Red Hat Enterprise Virtualization 3.3

Administration Guide

Administrating Red Hat Enterprise Virtualization Environments.

Andrew Burden

Steve Gordon

Anjana Sriram

Red Hat Engineering Content Services

Legal Notice

Copyright © 2014 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.


This book contains information and procedures relevant to Red Hat Enterprise Virtualization administrators.
1. Document Conventions
2. Getting Help and Giving Feedback
1. Using this Guide
1.1. Administration Guide Prerequisites
1.2. Administration Guide Layout
1.3. Example Workflows
2. Basics
2.1. Introduction
2.2. Using the Administration Portal Graphical Interface
I. Administering the Resources
3. Data Centers
3.1. Introduction to Data Centers
3.2. The Storage Pool Manager (SPM)
3.3. SPM Priority
3.4. Using the Events Tab to Identify Problem Objects in Data Centers
3.5. Data Center Tasks
3.6. Data Centers and Storage Domains
3.7. Data Centers and Permissions
4. Clusters
4.1. Introduction to Clusters
4.2. Cluster Tasks
4.3. Clusters and Permissions
4.4. Clusters and Gluster Hooks
5. Logical Networks
5.1. Introduction to Logical Networks
5.2. Port Mirroring
5.3. Required Networks, Optional Networks, and Virtual Machine Networks
5.4. VNIC Profiles and QoS
5.5. Logical Network Tasks
5.6. Logical Networks and Permissions
6. Hosts
6.1. Introduction to Red Hat Enterprise Virtualization Hosts
6.2. Red Hat Enterprise Virtualization Hypervisor Hosts
6.3. Foreman Host Provider Hosts
6.4. Red Hat Enterprise Linux Hosts
6.5. Host Tasks
6.6. Hosts and Networking
6.7. Host Resilience
6.8. Hosts and Permissions
7. Storage Domains
7.1. Understanding Storage Domains
7.2. Storage Metadata Versions in Red Hat Enterprise Virtualization
7.3. Preparing and Adding File-based Storage
7.4. Preparing and Adding Red Hat Storage (GlusterFS) Storage Domains
7.5. Adding POSIX Compliant File System Storage
7.6. Preparing and Adding Block-based Storage
7.7. Storage Tasks
7.8. Storage and Permissions
8. Virtual Machines
8.1. Introduction to Virtual Machines
8.2. Supported Virtual Machine Operating Systems
8.3. Virtual Machine Performance Parameters
8.4. Creating Virtual Machines
8.5. Using Virtual Machines
8.6. Shutting Down or Pausing Virtual Machines
8.7. Managing Virtual Machines
8.8. Virtual Machines and Permissions
8.9. Backing Up and Restoring Virtual Machines with Snapshots
8.10. Importing and Exporting Virtual Machines
8.11. Migrating Virtual Machines Between Hosts
8.12. Improving Uptime with Virtual Machine High Availability
8.13. Other Virtual Machine Tasks
9. Templates
9.1. Introduction to Templates
9.2. Template Tasks
9.3. Sealing Templates in Preparation for Deployment
9.4. Templates and Permissions
10. Pools
10.1. Introduction to Virtual Machine Pools
10.2. Virtual Machine Pool Tasks
10.3. Pools and Permissions
11. Virtual Machine Disks
11.1. Understanding Virtual Machine Storage
11.2. Understanding Virtual Disks
11.3. Shareable Disks in Red Hat Enterprise Virtualization
11.4. Virtual Disk Tasks
11.5. Virtual Disks and Permissions
12. Red Hat Storage (GlusterFS) Volumes
12.1. Introduction to Red Hat Storage (GlusterFS) Volumes
12.2. Introduction to Red Hat Storage (GlusterFS) Bricks
12.3. Optimizing Red Hat Storage Volumes to Store Virtual Machine Images
12.4. Red Hat Storage (GlusterFS) Tasks
13. External Providers
13.1. Introduction to External Providers in Red Hat Enterprise Virtualization
13.2. Enabling the Authentication of OpenStack Providers
13.3. Adding an External Provider
13.4. Removing an External Provider
13.5. Explanation of Settings and Controls in the Add Provider Window
13.6. Explanation of Settings and Controls in the Edit Provider Window
II. Administering the Environment
14. Users and Roles
14.1. Introduction to Users
14.2. Directory Users
14.3. User Authorization
14.4. Red Hat Enterprise Virtualization Manager User Properties and Roles
14.5. Red Hat Enterprise Virtualization Manager User Tasks
14.6. User Role and Authorization Examples
15. Quotas and Service Level Agreement Policy
15.1. Introduction to Quota
15.2. Shared Quota and Individually-defined Quota
15.3. Quota Accounting
15.4. Enabling and Changing a Quota Mode in a Data Center
15.5. Creating a New Quota Policy
15.6. Explanation of Quota Threshold Settings
15.7. Assigning a Quota to an Object
15.8. Using Quota to Limit Resources by User
15.9. Editing Quotas
15.10. Removing Quotas
15.11. Service-level Agreement Policy Enforcement
16. Event Notifications
16.1. Configuring Event Notifications
16.2. Parameters for Event Notifications in notifier.conf
16.3. Canceling Event Notifications
17. Utilities
17.1. Renaming the Manager with the Ovirt Engine Rename Tool
17.2. Managing Domains with the Domain Management Tool
17.3. Editing the Configuration of the Red Hat Virtualization Manager with the Configuration Tool
17.4. Uploading Virtual Machine Images with the Image Uploader Tool
17.5. Editing USB Filters with the USB Filter Editor
17.6. Collecting Logs with the Log Collector Tool
17.7. Uploading ISO Files with the ISO Uploader Tool
17.8. Guest Drivers and Agents
18. Log Files
18.1. Red Hat Enterprise Virtualization Manager Installation Log Files
18.2. Red Hat Enterprise Virtualization Manager Log Files
18.3. SPICE Log Files
18.4. Red Hat Enterprise Virtualization Host Log Files
18.5. Remotely Logging Host Activities
19. Updating the Red Hat Enterprise Virtualization Environment
19.1. Upgrades between Minor Releases
19.2. Upgrading to Red Hat Enterprise Virtualization 3.3
19.3. Upgrading to Red Hat Enterprise Virtualization Manager 3.2
19.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.1
19.5. Post-upgrade Tasks
20. Backups
20.1. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager
20.2. Manually Backing Up and Restoring the Red Hat Enterprise Virtualization Manager
III. Gathering Information About the Environment
21. Reports, History Database Reports, and Dashboards
21.1. Reports
21.2. History Database Reports
21.3. Dashboards
A. Firewalls
A.1. Red Hat Enterprise Virtualization Manager Firewall Requirements
A.2. Virtualization Host Firewall Requirements
A.3. Directory Server Firewall Requirements
A.4. Database Server Firewall Requirements
B. VDSM and Hooks
B.2. VDSM Hooks
B.3. Extending VDSM with Hooks
B.4. Supported VDSM Events
B.5. The VDSM Hook Environment
B.6. The VDSM Hook Domain XML Object
B.7. Defining Custom Properties
B.8. Setting Custom Device Properties
B.9. Setting Virtual Machine Custom Properties
B.10. Evaluating Virtual Machine Custom Properties in a VDSM Hook
B.11. Using the VDSM Hooking Module
B.12. VDSM Hook Execution
B.13. VDSM Hook Return Codes
B.14. VDSM Hook Examples
C. Red Hat Enterprise Virtualization User Interface Plugins
C.1. Red Hat Enterprise Virtualization User Interface Plugins
C.2. Red Hat Enterprise Virtualization User Interface Plugin Lifecycle
C.3. User Interface Plugin-related Files and Their Locations
C.4. Example User Interface Plugin Deployment
C.5. Using Red Hat Support Plugin
D. Red Hat Enterprise Virtualization and SSL
D.1. Replacing the Red Hat Enterprise Virtualization Manager SSL Certificate
E. Red Hat Storage (GlusterFS) Terminology
F. Using Search, Bookmarks, and Tags to Find Your Way Around
F.1. Search
F.2. Bookmarks
F.3. Tags
G. Branding
G.1. Branding
H. Revision History