virtual machine is running on. |
| vm_configuration_version | integer | The virtual machine configuration version at the time of sample. |
| current_host_configuration_version | integer | The current host the virtual machine is running on. |
Table 19.39. Historical Statistics for the Virtual Machine Network Interfaces in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| vm_interface_id | uuid | Unique identifier of the interface in the system. |
| receive_rate_percent | smallint | Used receive rate percentage on the host. |
| max_receive_rate_percent | smallint | The maximum receive rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| transmit_rate_percent | smallint | Used transmit rate percentage on the host. |
| max_transmit_rate_percent | smallint | The maximum transmit rate for the aggregation period, expressed as a percentage. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average rate. |
| vm_interface_configuration_version | integer | The virtual machine interface configuration version at the time of sample. |
Table 19.40. Historical Statistics for the Virtual Disks in the System
| Name | Type | Description |
|---|---|---|
| history_id | integer | The unique ID of this row in the table. |
| history_datetime | timestamp with time zone | The timestamp of this history row (rounded to minute, hour, day as per the aggregation level). |
| vm_disk_id | uuid | Unique ID of the disk in the system. |
| vm_disk_status | integer |
|
| minutes_in_status | decimal |
The total number of minutes that the virtual machine disk was in the status shown in the status column for the aggregation period. For example, if a virtual machine disk was locked for 55 minutes and OK for 5 minutes during an hour, two rows will show for this hour. One will have a status of Locked and minutes_in_status of 55, the other will have a status of OK and a minutes_in_status of 5.
|
| vm_disk_actual_size_mb | integer | The actual size allocated to the disk. |
| read_rate_bytes_per_second | integer | Read rate to disk in bytes per second. |
| max_read_rate_bytes_per_second | integer | The maximum read rate for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| read_latency_seconds | decimal | The virtual machine disk read latency measured in seconds. |
| max_read_latency_seconds | decimal | The maximum write latency for the aggregation period, measured in seconds. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| write_rate_bytes_per_second | integer | Write rate to disk in bytes per second. |
| max_write_rate_bytes_per_second | integer | The maximum write rate for the aggregation period. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| write_latency_seconds | decimal | The virtual machine disk write latency measured in seconds. |
| max_write_latency_seconds | decimal | The maximum write latency for the aggregation period, measured in seconds. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| flush_latency_seconds | decimal | The virtual machine disk flush latency measured in seconds. |
| max_flush_latency_seconds | decimal | The maximum flush latency for the aggregation period, measured in seconds. For hourly aggregations, this is the maximum collected sample value. For daily aggregations, it is the maximum hourly average value. |
| vm_disk_configuration_version | integer | The virtual machine disk configuration version at the time of sample. |
Note
delete_date does not appear in latest views because these views provide the latest configuration of living entities, which, by definition, have not been deleted.
Table 19.41. v3_2_configuration_history_datacenters
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| datacenter_id | uuid | The unique ID of the data center in the system. |
| datacenter_name | varchar(40) | Name of the data center, as displayed in the edit dialog. |
| datacenter_description | varchar(4000) | Description of the data center, as displayed in the edit dialog. |
| storage_type | smallint |
|
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.42. v3_2_map_history_datacenters_storage_domains
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| storage_domain_id | uuid | The unique ID of this storage domain in the system. |
| datacenter_id | uuid | The unique ID of the data center in the system. |
| attach_date | timestamp with time zone | The date the storage domain was attached to the data center. |
| detach_date | timestamp with time zone | The date the storage domain was detached from the data center. |
Table 19.43. v3_2_configuration_history_storage_domains
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| storage_domain_id | uuid | The unique ID of this storage domain in the system. |
| storage_domain_name | varchar(250) | Storage domain name. |
| storage_domain_type | smallint |
|
| storage_type | smallint |
|
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.44. v3_2_configuration_history_clusters
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| cluster_id | uuid | The unique identifier of the datacenter this cluster resides in. |
| cluster_name | varchar(40) | Name of the cluster, as displayed in the edit dialog. |
| cluster_description | varchar(4000) | As defined in the edit dialog. |
| datacenter_id | uuid | The unique identifier of the datacenter this cluster resides in. |
| cpu_name | varchar(255) | As displayed in the edit dialog. |
| compatibility_version | varchar(40) | As displayed in the edit dialog. |
| datacenter_configuration_version | integer | The data center configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.45. v3_2_configuration_history_hosts
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| host_id | uuid | The unique ID of the host in the system. |
| host_unique_id | varchar(128) | This field is a combination of the host physical UUID and one of its MAC addresses, and is used to detect hosts already registered in the system. |
| host_name | varchar(255) | Name of the host (same as in the edit dialog). |
| cluster_id | uuid | The unique ID of the cluster that this host belongs to. |
| host_type | smallint |
|
| fqdn_or_ip | varchar(255) | The host's DNS name or its IP address for Red Hat Enterprise Virtualization Manager to communicate with (as displayed in the edit dialog). |
| memory_size_mb | integer | The host's physical memory capacity, expressed in megabytes (MB). |
| swap_size_mb | integer | The host swap partition size. |
| cpu_model | varchar(255) | The host's CPU model. |
| number_of_cores | smallint | Total number of CPU cores in the host. |
| host_os | varchar(255) | The host's operating system version. |
| pm_ip_address | varchar(255) | Power Management server IP address. |
| kernel_version | varchar(255) | The host's kernel version. |
| kvm_version | varchar(255) | The host's KVM version. |
| vdsm_version | varchar(40) | The host's VDSM version. |
| vdsm_port | integer | As displayed in the edit dialog. |
| cluster_configuration_version | integer | The cluster configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.46. v3_2_configuration_history_hosts_interfaces
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| host_interface_id | uuid | The unique ID of this interface in the system. |
| host_interface_name | varchar(50) | The interface name as reported by the host. |
| host_id | uuid | Unique ID of the host this interface belongs to. |
| host_interface_type | smallint |
|
| host_interface_speed_bps | integer | The interface speed in bits per second. |
| mac_address | varchar(20) | The interface MAC address. |
| network_name | varchar(50) | The logical network associated with the interface. |
| ip_address | varchar(50) | As displayed in the edit dialog. |
| gateway | varchar(20) | As displayed in the edit dialog. |
| bond | Boolean | A flag to indicate if this interface is a bonded interface. |
| bond_name | varchar(50) | The name of the bond this interface is part of (if it is part of a bond). |
| vlan_id | integer | As displayed in the edit dialog. |
| host_configuration_version | integer | The host configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.47. v3_2_configuration_history_vms
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_id | uuid | The unique ID of this VM in the system. |
| vm_name | varchar(255) | The name of the VM. |
| vm_description | varchar(4000) | As displayed in the edit dialog. |
| vm_type | smallint |
|
| cluster_id | uuid | The unique ID of the cluster this VM belongs to. |
| template_id | uuid | The unique ID of the template this VM is derived from. The field is for future use, as the templates are not synchronized to the history database in this version. |
| template_name | varchar(40) | Name of the template from which this VM is derived. |
| cpu_per_socket | smallint | Virtual CPUs per socket. |
| number_of_sockets | smallint | Total number of virtual CPU sockets. |
| memory_size_mb | integer | Total memory allocated to the VM, expressed in megabytes (MB). |
| operating_system | smallint |
|
| ad_domain | varchar(40) | As displayed in the edit dialog. |
| default_host | uuid | As displayed in the edit dialog, the ID of the default host in the system. |
| high_availability | Boolean | As displayed in the edit dialog. |
| initialized | Boolean | A flag to indicate if this VM was started at least once for Sysprep initialization purposes. |
| stateless | Boolean | As displayed in the edit dialog. |
| fail_back | Boolean | As displayed in the edit dialog. |
| usb_policy | smallint | As displayed in the edit dialog. |
| time_zone | varchar(40) | As displayed in the edit dialog. |
| cluster_configuration_version | integer | The cluster configuration version at the time of creation or update. |
| default_host_configuration_version | integer | The host configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.48. v3_2_configuration_history_vms_interfaces
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_interface_id | uuid | The unique ID of this interface in the system. |
| vm_interface_name | varchar(50) | As displayed in the edit dialog. |
| vm_id | uuid | The ID of the virtual machine this interface belongs to. |
| vm_interface_type | smallint |
The type of the virtual interface.
|
| vm_interface_speed_bps | integer | The average speed of the interface during the aggregation in bits per second. |
| mac_address | varchar(20) | As displayed in the edit dialog. |
| network_name | varchar(50) | As displayed in the edit dialog. |
| vm_configuration_version | integer | The virtual machine configuration version at the time of creation or update. |
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Table 19.49. disks_vm_map table
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_disk_id | uuid | The unique ID of this virtual disk in the system. |
| vm_id | uuid | The unique ID of the virtual machine in the system. |
| attach_date | timestamp with time zone | The date the virtual disk was attached to the virtual machine. |
| detach_date | timestamp with time zone | The date the virtual disk was detached from the virtual machine. |
Table 19.50. v3_2_configuration_history_vms_disks
| Name | Type | Description |
|---|---|---|
| history_id | integer | The ID of the configuration version in the history database. |
| vm_disk_id | uuid | The unique ID of this disk in the system. |
| vm_disk_description | varchar(4000) | As displayed in the edit dialog. |
| storage_domain_id | uuid | The ID of the storage domain this disk image belongs to. |
| vm_disk_size_mb | integer | The defined size of the disk in megabytes (MB). |
| vm_disk_type | integer |
As displayed in the edit dialog. Only System and data are currently used.
|
| vm_disk_format | integer |
As displayed in the edit dialog.
|
| vm_disk_interface | integer |
|
| create_date | timestamp with time zone | The date this entity was added to the system. |
| update_date | timestamp with time zone | The date this entity was changed in the system. |
| delete_date | timestamp with time zone | The date this entity was deleted from the system. |
Designer, in the Reports Portal. For more information on dashboards, consult the JasperReports documentation by clicking the in the top menu bar of the Reports Portal.
Inventory Dashboard provides an executive summary of the inventory of a data center over a given period of time. The dashboard includes average disk use, number of active virtual machines, and a breakdown of host operating systems. The following parameters can be modified for this dashboard:
Table 19.51. Inventory Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Trends Dashboard provides an executive summary of the trends in a data center over a given period of time. The dashboard includes graphs of CPU and memory usage over time for the most highly utilized hosts and virtual machines in the data center. The following parameters can be modified for this dashboard:
Table 19.52. Trends Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Uptime Dashboard provides an executive summary of the service level and uptime for a data center over a given period of time. The dashboard includes details on total uptime for each cluster in the data center for the period. The following parameters can be modified for this dashboard:
Table 19.53. Uptime Dashboard Parameters
| Parameter | Description |
|---|---|
Show Deleted Entities?
| The report includes deleted objects, such as data centers, clusters, and hosts removed from the environment. |
Period Range
|
The dashboard shows data for the period range selected. Monthly dashboards cover a single month. Quarterly dashboards cover a three-month quarter, beginning on the month specified in the Dates parameter.
|
Dates
| The dashboard covers the selected period range, beginning on this date. For a Monthly period range, the selected month is used. For a Quarterly period range, the quarter is determined as beginning on the selected month. |
Data Center
|
The report refers to the selected data center. The list of options shows only data centers containing either hosts, storage domains or virtual machines. The list of options for the Cluster parameter includes only clusters in the selected data center.
|
Datacenter Dashboard, Cluster Dashboard, and System Dashboard.
rhevm-setup script is able to configure the firewall automatically, but this will overwrite any pre-existing firewall configuration.
rhevm-setup command will save a list of the iptables rules required in the /usr/share/ovirt-engine/conf/iptables.example file.
80 and 443) listed here.
Table A.1. Red Hat Enterprise Virtualization Manager Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| - | ICMP |
|
| When registering to the Red Hat Enterprise Virtualization Manager, virtualization hosts send an ICMP ping request to the Manager to confirm that it is online. |
| 22 | TCP |
|
| SSH (optional) |
| 80, 443 | TCP |
|
|
Provides HTTP and HTTPS access to the Manager.
|
Important
NFSv4
- TCP port
2049for NFS.
NFSv3
- TCP and UDP port
2049for NFS. - TCP and UDP port
111(rpcbind/sunrpc). - TCP and UDP port specified with
MOUNTD_PORT="port" - TCP and UDP port specified with
STATD_PORT="port" - TCP port specified with
LOCKD_TCPPORT="port" - UDP port specified with
LOCKD_UDPPORT="port"
MOUNTD_PORT, STATD_PORT, LOCKD_TCPPORT, and LOCKD_UDPPORT ports are configured in the /etc/sysconfig/nfs file.
Table A.2. Virtualization Host Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| 22 | TCP |
|
| Secure Shell (SSH) access. |
| 5900 - 6411 | TCP |
|
|
Remote guest console access via VNC and SPICE. These ports must be open to facilitate client access to virtual machines.
|
| 5989 | TCP, UDP |
|
|
Used by Common Information Model Object Managers (CIMOM) to monitor virtual machines running on the virtualization host. If you wish to use a CIMOM to monitor the virtual machines in your virtualization environment then you must ensure that this port is open.
|
| 16514 | TCP |
|
|
Virtual machine migration using
libvirt.
|
| 49152 - 49216 | TCP |
|
|
Virtual machine migration and fencing using VDSM. These ports must be open facilitate both automated and manually initiated migration of virtual machines.
|
| 54321 | TCP |
|
|
VDSM communications with the Manager and other virtualization hosts.
|
Example A.1. Option Name: IPTablesConfig
*filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A INPUT -p icmp -j ACCEPT -A INPUT -i lo -j ACCEPT # vdsm -A INPUT -p tcp --dport 54321 -j ACCEPT # libvirt tls -A INPUT -p tcp --dport 16514 -j ACCEPT # SSH -A INPUT -p tcp --dport 22 -j ACCEPT # guest consoles -A INPUT -p tcp -m multiport --dports 5634:6166 -j ACCEPT # migration -A INPUT -p tcp -m multiport --dports 49152:49216 -j ACCEPT # snmp -A INPUT -p udp --dport 161 -j ACCEPT # Reject any other input traffic -A INPUT -j REJECT --reject-with icmp-host-prohibited -A FORWARD -m physdev ! --physdev-is-bridged -j REJECT --reject-with icmp-host-prohibited COMMIT
Table A.3. Host Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| 88, 464 | TCP, UDP |
|
| Kerberos authentication. |
| 389, 636 | TCP |
|
| Lightweight Directory Access Protocol (LDAP) and LDAP over SSL. |
Table A.4. Host Firewall Requirements
| Port(s) | Protocol | Source | Destination | Purpose |
|---|---|---|---|---|
| 5432 | TCP, UDP |
|
| Default port for PostgreSQL database connections. |
/usr/libexec/vdsm/hooks/nn_event-name/ on the host in alphanumeric order. By convention each hook script is assigned a two digit number, included at the front of the file name, to ensure that the order in which the scripts will be run in is clear. You are able to create hook scripts in any programming language, Python will however be used for the examples contained in this chapter.
Warning
Table B.1. Supported VDSM Events
| Name | Description |
|---|---|
| before_vm_start | Before virtual machine starts. |
| after_vm_start | After virtual machine starts. |
| before_vm_cont | Before virtual machine continues. |
| after_vm_cont | After virtual machine continues. |
| before_vm_pause | Before virtual machine pauses. |
| after_vm_pause | After virtual machine pauses. |
| before_vm_hibernate | Before virtual machine hibernates. |
| after_vm_hibernate | After virtual machine hibernates. |
| before_vm_dehibernate | Before virtual machine de-hibernates. |
| after_vm_dehibernate | After virtual machine de-hibernates. |
| before_vm_migrate_source | Before virtual machine migration, run on the source hypervisor host from which the migration is occurring. |
| after_vm_migrate_source | After virtual machine migration, run on the source hypervisor host from which the migration is occurring. |
| before_vm_migrate_destination | Before virtual machine migration, run on the destination hypervisor host to which the migration is occurring. |
| after_vm_migrate_destination | After virtual machine migration, run on the destination hypervisor host to which the migration is occurring. |
| after_vm_destroy | After virtual machine destruction. |
| before_vdsm_start |
Before VDSM is started on the hypervisor host. before_vdsm_start hooks are executed as the user root, and do not inherit the environment of the VDSM process.
|
| after_vdsm_stop |
After VDSM is stopped on the hypervisor host. after_vdsm_stop hooks are executed as the user root, and do not inherit the environment of the VDSM process.
|
| before_nic_hotplug | Before the NIC is hot plugged into the virtual machine. |
| after_nic_hotplug | After the NIC is hot plugged into the virtual machine. |
| before_nic_hotunplug | Before the NIC is hot unplugged from the virtual machine |
| after_nic_hotunplug | After the NIC is hot unplugged from the virtual machine. |
| after_nic_hotplug_fail | After hot plugging the NIC to the virtual machine fails. |
| after_nic_hotunplug_fail | After hot unplugging the NIC from the virtual machine fails. |
vdsm user and inherit the environment of the VDSM process. The exceptions are hook scripts triggered by the before_vdsm_start and after_vdsm_stop events. Hook scripts triggered by these events run as the root user and do not inherit the environment of the VDSM process.
_hook_domxml variable is appended to the environment. This variable contains the path of the libvirt domain XML representation of the relevant virtual machine. The exceptions to this rule are *_nic_hotplug_* and *_nic_hotunplug_* hooks, in which the _hook_domxml variable contains the XML representation of the NIC, not the virtual machine.
vmId.
Important
before_migration_destination and before_dehibernation hooks currently receive the XML of the domain from the source host. The XML of the domain at the destination will have various differences.
rhevm-config. Run this command as the root user on the host where Red Hat Enterprise Virtualization Manager is installed.
UserDefinedVMProperties is used to store the names of the custom properties supported. Regular expressions defining the valid values for each named custom property are also contained in this configuration key.
ovirt-engine service must be restarted for it to take effect.
Example B.1. Defining smartcard Custom Property
- Check the existing custom properties defined by the
UserDefinedVMPropertiesconfiguration key usingrhevm-config -g UserDefinedVMProperties.In this case the custom propertymemoryis already defined. The regular expression^[0-9]+$ensures that the custom property will only ever contain numeric characters.# rhevm-config -g UserDefinedVMProperties UserDefinedVMProperties : version: general UserDefinedVMProperties : version: 2.2 UserDefinedVMProperties : memory=^[0-9]+$ version: 3.2
- As the
memorycustom property is already defined in theUserDefinedVMPropertiesconfiguration key the new custom property must be appended to it. The additional custom property,smartcard, is added to the configuration key's value. The new custom property is able to hold a value oftrueorfalse.# rhevm-config -s UserDefinedVMProperties='memory=^[0-9]+$;smartcard=^(true|false)$' --cver=3.2
- Verify that the custom properties defined by the
UserDefinedVMPropertiesconfiguration key now match your expectations.# rhevm-config -g UserDefinedVMProperties UserDefinedVMProperties : version: general UserDefinedVMProperties : version: 2.2 UserDefinedVMProperties : memory=^[0-9]+$;smartcard=^(true|false)$ version: 3.2
- Finally, the
ovirt-engineservice must be restarted for the configuration change to take effect.# service ovirt-engine restart
Prerequisites:
Prerequisites:
Example B.2. Evaluating Custom Properties
key1. If the custom property is set then the value is printed to standard error. If the custom property is not set then no action is taken.
#!/usr/bin/python
import os
import sys
if os.environ.has_key('key1'):
sys.stderr.write('key1 value was : %s\n' % os.environ['key1'])
else:
sys.exit(0)
xml.dom library (http://docs.python.org/release/2.6/library/xml.dom.html) to manipulate the object.
Table B.2. Hooking module functions
| Name | Argument | Description |
|---|---|---|
tobool
| string | Converts a string "true" or "false" to a Boolean value |
read_domxml
| - | Reads the virtual machine's libvirt XML into a DOM object |
write_domxml
| DOM object | Writes the virtual machine's libvirt XML from a DOM object |
before_vm_start scripts can edit the domain XML in order to change VDSM's definition of a virtual machine before it reaches libvirt. Caution must be exercised in doing so. Hook scripts have the potential to disrupt the operation of VDSM, and buggy scripts can result in outages to the Red Hat Enterprise Virtualization environment. In particular, ensure you never change the uuid of the domain, and do not attempt to remove a device from the domain without sufficient background knowledge.
before_vdsm_start and after_vdsm_stop hook scripts are run as the root user. Other hook scripts that require root access to the system must be written to use the sudo command for privilege escalation. To support this the /etc/sudoers must be updated to allow the vdsm user to use sudo without reentering a password. This is required as hook scripts are executed non-interactively.
Example B.3. Configuring sudo for VDSM Hooks
sudo command will be configured to allow the vdsm user to run the /bin/chown command as root.
- Log into the virtualization host as
root. - Open the
/etc/sudoersfile in a text editor. - Add this line to the file:
vdsm ALL=(ALL) NOPASSWD: /bin/chown
This specifies that thevdsmuser has the ability to run the/bin/chowncommand as therootuser. TheNOPASSWDparameter indicates that the user will not be prompted to enter their password when callingsudo.
sudo command to run /bin/chown as root. This Python code uses sudo to execute /bin/chown as root on the file /my_file.
retcode = subprocess.call( ["/usr/bin/sudo", "/bin/chown", "root", "/my_file"] )
Table B.3. Hook Return Codes
| Code | Description |
|---|---|
| 0 | The hook script ended successfully |
| 1 | The hook script failed, other hooks should be processed |
| 2 | The hook script failed, no further hooks should be processed |
| >2 | Reserved |
Example B.4. NUMA Node Tuning
numaset custom property. Where the custom property is not set no action is taken.
numaset=^(interleave|strict|preferred):[\^]?\d+(-\d+)?(,[\^]?\d+(-\d+)?)*$
numaset custom property for a given virtual machine to specify both the allocation mode (interleave, strict, preferred) and the node to use. The two values are separated by a colon (:). The regular expression allows specification of the nodeset as:
- that a specific node (
numaset=strict:1, specifies that only node 1 be used), or - that a range of nodes be used (
numaset=strict:1-4, specifies that nodes 1 through 4 be used), or - that a specific node not be used (
numaset=strict:^3, specifies that node 3 not be used), or - any comma-separated combination of the above (
numaset=strict:1-4,6, specifies that nodes 1 to 4, and 6 be used).
/usr/libexec/vdsm/hooks/before_vm_start/50_numa
#!/usr/bin/python
import os
import sys
import hooking
import traceback
'''
numa hook
=========
add numa support for domain xml:
<numatune>
<memory mode="strict" nodeset="1-4,^3" />
</numatune>
memory=interleave|strict|preferred
numaset="1" (use one NUMA node)
numaset="1-4" (use 1-4 NUMA nodes)
numaset="^3" (don't use NUMA node 3)
numaset="1-4,^3,6" (or combinations)
syntax:
numa=strict:1-4
'''
if os.environ.has_key('numa'):
try:
mode, nodeset = os.environ['numa'].split(':')
domxml = hooking.read_domxml()
domain = domxml.getElementsByTagName('domain')[0]
numas = domxml.getElementsByTagName('numatune')
if not len(numas) > 0:
numatune = domxml.createElement('numatune')
domain.appendChild(numatune)
memory = domxml.createElement('memory')
memory.setAttribute('mode', mode)
memory.setAttribute('nodeset', nodeset)
numatune.appendChild(memory)
hooking.write_domxml(domxml)
else:
sys.stderr.write('numa: numa already exists in domain xml')
sys.exit(2)
except:
sys.stderr.write('numa: [unexpected error]: %s\n' % traceback.format_exc())
sys.exit(2)
- Plugin discovery.
- Plugin loading.
- Plugin bootstrapping.
HTTP GET), User Interface plugin infrastructure attempts to discover and load plugin descriptors from your local file system. For each plugin descriptor, the infrastructure also attempts to load corresponding plugin user configurations used to override default plugin-specific configurations (if any exist) and tweak plugin runtime behavior. Plugin user configuration is optional. After loading descriptors and corresponding user configuration files, oVirt Engine aggregates User Interface plugin data and embeds it into the administration portal HTML page for runtime evaluation.
$ENGINE_USR/ui-plugins, with a default mapping of ENGINE_USR=/usr/share/ovirt-engine as defined by oVirt Engine local configuration. Plugin descriptors are expected to comply with JSON format specifications, but plugin descriptors allow Java/C++ style comments (of both /* and // varieties) in addition to the JSON format specifications.
$ENGINE_ETC/ui-plugins, with a default mapping of ENGINE_ETC=/etc/ovirt-engine as defined by oVirt Engine local configuration. Plugin user configuration files are expected to comply with same content format rules as plugin descriptors.
Note
<descriptorFileName>-config.json naming convention.
Procedure C.1. Plugin Bootstrap Sequence
- Obtain pluginApi instance for the given plugin
- Obtain runtime plugin configuration object (optional)
- Register relevant event handler functions
- Notify UI plugin infrastructure to proceed with plugin initialization
// Access plugin API using 'parent' due to this code being evaluated within the context of an iframe element.
// As 'parent.pluginApi' is subject to Same-Origin Policy, this will only work when WebAdmin HTML page and plugin
// host page are served from same origin. WebAdmin HTML page and plugin host page will always be on same origin
// when using UI plugin infrastructure support to serve plugin resource files.
var api = parent.pluginApi('MyPlugin');
// Runtime configuration object associated with the plugin (or an empty object).
var config = api.configObject();
// Register event handler function(s) for later invocation by UI plugin infrastructure.
api.register({
// UiInit event handler function.
UiInit: function() {
// Handle UiInit event.
window.alert('Favorite music band is ' + config.band);
}
});
// Notify UI plugin infrastructure to proceed with plugin initialization.
api.ready();
Table C.1. UI Plugin-related Files and their Locations
| File | Location | Remarks |
|---|---|---|
| Plugin descriptor files (meta-data) |
/usr/share/ovirt-engine/ui-plugins/my-plugin.json
| |
| Plugin user configuration files |
/etc/ovirt-engine/ui-plugins/my-plugin-config.json
| |
| Plugin resource files |
/usr/share/ovirt-enging/ui-plugins/<resourcePath>/PluginHostPage.html
|
<resourcePath> is defined by the corresponding attribute in the plugin descriptor.
|
Hello World! program when you sign in to the Red Hat Enterprise Virtualization Manager administration portal.
Procedure C.2. Deploying a Hello World! Plugin
- Create a plugin descriptor by creating the following file in the Manager at
/usr/share/ovirt-engine/ui-plugins/helloWorld.json:{ "name": "HelloWorld", "url": "/webadmin/webadmin/plugin/HelloWorld/start.html", "resourcePath": "hello-files" } - Create the plugin host page by creating the following file in the Manager at
/usr/share/ovirt-engine/ui-plugins/hello-files/start.html:<!DOCTYPE html><html><head> <script> var api = parent.pluginApi('HelloWorld'); api.register({ UiInit: function() { window.alert('Hello world'); } }); api.ready(); </script> </head><body></body></html>
Hello World! plugin, you will see this screen when you sign in to the administration portal:
Procedure C.3. Installing the Red Hat Support Plugin
Note
- Use yum to install the redhat-support-plugin-rhev plugin:
#yum install redhat-support-plugin-rhev
Note
Red Hat Search: field. Search results display in the left-hand navigation list in the details pane.
Red Hat Access from the context menu, and a window opens that allows you to search for solutions in the knowledge base.
Open New Support Case radio button.
Modify Existing Case radio button.
Red Hat Documentation tab to open the documentation relevant to the part of the Administration Portal currently on the screen.
Note
Procedure D.1. Replacing the Red Hat Enterprise Virtualization Manager Apache SSL Certificate
- The Manager has been configured to use
/etc/pki/ovirt-engine/apache-ca.pem, which is symbolically linked to/etc/pki/ovirt-engine/ca.pem. Remove the symbolic link.# rm /etc/pki/ovirt-engine/apache-ca.pem
- Save your commercially issued certificate as
/etc/pki/ovirt-engine/apache-ca.pem.mv
YOUR-3RD-PARTY-CERT.pem /etc/pki/ovirt-engine/apache-ca.pem - Move your P12 bundle to
/etc/pki/ovirt-engine/keys/apache.p12. - Extract the key from the bundle.
# openssl pkcs12 -in /etc/pki/ovirt-engine/keys/apache.p12 -nocerts -nodes > /etc/pki/ovirt-engine/keys/apache.key.nopass
- Extract the certificate from the bundle.
# openssl pkcs12 -in /etc/pki/ovirt-engine/keys/apache.p12 -nokeys > /etc/pki/ovirt-engine/certs/apache.cer
- Restart the Apache server.
# service httpd restart
- E.1.1. Performing Searches in Red Hat Enterprise Virtualization
- E.1.2. Search Syntax and Examples
- E.1.3. Search Auto-Completion
- E.1.4. Search Result Type Options
- E.1.5. Search Criteria
- E.1.6. Search: Multiple Criteria and Wildcards
- E.1.7. Search: Determining Search Order
- E.1.8. Searching for Data Centers
- E.1.9. Searching for Clusters
- E.1.10. Searching for Hosts
- E.1.11. Searching for Networks
- E.1.12. Searching for Storage
- E.1.13. Searching for Disks
- E.1.14. Searching for Volumes
- E.1.15. Searching for Virtual Machines
- E.1.16. Searching for Pools
- E.1.17. Searching for Templates
- E.1.18. Searching for Users
- E.1.19. Searching for Events
result type: {criteria} [sortby sort_spec]
Table E.1. Example Search Queries
| Example | Result |
|---|---|
| Hosts: Vms.status = up | Displays a list of all hosts running virtual machines that are up. |
| Vms: domain = qa.company.com | Displays a list of all virtual machines running on the specified domain. |
| Vms: users.name = Mary | Displays a list of all virtual machines belonging to users with the username Mary. |
| Events: severity > normal sortby time | Displays the list of all Events whose severity is higher than Normal, sorted by time. |
Hosts: Vms.status = down
Table E.2. Example Search Queries Using Auto-Completion
| Input | List Items Displayed | Action |
|---|---|---|
h
|
Hosts (1 option only)
|
Select
Hosts or;
Type
Hosts
|
Hosts:
|
All host properties
|
Type v
|
Hosts: v
|
host properties starting with a v
|
Select Vms or type Vms
|
Hosts: Vms
| All virtual machine properties |
Type s
|
Hosts: Vms.s
|
All virtual machine properties beginning with s
|
Select status or type status
|
Hosts: Vms.status
|
=
=!
|
Select or type =
|
Hosts: Vms.status =
| All status values |
Select or type down
|
- Vms for a list of virtual machines
- Host for a list of hosts
- Pools for a list of pools
- Template for a list of templates
- Event for a list of events
- Users for a list of users
- Cluster for a list of clusters
- Datacenter for a list of data centers
- Storage for a list of storage domains
{criteria} is as follows:
<prop><operator><value>
<obj-type><prop><operator><value>
Table E.3. Example Search Criteria
| Part | Description | Values | Example | Note |
|---|---|---|---|---|
| prop |
The property of the searched-for resource. Can also be the property of a resource type (see obj-type), or tag (custom tag).
| Limit your search to objects with a certain property. For example, search for objects with a status property. | Status | -- |
| obj-type | A resource type that can be associated with the searched-for resource. | These are system objects, like data centers and virtual machines. | Users | -- |
| operator | Comparison operators. |
=
!= (not equal)
>
<
>=
<=
| -- | Value options depend on obj-type. |
| Value | What the expression is being compared to. |
String
Integer
Ranking
Date (formatted according to Regional Settings)
|
Jones
256
normal
|
|
<value> part of the syntax for strings. For example, to find all users beginning with m, enter m*.
AND and OR. For example:
Vms: users.name = m* AND status = Up
Vms: users.name = m* AND tag = "paris-loc"
AND or OR, AND is implied. AND precedes OR, and OR precedes implied AND.
sortby. Sort direction (asc for ascending, desc for descending) can be included.
events: severity > normal sortby time desc
Table E.4. Searching for Data Centers
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Clusters.clusters-prop
| Depends on property type | The property of the clusters associated with the data center. |
| name | String | The name of the data center. |
| description | String | A description of the data center. |
| type | String | The type of data center. |
| status | List | The availability of the data center. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to display per page. |
Datacenter: type = nfs and status != up
- A storage type of NFS and status other than up
Table E.5. Searching Clusters
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Datacenter.datacenter-prop
| Depends on property type | The property of the data center associated with the cluster. |
| Datacenter | String | The data center to which the cluster belongs. |
| name | String | The unique name that identifies the clusters on the network. |
| description | String | The description of the cluster. |
| initialized | String | True or False indicating the status of the cluster. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to diplay per page. |
Clusters: initialized = true or name = Default
- initialized; or
- named Default
Table E.6. Searching for Hosts
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| Depends on property type | The property of the virtual machines associated with the host. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the host. |
Events.events-prop
| Depends on property type | The property of the events associated with the host. |
Users.users-prop
| Depends on property type | The property of the users associated with the host. |
| name | String | The name of the host. |
| status | List | The availability of the host. |
| cluster | String | The cluster to which the host belongs. |
| address | String | The unique name that identifies the host on the network. |
| cpu_usage | Integer | The percent of processing power used. |
| mem_usage | Integer | The percentage of memory used. |
| network_usage | Integer | The percentage of network usage. |
| load | Integer | Jobs waiting to be executed in the run-queue per processor, in a given time slice. |
| version | Integer | The version number of the operating system. |
| cpus | Integer | The number of CPUs on the host. |
| memory | Integer | The amount of memory available. |
| cpu_speed | Integer | The processing speed of the CPU. |
| cpu_model | String | The type of CPU. |
| active_vms | Integer | The number of Vms currently running. |
| migrating_vms | Integer | The number of Vms currently being migrated. |
| committed_mem | Integer | The percentage of committed memory. |
| tag | String | The tag assigned to the host. |
| type | String | The type of host. |
| datacenter | String | The data center to which the host belongs. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to display per page. |
Hosts: cluster = Default and Vms.os = rhel6
- Are part of the Default cluster and host virtual machines running the Red Hat Enterprise Linux 6 operating system.
Table E.7. Searching for Networks
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Cluster_network.clusternetwork-prop
| Depends on property type | The property of the cluster associated with the network. |
Host_Network.hostnetwork-prop
| Depends on property type | The property of the host associated with the network. |
| name | String | The human readable name that identifies the network. |
| description | String | Keywords or text describing the network, optionally used when creating the network. |
| vlanid | Integer | The VLAN ID of the network. |
| stp | String | Whether Spanning Tree Protocol (STP) is enabled or disabled for the network. |
| mtu | Integer | The maximum transmission unit for the logical network. |
| vmnetwork | String | Whether the network is only used for virtual machine traffic. |
| datacenter | String | The data center to which the network is attached. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Network: mtu > 1500 and vmnetwork = true
- with a maximum transmission unit greater than 1500 bytes
- which are set up for use by only virtual machines.
Table E.8. Searching for Storage
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the storage. |
Clusters.clusters-prop
| Depends on property type | The property of the clusters associated with the storage. |
| name | String | The unique name that identifies the storage on the network. |
| status | String | The status of the storage domain. |
| datacenter | String | The data center to which the storage belongs. |
| type | String | The type of the storage. |
| size | Integer | The size of the storage. |
| used | Integer | The amount of the storage that is used. |
| committed | Integer | The amount of the storage that is committed. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The number of results to display per page. |
Storage: size > 200 or used < 50
- total storage space greater than 200 GB; or
- used storage space less than 50 GB.
Table E.9. Searching for Disks
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Datacenters.datacenters-prop
| Depends on property type | The property of the data centers associated with the disk. |
Storages.storages-prop
| Depends on property type | The property of the storage associated with the disk. |
| alias | String | The human readable name that identifies the storage on the network. |
| description | String | Keywords or text describing the disk, optionally used when creating the disk. |
| provisioned_size | Integer | The virtual size of the disk. |
| size | Integer | The size of the disk. |
| actual_size | Integer | The actual size allocated to the disk. |
| creation_date | Integer | The date the disk was created. |
| bootable | String |
Whether the disk can or cannot be booted. Valid values are one of 0, 1, yes, or no
|
| shareable | String |
Whether the disk can or cannot be attached to more than one virtual machine at a time. Valid values are one of 0, 1, yes, or no
|
| format | String |
The format of the disk. Can be one of unused, unassigned, cow, or raw.
|
| status | String |
The status of the disk. Can be one of unassigned, ok, locked, invalid, or illegal.
|
| disk_type | String |
The type of the disk. Can be one of image or lun.
|
| number_of_vms | Integer | The number of virtual machine(s) to which the disk is attached. |
| vm_names | String | The name(s) of the virtual machine(s) to which the disk is attached. |
| quota | String | The name of the quota enforced on the virtual disk. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Disks: format = cow and provisioned_size > 8
- Qcow, also known as thin provisioning, format; and
- an allocated disk size greater than 8 GB.
Table E.10. Searching for Volumes
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Volume.cluster-prop
| Depends on property type | The property of the clusters associated with the volume. |
| Cluster | String | The name of the cluster associated with the volume. |
| name | String | The human readable name that identifies the volume. |
| type | String | Can be one of distribute, replicate, distributed_replicate, stripe, or distributed_stripe. |
| transport_type | Integer | Can be one of tcp or rdma |
| replica_count | Integer | Number of replica. |
| stripe_count | Integer | Number of stripes. |
| status | String | The status of the volume. Can be one of Up or Down. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Volume: transport_type = rdma and stripe_count >= 2
- Transport type set to RDMA; and
- with 2 or more stripes.
Table E.11. Searching for Virtual Machines
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the virtual machine. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the virtual machine. |
Events.events-prop
| Depends on property type | The property of the events associated with the virtual machine. |
Users.users-prop
| Depends on property type | The property of the users associated with the virtual machine. |
| name | String | The name of the virtual machine. |
| status | List | The availability of the virtual machine. |
| ip | Integer | The IP address of the virtual machine. |
| uptime | Integer | The number of minutes that the virtual machine has been running. |
| domain | String | The domain (usually Active Directory domain) that groups these machines. |
| os | String | The operating system selected when the virtual machine was created. |
| creationdate | Date | The date on which the virtual machine was created. |
| address | String | The unique name that identifies the virtual machine on the network. |
| cpu_usage | Integer | The percent of processing power used. |
| mem_usage | Integer | The percentage of memory used. |
| network_usage | Integer | The percentage of network used. |
| memory | Integer | The maximum memory defined. |
| apps | String | The applications currently installed on the virtual machine. |
| cluster | List | The cluster to which the virtual machine belongs. |
| pool | List | The virtual machine pool to which the virtual machine belongs. |
| loggedinuser | String | The name of the user currently logged in to the virtual machine. |
| tag | List | The tags to which the virtual machine belongs. |
| datacenter | String | The data center to which the virtual machine belongs. |
| type | List | The virtual machine type (server or desktop). |
| quota | String | The name of the quota associated with the virtual machine. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Vms: template.name = Win* and user.name = ""
- The template on which the virtual machine is based begins with Win and the virtual machine is assigned to any user.
Vms: cluster = Default and os = windowsxp
- The cluster to which the virtual machine belongs is named Default and the virtual machine is running the Windows XP operating system.
Table E.12. Searching for Pools
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
| name | String | The name of the pool. |
| description | String | The description of the pool. |
| type | String | The type of pool. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Pools: type = automatic
- Type of automatic
Table E.13. Searching for Templates
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| String | The property of the virtual machines associated with the template. |
Hosts.hosts-prop
| String | The property of the hosts associated with the template. |
Events.events-prop
| String | The property of the events associated with the template. |
Users.users-prop
| String | The property of the users associated with the template. |
| name | String | The name of the template. |
| domain | String | The domain of the template. |
| os | String | The type of operating system. |
| creationdate | Integer |
The date on which the template was created.
Date format is mm/dd/yy.
|
| childcount | Integer | The number of Vms created from the template. |
| mem | Integer | Defined memory. |
| description | String | The description of the template. |
| status | String | The status of the template. |
| cluster | String | The cluster associated with the template. |
| datacenter | String | The data center associated with the template. |
| quota | String | The quota associated with the template. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Template: Events.severity >= normal and Vms.uptime > 0
- Events of normal or greater severity have occurred on VMs derived from the template, and the VMs are still running.
Table E.14. Searching for Users
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| Depends on property type | The property of the virtual machines associated with the user. |
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the user. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the user. |
Events.events-prop
| Depends on property type | The property of the events associated with the user. |
| name | String | The name of the user. |
| lastname | String | The last name of the user. |
| usrname | String | The unique name of the user. |
| department | String | The department to which the user belongs. |
| group | String | The group to which the user belongs. |
| title | String | The title of the user. |
| status | String | The status of the user. |
| role | String | The role of the user. |
| tag | String | The tag to which the user belongs. |
| pool | String | The pool to which the user belongs. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Users: Events.severity > normal and Vms.status = up or Vms.status = pause
- Events of greater than normal severity have occurred on their Vms AND the Vms are still running; or
- The users’ VMs are paused.
Table E.15. Searching for Events
| Property (of resource or resource-type) | Type | Description (Reference) |
|---|---|---|
Vms.Vms-prop
| Depends on property type | The property of the virtual machines associated with the event. |
Hosts.hosts-prop
| Depends on property type | The property of the hosts associated with the event. |
Templates.templates-prop
| Depends on property type | The property of the templates associated with the event. |
Users.users-prop
| Depends on property type | The property of the users associated with the event. |
Clusters.clusters-prop
| Depends on property type | The property of the clusters associated with the event. |
Volumes.Volumes-prop
| Depends on property type | The property of the volumes associated with the event. |
| type | List | Type of the event. |
| severity | List | The severity of the event: Warning/Error/Normal. |
| message | String | Description of the event type. |
| time | Integer | Time at which the event occurred. |
| usrname | String | The username associated with the event. |
| event_host | String | The host associated with the event. |
| event_vm | String | The virtual machine associated with the event. |
| event_template | String | The template associated with the event. |
| event_storage | String | The storage associated with the event. |
| event_datacenter | String | The data center associated with the event. |
| event_volume | String | The volume associated with the event. |
| correlation_id | Integer | The identification number of the event. |
| sortby | List | Sorts the returned results by one of the resource properties. |
| page | Integer | The page number of results to display. |
Events: Vms.name = testdesktop and Hosts.name = gonzo.example.com
- The event occurred on the virtual machine named
testdesktopwhile it was running on the hostgonzo.example.com.
Procedure E.1. Saving a Query String as a Bookmark
- Enter the desired search query in the search bar and perform the search.
- Click the star-shaped button to the right of the search bar to open the New Bookmark window.
- Enter the Name of the bookmark.
- Edit the Search string field (if applicable).
- Click to save the query as a bookmark and close the window.
- The search query is saved and displays in the Bookmarks pane.
Procedure E.2. Editing a Bookmark
- Click the Bookmarks tab on the far left side of the screen.
- Select the bookmark you wish to edit.
- Click the button to open the Edit Bookmark window.
- Change the Name and Search string fields as necessary.
- Click to save the edited bookmark.
Procedure E.3. Deleting a Bookmark
- Click the Bookmarks tab on the far left side of the screen.
- Select the bookmark you wish to remove.
- Click the button to open the Remove Bookmark window.
- Click to remove the selected bookmark.
Procedure E.4. Creating a Tag
- Click the Tags tab on the left side of the screen.
- Select the node under which you wish to create the tag. For example, to create it at the highest level, click the root node.
- Click the New button to open the New Tag window.
- Enter the Name and Description of the new tag.
- Click to create the tag.
Procedure E.5. Modifying a Tag
- Click the Tags tab on the left side of the screen.
- Select the tag you wish to modify.
- Click to open the Edit Tag window.
- Change the Name and Description fields as necessary.
- Click to save the edited tag.
Procedure E.6. Deleting a Tag
- Click the Tags tab on the left side of the screen.
- Select the tag you wish to delete.
- Click to open the Remove Tag(s) window. The message warns you that removing the tag will also remove all descendants of the tag.
- Click to delete the selected tag.
Procedure E.7. Adding and Removing Tags to and from Objects
- Use the resource tab, tree mode, or the search function to find and select the object(s) you wish to tag or untag.
- Click the Assign Tags button to open the Assign Tags window.
- Select the check box to assign a tag to the object, or deselect the check box to detach the tag from the object.
- Click .
- Enter a search query using
tagas the property and the desired value or set of values as criteria for the search.The objects tagged with the specified criteria are listed in the results list.
See Also:
| Revision History | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Revision 3.2-55.402 | Tue Nov 12 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-55 | Wed Nov 06 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-54 | Fri Oct 25 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-53 | Mon Oct 14 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-52 | Wed 25 Sep 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-51 | Wed 21 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-50 | Mon 19 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-49 | Mon 19 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-48 | Fri 16 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-47 | Fri 16 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-46 | Thu 15 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-45 | Wed 14 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-44 | Wed 14 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-43 | Thu 01 Aug 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-43 | Tue Jun 25 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-42 | Mon 24 Jun 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-41 | Wed 12 Jun 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-40 | Tue 11 Jun 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-39 | Tue 11 Jun 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-38 | Thu 30 May 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-37 | Mon 27 May 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-36 | Mon 20 May 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-35 | Fri 10 May 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-34 | Tue 07 May 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-33 | Tue 23 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-32 | Tue 23 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-31 | Wed Apr 17 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-30 | Mon Apr 15 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-29 | Thu 11 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-28 | Thu 11 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-27 | Mon 08 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-26 | Thu 04 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-25 | Tue 02 Apr 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-24 | Sun 31 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-23 | Wed 27 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-22 | Tue 26 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-21 | Mon 25 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-20 | Fri 22 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-19 | Fri 22 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-18 | Fri 22 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-17 | Thu 21 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-16 | Tue 19 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-15 | Mon 18 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-14 | Fri 15 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-13 | Thu 14 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-12 | Tue 12 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-11 | Thu 07 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-10 | Thu 07 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-9 | Fri 01 March 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-8 | Thu 28 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-7 | Tue 26 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-6 | Tue 26 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-5 | Fri 22 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-4 | Wed 20 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-3 | Fri 15 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-2 | Mon 11 Feb 2013 | |||||||||||
| ||||||||||||
| Revision 3.2-1 | Fri 10 Feb 2013 | |||||||||||
| ||||||||||||






































































































