Red Hat Enterprise Virtualization 3.4

Administration Guide

Administration Tasks in Red Hat Enterprise Virtualization

Jodi Biddle

Red Hat Engineering Content Services

Andrew Burden

Red Hat Engineering Content Services

Lucy Bopf

Red Hat Engineering Content Services

Andrew Dahms

Red Hat Engineering Content Services

Zac Dover

Red Hat Engineering Content Services

Legal Notice

Copyright © 2015 Red Hat.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.

Abstract

This book contains information and procedures relevant to Red Hat Enterprise Virtualization administrators.
Preface
1. Document Conventions
2. Getting Help and Giving Feedback
1. Introduction
1.1. Red Hat Enterprise Virtualization Architecture
1.2. Red Hat Enterprise Virtualization System Components
1.3. Red Hat Enterprise Virtualization Resources
1.4. Red Hat Enterprise Virtualization API Support Statement
1.5. Administering and Maintaining the Red Hat Enterprise Virtualization Environment
2. Using the Administration Portal
2.1. Graphical User Interface Elements
2.2. Tree Mode and Flat Mode
2.3. Using the Guide Me Facility
2.4. Performing Searches in Red Hat Enterprise Virtualization
2.5. Saving a Query String as a Bookmark
I. Administering the Resources
3. Data Centers
3.1. Introduction to Data Centers
3.2. The Storage Pool Manager
3.3. SPM Priority
3.4. Using the Events Tab to Identify Problem Objects in Data Centers
3.5. Data Center Tasks
3.6. Data Centers and Storage Domains
3.7. Data Centers and Permissions
4. Clusters
4.1. Introduction to Clusters
4.2. Cluster Tasks
4.3. Clusters and Permissions
5. Logical Networks
5.1. Introduction to Logical Networks
5.2. Port Mirroring
5.3. Required Networks, Optional Networks, and Virtual Machine Networks
5.4. VNIC Profiles and QoS
5.5. Logical Network Tasks
5.6. External Provider Networks
5.7. Logical Networks and Permissions
6. Hosts
6.1. Introduction to Red Hat Enterprise Virtualization Hosts
6.2. Red Hat Enterprise Virtualization Hypervisor Hosts
6.3. Foreman Host Provider Hosts
6.4. Red Hat Enterprise Linux Hosts
6.5. Host Tasks
6.6. Hosts and Networking
6.7. Host Resilience
6.8. Hosts and Permissions
7. Storage
7.1. Understanding Storage Domains
7.2. Storage Metadata Versions in Red Hat Enterprise Virtualization
7.3. Preparing and Adding File-Based Storage
7.4. Adding POSIX Compliant File System Storage
7.5. Preparing and Adding Block Storage
7.6. Storage Tasks
7.7. Storage and Permissions
8. Working with Red Hat Storage
8.1. Red Hat Storage Nodes
8.2. Using Red Hat Storage
8.3. Clusters and Gluster Hooks
9. Virtual Machines
9.1. Introduction to Virtual Machines
9.2. Supported Virtual Machine Operating Systems
9.3. Virtual Machine Performance Parameters
9.4. Creating Virtual Machines
9.5. Explanation of Settings and Controls in the New Virtual Machine and Edit Virtual Machine Windows
9.6. Configuring Virtual Machines
9.7. Editing Virtual Machines
9.8. Running Virtual Machines
9.9. Removing Virtual Machines
9.10. Virtual Machines and Permissions
9.11. Snapshots
9.12. Affinity Groups
9.13. Importing and Exporting Virtual Machines
9.14. Migrating Virtual Machines Between Hosts
9.15. Improving Uptime with Virtual Machine High Availability
9.16. Other Virtual Machine Tasks
10. Templates
10.1. Introduction to Templates
10.2. Template Tasks
10.3. Sealing Templates in Preparation for Deployment
10.4. Templates and Permissions
11. Pools
11.1. Introduction to Virtual Machine Pools
11.2. Virtual Machine Pool Tasks
11.3. Pools and Permissions
11.4. Trusted Compute Pools
12. Virtual Machine Disks
12.1. Understanding Virtual Machine Storage
12.2. Understanding Virtual Disks
12.3. Shareable Disks in Red Hat Enterprise Virtualization
12.4. Read Only Disks in Red Hat Enterprise Virtualization
12.5. Virtual Disk Tasks
12.6. Virtual Disks and Permissions
13. External Providers
13.1. Introduction to External Providers in Red Hat Enterprise Virtualization
13.2. Enabling the Authentication of OpenStack Providers
13.3. Adding External Providers
13.4. Editing External Providers
13.5. Removing External Providers
II. Administering the Environment
14. Updating the Red Hat Enterprise Virtualization Environment
14.1. Upgrades between Minor Releases
14.2. Upgrading to Red Hat Enterprise Virtualization 3.4
14.3. Upgrading to Red Hat Enterprise Virtualization 3.3
14.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.2
14.5. Upgrading to Red Hat Enterprise Virtualization Manager 3.1
14.6. Post-upgrade Tasks
15. Backups
15.1. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager
15.2. Manually Backing Up and Restoring the Red Hat Enterprise Virtualization Manager
15.3. Backing Up and Restoring Virtual Machines Using the Backup and Restore API
16. Users and Roles
16.1. Introduction to Users
16.2. Directory Users
16.3. User Authorization
16.4. Red Hat Enterprise Virtualization Manager User Properties and Roles
16.5. Red Hat Enterprise Virtualization Manager User Tasks
16.6. User Role and Authorization Examples
17. Quotas and Service Level Agreement Policy
17.1. Introduction to Quota
17.2. Shared Quota and Individually Defined Quota
17.3. Quota Accounting
17.4. Enabling and Changing a Quota Mode in a Data Center
17.5. Creating a New Quota Policy
17.6. Explanation of Quota Threshold Settings
17.7. Assigning a Quota to an Object
17.8. Using Quota to Limit Resources by User
17.9. Editing Quotas
17.10. Removing Quotas
17.11. Service-level Agreement Policy Enforcement
18. Event Notifications
18.1. Configuring Event Notifications
18.2. Parameters for Event Notifications in ovirt-engine-notifier.conf
18.3. Canceling Event Notifications
19. Utilities
19.1. The Ovirt Engine Rename Tool
19.2. The Domain Management Tool
19.3. The Configuration Tool
19.4. The Image Uploader Tool
19.5. The USB Filter Editor
19.6. The Log Collector Tool
19.7. The ISO Uploader Tool
20. Log Files
20.1. Red Hat Enterprise Virtualization Manager Installation Log Files
20.2. Red Hat Enterprise Virtualization Manager Log Files
20.3. SPICE Log Files
20.4. Red Hat Enterprise Virtualization Host Log Files
20.5. Remotely Logging Host Activities
21. Proxies
21.1. SPICE Proxy
21.2. Squid Proxy
III. Gathering Information About the Environment
22. Reports, History Database Reports, and Dashboards
22.1. Reports
22.2. History Database Reports
22.3. Dashboards
A. Firewalls
A.1. Red Hat Enterprise Virtualization Manager Firewall Requirements
A.2. Virtualization Host Firewall Requirements
A.3. Directory Server Firewall Requirements
A.4. Database Server Firewall Requirements
B. VDSM and Hooks
B.1. VDSM
B.2. VDSM Hooks
B.3. Extending VDSM with Hooks
B.4. Supported VDSM Events
B.5. The VDSM Hook Environment
B.6. The VDSM Hook Domain XML Object
B.7. Defining Custom Properties
B.8. Setting Virtual Machine Custom Properties
B.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook
B.10. Using the VDSM Hooking Module
B.11. VDSM Hook Execution
B.12. VDSM Hook Return Codes
B.13. VDSM Hook Examples
C. Red Hat Enterprise Virtualization User Interface Plugins
C.1. Red Hat Enterprise Virtualization User Interface Plug-ins
C.2. Red Hat Enterprise Virtualization User Interface Plugin Lifecycle
C.3. User Interface Plugin-related Files and Their Locations
C.4. Example User Interface Plug-in Deployment
C.5. Installing the Red Hat Support Plug-in
C.6. Using Red Hat Support Plug-in
D. Red Hat Enterprise Virtualization and SSL
D.1. Replacing the Red Hat Enterprise Virtualization Manager SSL Certificate
E. Using Search, Bookmarks, and Tags
E.1. Searches
E.2. Bookmarks
E.3. Tags
F. Branding
F.1. Branding
G. Revision History