Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Show Table of Contents
Hide Table of Contents
  • 日本語
  • English
  • Single-page HTML
  • PDF
  • ePub
  1. Virtualization Deployment and Administration Guide
  2. I. Deployment
    1. 1. System Requirements
      1. 1.1. Host System Requirements
      2. 1.2. KVM Hypervisor Requirements
      3. 1.3. KVM Guest Virtual Machine Compatibility
      4. 1.4. Supported Guest CPU Models
        1. 1.4.1. Listing the Guest CPU Models
    2. 2. Installing the Virtualization Packages
      1. 2.1. Installing Virtualization Packages During a Red Hat Enterprise Linux Installation
        1. 2.1.1. Installing KVM Packages with Kickstart Files
      2. 2.2. Installing Virtualization Packages on an Existing Red Hat Enterprise Linux System
        1. 2.2.1. Installing Virtualization Packages Manually
        2. 2.2.2. Installing Virtualization Package Groups
    3. 3. Creating a Virtual Machine
      1. 3.1. Guest Virtual Machine Deployment Considerations
      2. 3.2. Creating Guests with virt-install
        1. 3.2.1. Installing a virtual machine from an ISO image
        2. 3.2.2. Importing a virtual machine image
        3. 3.2.3. Installing a virtual machine from the network
        4. 3.2.4. Installing a virtual machine using PXE
        5. 3.2.5. Installing a virtual machine with Kickstart
        6. 3.2.6. Configuring the guest virtual machine network during guest creation
      3. 3.3. Creating Guests with virt-manager
        1. 3.3.1. virt-manager installation overview
        2. 3.3.2. Creating a Red Hat Enterprise Linux 7 Guest with virt-manager
      4. 3.4. Comparison of virt-install and virt-manager Installation options
    4. 4. Cloning Virtual Machines
      1. 4.1. Preparing Virtual Machines for Cloning
      2. 4.2. Cloning a Virtual Machine
        1. 4.2.1. Cloning Guests with virt-clone
        2. 4.2.2. Cloning Guests with virt-manager
    5. 5. KVM Paravirtualized (virtio) Drivers
      1. 5.1. Using KVM virtio Drivers for Existing Storage Devices
      2. 5.2. Using KVM virtio Drivers for New Storage Devices
      3. 5.3. Using KVM virtio Drivers for Network Interface Devices
    6. 6. Network Configuration
      1. 6.1. Network Address Translation (NAT) with libvirt
      2. 6.2. Disabling vhost-net
      3. 6.3. Enabling vhost-net zero-copy
      4. 6.4. Bridged Networking
        1. 6.4.1. Configuring Bridged Networking on a Red Hat Enterprise Linux 7 Host
        2. 6.4.2. Bridged Networking with Virtual Machine Manager
        3. 6.4.3. Bridged Networking with libvirt
    7. 7. Overcommitting with KVM
      1. 7.1. Introduction
      2. 7.2. Overcommitting Memory
      3. 7.3. Overcommitting Virtualized CPUs
    8. 8. KVM Guest Timing Management
      1. 8.1. Host-wide Time Synchronization
      2. 8.2. Required Time Management Parameters for Red Hat Enterprise Linux Guests
      3. 8.3. Steal Time Accounting
    9. 9. Network Booting with libvirt
      1. 9.1. Preparing the Boot Server
        1. 9.1.1. Setting up a PXE Boot Server on a Private libvirt Network
      2. 9.2. Booting a Guest Using PXE
        1. 9.2.1. Using bridged networking
        2. 9.2.2. Using a Private libvirt Network
    10. 10. Registering the Hypervisor and Virtual Machine
      1. 10.1. Installing virt-who on the Host Physical Machine
        1. 10.1.1. Configuring virt-who
      2. 10.2. Registering a New Guest Virtual Machine
      3. 10.3. Removing a Guest Virtual Machine Entry
      4. 10.4. Installing virt-who Manually
      5. 10.5. Troubleshooting virt-who
        1. 10.5.1. Why is the hypervisor status red?
        2. 10.5.2. I have subscription status errors, what do I do?
    11. 11. Enhancing Virtualization with the QEMU Guest Agent and SPICE Agent
      1. 11.1. QEMU Guest Agent
        1. 11.1.1. Setting up Communication between the QEMU Guest Agent and Host
      2. 11.2. Using the QEMU Guest Agent with libvirt
        1. 11.2.1. Creating a Guest Disk Backup
      3. 11.3. SPICE Agent
        1. 11.3.1. Setting up Communication between the SPICE Agent and Host
    12. 12. Nested Virtualization
      1. 12.1. Overview
      2. 12.2. Setup
      3. 12.3. Restrictions and Limitations
  3. II. Administration
    1. 13. Managing Storage for Virtual Machines
      1. 13.1. Storage Concepts
      2. 13.2. Using Storage Pools
        1. 13.2.1. Storage Pool Concepts
        2. 13.2.2. Creating Storage Pools
        3. 13.2.3. Storage Pool Specifics
        4. 13.2.4. Deleting Storage Pools
      3. 13.3. Using Storage Volumes
        1. 13.3.1. Storage Volume Concepts
        2. 13.3.2. Creating Storage Volumes
        3. 13.3.3. Viewing Storage Volumes
        4. 13.3.4. Managing Data
        5. 13.3.5. Deleting Storage Volumes
        6. 13.3.6. Adding Storage Devices to Guests
        7. 13.3.7. Removing Storage Devices from Guests
    2. 14. Using qemu-img
      1. 14.1. Checking the Disk Image
      2. 14.2. Committing Changes to an Image
      3. 14.3. Comparing Images
      4. 14.4. Mapping an Image
        1. 14.4.1. The human Format
        2. 14.4.2. The json Format
      5. 14.5. Amending an Image
      6. 14.6. Converting an Existing Image to Another Format
      7. 14.7. Creating and Formatting New Images or Devices
      8. 14.8. Displaying Image Information
      9. 14.9. Rebasing a Backing File of an Image
      10. 14.10. Re-sizing the Disk Image
      11. 14.11. Listing, Creating, Applying, and Deleting a Snapshot
      12. 14.12. Supported qemu-img Formats
    3. 15. KVM Migration
      1. 15.1. Migration Definition and Benefits
      2. 15.2. Migration Requirements and Limitations
      3. 15.3. Live Migration and Red Hat Enterprise Linux Version Compatibility
      4. 15.4. Shared Storage Example: NFS for a Simple Migration
      5. 15.5. Live KVM Migration with virsh
        1. 15.5.1. Additional Tips for Migration with virsh
        2. 15.5.2. Additional Options for the virsh migrate Command
      6. 15.6. Migrating with virt-manager
    4. 16. Guest Virtual Machine Device Configuration
      1. 16.1. PCI Devices
        1. 16.1.1. Assigning a PCI Device with virsh
        2. 16.1.2. Assigning a PCI Device with virt-manager
        3. 16.1.3. PCI Device Assignment with virt-install
        4. 16.1.4. Detaching an Assigned PCI Device
        5. 16.1.5. PCI Bridges
        6. 16.1.6. PCI Device Assignment Restrictions
      2. 16.2. PCI Device Assignment with SR-IOV Devices
        1. 16.2.1. Advantages of SR-IOV
        2. 16.2.2. Using SR-IOV
        3. 16.2.3. Configuring PCI Assignment with SR-IOV Devices
        4. 16.2.4. Setting PCI device assignment from a pool of SR-IOV virtual functions
        5. 16.2.5. SR-IOV Restrictions
      3. 16.3. USB Devices
        1. 16.3.1. Assigning USB Devices to Guest Virtual Machines
        2. 16.3.2. Setting a Limit on USB Device Redirection
      4. 16.4. Configuring Device Controllers
      5. 16.5. Setting Addresses for Devices
      6. 16.6. Random Number Generator Device
      7. 16.7. Assigning GPU Devices
        1. 16.7.1. GPU PCI Device Assignment
        2. 16.7.2. NVIDIA vGPU Assignment
    5. 17. Virtual Networking
      1. 17.1. Virtual Network Switches
      2. 17.2. Bridged Mode
      3. 17.3. Network Address Translation
      4. 17.4. DNS and DHCP
      5. 17.5. Routed Mode
      6. 17.6. Isolated Mode
      7. 17.7. The Default Configuration
      8. 17.8. Examples of Common Scenarios
        1. 17.8.1. Bridged Mode
        2. 17.8.2. Routed Mode
        3. 17.8.3. NAT Mode
        4. 17.8.4. Isolated Mode
      9. 17.9. Managing a Virtual Network
      10. 17.10. Creating a Virtual Network
      11. 17.11. Attaching a Virtual Network to a Guest
      12. 17.12. Attaching a Virtual NIC Directly to a Physical Interface
        1. 17.12.1. Configuring macvtap using domain XML
        2. 17.12.2. Configuring macvtap using virt-manager
      13. 17.13. Dynamically Changing a Host Physical Machine or a Network Bridge that is Attached to a Virtual NIC
      14. 17.14. Applying Network Filtering
        1. 17.14.1. Introduction
        2. 17.14.2. Filtering Chains
        3. 17.14.3. Filtering Chain Priorities
        4. 17.14.4. Usage of Variables in Filters
        5. 17.14.5. Automatic IP Address Detection and DHCP Snooping
        6. 17.14.6. Reserved Variables
        7. 17.14.7. Element and Attribute Overview
        8. 17.14.8. References to Other Filters
        9. 17.14.9. Filter Rules
        10. 17.14.10. Supported Protocols
        11. 17.14.11. Advanced Filter Configuration Topics
        12. 17.14.12. Limitations
      15. 17.15. Creating Tunnels
        1. 17.15.1. Creating Multicast Tunnels
        2. 17.15.2. Creating TCP Tunnels
      16. 17.16. Setting vLAN Tags
      17. 17.17. Applying QoS to Your Virtual Network
    6. 18. Remote Management of Guests
      1. 18.1. Transport Modes
      2. 18.2. Remote Management with SSH
      3. 18.3. Remote Management over TLS and SSL
      4. 18.4. Configuring a VNC Server
      5. 18.5. Enhancing Remote Management of Virtual Machines with NSS
    7. 19. Managing Guests with the Virtual Machine Manager (virt-manager)
      1. 19.1. Starting virt-manager
      2. 19.2. The Virtual Machine Manager Main Window
      3. 19.3. The Virtual Hardware Details Window
        1. 19.3.1. Applying Boot Options to Guest Virtual Machines
        2. 19.3.2. Attaching USB Devices to a Guest Virtual Machine
        3. 19.3.3. USB Redirection
      4. 19.4. Virtual Machine Graphical Console
      5. 19.5. Adding a Remote Connection
      6. 19.6. Displaying Guest Details
      7. 19.7. Managing Snapshots
    8. 20. Managing Guest Virtual Machines with virsh
      1. 20.1. Guest Virtual Machine States and Types
      2. 20.2. Displaying the virsh Version
      3. 20.3. Sending Commands with echo
      4. 20.4. Connecting to the Hypervisor with virsh Connect
      5. 20.5. Displaying Information about a Guest Virtual Machine and the Hypervisor
      6. 20.6. Starting, Resuming, and Restoring a Virtual Machine
        1. 20.6.1. Starting a Guest Virtual Machine
        2. 20.6.2. Configuring a Virtual Machine to be Started Automatically at Boot
        3. 20.6.3. Rebooting a Guest Virtual Machine
        4. 20.6.4. Restoring a Guest Virtual Machine
        5. 20.6.5. Resuming a Guest Virtual Machine
      7. 20.7. Managing a Virtual Machine Configuration
        1. 20.7.1. Saving a Guest Virtual Machine's Configuration
        2. 20.7.2. Defining a Guest Virtual Machine with an XML File
        3. 20.7.3. Updating the XML File That will be Used for Restoring a Guest Virtual Machine
        4. 20.7.4. Extracting the Guest Virtual Machine XML File
        5. 20.7.5. Editing the Guest Virtual Machine Configuration
      8. 20.8. Shutting off, Shutting down, Rebooting, and Forcing a Shutdown of a Guest Virtual Machine
        1. 20.8.1. Shutting down a Guest Virtual Machine
        2. 20.8.2. Suspending a Guest Virtual Machine
        3. 20.8.3. Resetting a Virtual Machine
        4. 20.8.4. Stopping a Running Guest Virtual Machine in Order to Restart It Later
      9. 20.9. Removing and Deleting a Virtual Machine
        1. 20.9.1. Undefining a Virtual Machine
        2. 20.9.2. Forcing a Guest Virtual Machine to Stop
      10. 20.10. Connecting the Serial Console for the Guest Virtual Machine
      11. 20.11. Injecting Non-maskable Interrupts
      12. 20.12. Retrieving Information about Your Virtual Machine
        1. 20.12.1. Displaying Device Block Statistics
        2. 20.12.2. Retrieving Network Interface Statistics
        3. 20.12.3. Modifying the Link State of a Guest Virtual Machine's Virtual Interface
        4. 20.12.4. Listing the Link State of a Guest Virtual Machine's Virtual Interface
        5. 20.12.5. Setting Network Interface Bandwidth Parameters
        6. 20.12.6. Retrieving Memory Statistics
        7. 20.12.7. Displaying Errors on Block Devices
        8. 20.12.8. Displaying the Block Device Size
        9. 20.12.9. Displaying the Block Devices Associated with a Guest Virtual Machine
        10. 20.12.10. Displaying Virtual Interfaces Associated with a Guest Virtual Machine
      13. 20.13. Working with Snapshots
        1. 20.13.1. Shortening a Backing Chain by Copying the Data
        2. 20.13.2. Shortening a Backing Chain by Flattening the Image
        3. 20.13.3. Changing the Size of a Guest Virtual Machine's Block Device
      14. 20.14. Displaying a URI for Connection to a Graphical Display
      15. 20.15. Displaying the IP Address and Port Number for the VNC Display
      16. 20.16. Discarding Blocks Not in Use
      17. 20.17. Guest Virtual Machine Retrieval Commands
        1. 20.17.1. Displaying the Host Physical Machine Name
        2. 20.17.2. Displaying General Information about a Virtual Machine
        3. 20.17.3. Displaying a Virtual Machine's ID Number
        4. 20.17.4. Aborting Running Jobs on a Guest Virtual Machine
        5. 20.17.5. Displaying Information about Jobs Running on the Guest Virtual Machine
        6. 20.17.6. Displaying the Guest Virtual Machine's Name
        7. 20.17.7. Displaying the Virtual Machine's State
        8. 20.17.8. Displaying the Connection State to the Virtual Machine
      18. 20.18. Converting QEMU Arguments to Domain XML
      19. 20.19. Creating a Dump File of a Guest Virtual Machine's Core Using virsh dump
      20. 20.20. Creating a Virtual Machine XML Dump (Configuration File)
      21. 20.21. Creating a Guest Virtual Machine from a Configuration File
      22. 20.22. Editing a Guest Virtual Machine's XML Configuration Settings
      23. 20.23. Adding Multifunction PCI Devices to KVM Guest Virtual Machines
      24. 20.24. Displaying CPU Statistics for a Specified Guest Virtual Machine
      25. 20.25. Taking a Screenshot of the Guest Console
      26. 20.26. Sending a Keystroke Combination to a Specified Guest Virtual machine
      27. 20.27. Host Machine Management
        1. 20.27.1. Displaying Host Information
        2. 20.27.2. Setting NUMA Parameters
        3. 20.27.3. Displaying the Amount of Free Memory in a NUMA Cell
        4. 20.27.4. Displaying a CPU List
        5. 20.27.5. Displaying CPU Statistics
        6. 20.27.6. Managing Devices
        7. 20.27.7. Setting and Displaying the Node Memory Parameters
        8. 20.27.8. Listing Devices on a Host
        9. 20.27.9. Creating Devices on Host Machines
        10. 20.27.10. Removing a Device
        11. 20.27.11. Collect Device Configuration Settings
        12. 20.27.12. Triggering a Reset for a Device
      28. 20.28. Retrieving Guest Virtual Machine Information
        1. 20.28.1. Getting the Domain ID of a Guest Virtual Machine
        2. 20.28.2. Getting the Domain Name of a Guest Virtual Machine
        3. 20.28.3. Getting the UUID of a Guest Virtual Machine
        4. 20.28.4. Displaying Guest Virtual Machine Information
      29. 20.29. Storage Pool Commands
        1. 20.29.1. Searching for a Storage Pool XML
        2. 20.29.2. Finding a storage Pool
        3. 20.29.3. Listing Storage Pool Information
        4. 20.29.4. Listing the Available Storage Pools
        5. 20.29.5. Refreshing a Storage Pool List
        6. 20.29.6. Creating, Defining, and Starting Storage Pools
        7. 20.29.7. Stopping and Deleting Storage Pools
        8. 20.29.8. Creating an XML Dump File for a Pool
        9. 20.29.9. Editing the Storage Pool's Configuration File
      30. 20.30. Storage Volume Commands
        1. 20.30.1. Creating Storage Volumes
        2. 20.30.2. Creating a Storage Volume from Parameters
        3. 20.30.3. Creating a Storage Volume from an XML File
        4. 20.30.4. Cloning a Storage Volume
      31. 20.31. Deleting Storage Volumes
      32. 20.32. Deleting a Storage Volume's Contents
      33. 20.33. Dumping Storage Volume Information to an XML File
      34. 20.34. Listing Volume Information
      35. 20.35. Retrieving Storage Volume Information
      36. 20.36. Displaying Per-guest Virtual Machine Information
        1. 20.36.1. Displaying the Guest Virtual Machines
        2. 20.36.2. Displaying Virtual CPU Information
        3. 20.36.3. Pinning vCPU to a Host Physical Machine's CPU
        4. 20.36.4. Displaying Information about the Virtual CPU Counts of a Given Domain
        5. 20.36.5. Configuring Virtual CPU Affinity
        6. 20.36.6. Configuring Virtual CPU Count
        7. 20.36.7. Configuring Memory Allocation
        8. 20.36.8. Changing the Memory Allocation for the Domain
        9. 20.36.9. Displaying Guest Virtual Machine Block Device Information
        10. 20.36.10. Displaying Guest Virtual Machine Network Device Information
      37. 20.37. Managing Virtual Networks
        1. 20.37.1. Autostarting a Virtual Network
        2. 20.37.2. Creating a Virtual Network from an XML File
        3. 20.37.3. Defining a Virtual Network from an XML File
        4. 20.37.4. Stopping a Virtual Network
        5. 20.37.5. Creating a Dump File
        6. 20.37.6. Editing a Virtual Network's XML Configuration File
        7. 20.37.7. Getting Information about a Virtual Network
        8. 20.37.8. Listing Information about a Virtual Network
        9. 20.37.9. Converting a Network UUID to Network Name
        10. 20.37.10. Converting a Network Name to Network UUID
        11. 20.37.11. Starting a Previously Defined Inactive Network
        12. 20.37.12. Undefining the Configuration for an Inactive Network
        13. 20.37.13. Updating an Existing Network Definition File
        14. 20.37.14. Migrating Guest Virtual Machines with virsh
        15. 20.37.15. Setting a Static IP Address for the Guest Virtual Machine
      38. 20.38. Interface Commands
        1. 20.38.1. Defining and Starting a Host Physical Machine Interface via an XML File
        2. 20.38.2. Editing the XML Configuration File for the Host Interface
        3. 20.38.3. Listing Host Interfaces
        4. 20.38.4. Converting a MAC Address into an Interface Name
        5. 20.38.5. Stopping and Undefining a Specific Host Physical Machine Interface
        6. 20.38.6. Displaying the Host Configuration File
        7. 20.38.7. Creating Bridge Devices
        8. 20.38.8. Tearing Down a Bridge Device
        9. 20.38.9. Manipulating Interface Snapshots
      39. 20.39. Managing Snapshots
        1. 20.39.1. Creating Snapshots
        2. 20.39.2. Creating a Snapshot for the Current Guest Virtual Machine
        3. 20.39.3. Displaying the Snapshot Currently in Use
        4. 20.39.4. snapshot-edit
        5. 20.39.5. snapshot-info
        6. 20.39.6. snapshot-list
        7. 20.39.7. snapshot-dumpxml
        8. 20.39.8. snapshot-parent
        9. 20.39.9. snapshot-revert
        10. 20.39.10. snapshot-delete
      40. 20.40. Guest Virtual Machine CPU Model Configuration
        1. 20.40.1. Introduction
        2. 20.40.2. Learning about the Host Physical Machine CPU Model
        3. 20.40.3. Determining Support for VFIO IOMMU Devices
        4. 20.40.4. Determining a Compatible CPU Model to Suit a Pool of Host Physical Machines
      41. 20.41. Configuring the Guest Virtual Machine CPU Model
      42. 20.42. Managing Resources for Guest Virtual Machines
      43. 20.43. Setting Schedule Parameters
      44. 20.44. Disk I/O Throttling
      45. 20.45. Display or Set Block I/O Parameters
      46. 20.46. Configuring Memory Tuning
    9. 21. Guest Virtual Machine Disk Access with Offline Tools
      1. 21.1. Introduction
        1. 21.1.1. Caution about Using Remote Connections
      2. 21.2. Terminology
      3. 21.3. Installation
      4. 21.4. The guestfish Shell
        1. 21.4.1. Viewing File Systems with guestfish
        2. 21.4.2. Adding Files with guestfish
        3. 21.4.3. Modifying Files with guestfish
        4. 21.4.4. Other Actions with guestfish
        5. 21.4.5. Shell Scripting with guestfish
        6. 21.4.6. Augeas and libguestfs Scripting
      5. 21.5. Other Commands
      6. 21.6. virt-rescue: The Rescue Shell
        1. 21.6.1. Introduction
        2. 21.6.2. Running virt-rescue
      7. 21.7. virt-df: Monitoring Disk Usage
        1. 21.7.1. Introduction
        2. 21.7.2. Running virt-df
      8. 21.8. virt-resize: Resizing Guest Virtual Machines Offline
        1. 21.8.1. Introduction
        2. 21.8.2. Expanding a Disk Image
      9. 21.9. virt-inspector: Inspecting Guest Virtual Machines
        1. 21.9.1. Introduction
        2. 21.9.2. Installation
        3. 21.9.3. Running virt-inspector
      10. 21.10. Using the API from Programming Languages
        1. 21.10.1. Interaction with the API using a C program
      11. 21.11. virt-sysprep: Resetting Virtual Machine Settings
      12. 21.12. virt-customize: Customizing Virtual Machine Settings
      13. 21.13. virt-diff: Listing the Differences between Virtual Machine Files
      14. 21.14. virt-sparsify: Reclaiming Empty Disk Space
    10. 22. Graphical User Interface Tools for Guest Virtual Machine Management
      1. 22.1. virt-viewer
      2. 22.2. remote-viewer
      3. 22.3. GNOME Boxes
    11. 23. Manipulating the Domain XML
      1. 23.1. General Information and Metadata
      2. 23.2. Operating System Booting
        1. 23.2.1. BIOS Boot Loader
        2. 23.2.2. Direct Kernel Boot
        3. 23.2.3. Container Boot
      3. 23.3. SMBIOS System Information
      4. 23.4. CPU allocation
      5. 23.5. CPU tuning
      6. 23.6. Memory Backing
      7. 23.7. Memory Tuning
      8. 23.8. Memory Allocation
      9. 23.9. NUMA Node Tuning
      10. 23.10. Block I/O Tuning
      11. 23.11. Resource Partitioning
      12. 23.12. CPU Models and Topology
        1. 23.12.1. Changing the Feature Set for a Specified CPU
        2. 23.12.2. Guest Virtual Machine NUMA Topology
      13. 23.13. Events Configuration
      14. 23.14. Hypervisor Features
      15. 23.15. Timekeeping
      16. 23.16. Timer Element Attributes
      17. 23.17. Devices
        1. 23.17.1. Hard Drives, Floppy Disks, and CD-ROMs
        2. 23.17.2. Device Addresses
        3. 23.17.3. Controllers
        4. 23.17.4. Device Leases
        5. 23.17.5. Host Physical Machine Device Assignment
        6. 23.17.6. Redirected devices
        7. 23.17.7. Smartcard Devices
        8. 23.17.8. Network Interfaces
        9. 23.17.9. Input Devices
        10. 23.17.10. Hub Devices
        11. 23.17.11. Graphical Framebuffers
        12. 23.17.12. Video Devices
        13. 23.17.13. Consoles, Serial, and Channel Devices
        14. 23.17.14. Guest Virtual Machine Interfaces
        15. 23.17.15. Channel
        16. 23.17.16. Host Physical Machine Interface
        17. 23.17.17. Sound Devices
        18. 23.17.18. Watchdog Device
        19. 23.17.19. Setting a Panic Device
        20. 23.17.20. Memory Balloon Device
      18. 23.18. Storage Pools
        1. 23.18.1. Providing Metadata for the Storage Pool
        2. 23.18.2. Source Elements
        3. 23.18.3. Creating Target Elements
        4. 23.18.4. Setting Device Extents
      19. 23.19. Storage Volumes
        1. 23.19.1. General Metadata
        2. 23.19.2. Setting Target Elements
        3. 23.19.3. Setting Backing Store Elements
      20. 23.20. Security Label
      21. 23.21. A Sample Virtual Machine XML Configuration
  4. III. Appendices
    1. A. Troubleshooting
      1. A.1. Debugging and Troubleshooting Tools
      2. A.2. Creating Dump Files
        1. A.2.1. Creating virsh Dump Files
        2. A.2.2. Saving a Core Dump Using a Python Script
      3. A.3. Capturing Trace Data on a Constant Basis Using the Systemtap Flight Recorder
      4. A.4. kvm_stat
      5. A.5. Troubleshooting with Serial Consoles
      6. A.6. Virtualization Logs
      7. A.7. Loop Device Errors
      8. A.8. Live Migration Errors
      9. A.9. Enabling Intel VT-x and AMD-V Virtualization Hardware Extensions in BIOS
      10. A.10. Shutting down Red Hat Enterprise Linux 6 Guests on a Red Hat Enterprise Linux 7 Host
      11. A.11. Optional Workaround to Allow for Graceful Shutdown
      12. A.12. KVM Networking Performance
      13. A.13. Workaround for Creating External Snapshots with libvirt
      14. A.14. Missing Characters on Guest Console with Japanese Keyboard
      15. A.15. Guest Virtual Machine Fails to Shutdown
      16. A.16. Disable SMART Disk Monitoring for Guest Virtual Machines
      17. A.17. libguestfs Troubleshooting
      18. A.18. Troubleshooting SR-IOV
      19. A.19. Common libvirt Errors and Troubleshooting
        1. A.19.1. libvirtd failed to start
        2. A.19.2. The URI Failed to Connect to the Hypervisor
        3. A.19.3. PXE Boot (or DHCP) on Guest Failed
        4. A.19.4. Guest Can Reach Outside Network, but Cannot Reach Host When Using macvtap interface
        5. A.19.5. Could not add rule to fixup DHCP response checksums on network 'default'
        6. A.19.6. Unable to add bridge br0 port vnet0: No such device
        7. A.19.7. Migration Fails with error: unable to resolve address
        8. A.19.8. Migration Fails with Unable to allow access for disk path: No such file or directory
        9. A.19.9. No Guest Virtual Machines are Present when libvirtd is Started
        10. A.19.10. Common XML Errors
    2. B. Using KVM Virtualization on Multiple Architectures
      1. B.1. Using KVM Virtualization on IBM POWER Systems
      2. B.2. Using KVM Virtualization on IBM Z
      3. B.3. Using KVM Virtualization on ARM Systems
    3. C. Virtualization Restrictions
      1. C.1. System Restrictions
      2. C.2. Feature Restrictions
      3. C.3. Application Restrictions
      4. C.4. Other Restrictions
      5. C.5. Storage Support
      6. C.6. USB 3 / xHCI Support
    4. D. Additional Resources
      1. D.1. Online Resources
      2. D.2. Installed Documentation
    5. E. Working with IOMMU Groups[1]
      1. E.1. IOMMU Overview
      2. E.2. A Deep-dive into IOMMU Groups
      3. E.3. How to Identify and Assign IOMMU Groups
      4. E.4. IOMMU Strategies and Use Cases
    6. F. Revision History
  5. Legal Notice

Part III. Appendices

  • 23.21. A Sample Virtual Machine XML Configuration
  • A. Troubleshooting
Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook

Formatting Tips

Here are the common uses of Markdown.

Code blocks
~~~
Code surrounded in tildes is easier to read
~~~
Links/URLs
[Red Hat Customer Portal](https://access.redhat.com)
Learn more