Jump To Close Expand all Collapse all Table of contents Administration Guide 1. Introduction Expand section "1. Introduction" Collapse section "1. Introduction" 1.1. Red Hat Enterprise Virtualization Architecture 1.2. Red Hat Enterprise Virtualization System Components 1.3. Red Hat Enterprise Virtualization Resources 1.4. Red Hat Enterprise Virtualization API Support Statement 1.5. Administering and Maintaining the Red Hat Enterprise Virtualization Environment 2. Using the Administration Portal Expand section "2. Using the Administration Portal" Collapse section "2. Using the Administration Portal" 2.1. Graphical User Interface Elements 2.2. Tree Mode and Flat Mode 2.3. Using the Guide Me Facility 2.4. Performing Searches in Red Hat Enterprise Virtualization 2.5. Saving a Query String as a Bookmark I. Administering the Resources Expand section "I. Administering the Resources" Collapse section "I. Administering the Resources" 3. Data Centers Expand section "3. Data Centers" Collapse section "3. Data Centers" 3.1. Introduction to Data Centers 3.2. The Storage Pool Manager 3.3. SPM Priority 3.4. Using the Events Tab to Identify Problem Objects in Data Centers 3.5. Data Center Tasks Expand section "3.5. Data Center Tasks" Collapse section "3.5. Data Center Tasks" 3.5.1. Creating a New Data Center 3.5.2. Explanation of Settings in the New Data Center and Edit Data Center Windows 3.5.3. Editing a Resource 3.5.4. Creating a New Logical Network in a Data Center or Cluster 3.5.5. Removing a Logical Network 3.5.6. Re-Initializing a Data Center: Recovery Procedure 3.5.7. Removing a Data Center 3.5.8. Force Removing a Data Center 3.5.9. Changing the Data Center Compatibility Version 3.6. Data Centers and Storage Domains Expand section "3.6. Data Centers and Storage Domains" Collapse section "3.6. Data Centers and Storage Domains" 3.6.1. Attaching an Existing Data Domain to a Data Center 3.6.2. Attaching an Existing ISO domain to a Data Center 3.6.3. Attaching an Existing Export Domain to a Data Center 3.6.4. Detaching a Storage Domain from a Data Center 3.6.5. Activating a Storage Domain from Maintenance Mode 3.7. Data Centers and Permissions Expand section "3.7. Data Centers and Permissions" Collapse section "3.7. Data Centers and Permissions" 3.7.1. Managing System Permissions for a Data Center 3.7.2. Data Center Administrator Roles Explained 3.7.3. Assigning an Administrator or User Role to a Resource 3.7.4. Removing an Administrator or User Role from a Resource 4. Clusters Expand section "4. Clusters" Collapse section "4. Clusters" 4.1. Introduction to Clusters 4.2. Cluster Tasks Expand section "4.2. Cluster Tasks" Collapse section "4.2. Cluster Tasks" 4.2.1. Creating a New Cluster 4.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows Expand section "4.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows" Collapse section "4.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows" 4.2.2.1. General Cluster Settings Explained 4.2.2.2. Optimization Settings Explained 4.2.2.3. Resilience Policy Settings Explained 4.2.2.4. Cluster Policy Settings Explained 4.2.2.5. Cluster Console Settings Explained 4.2.3. Editing a Resource 4.2.4. Importing an Existing Red Hat Storage Cluster 4.2.5. Explanation of Settings in the Add Hosts Window 4.2.6. Setting Load and Power Management Policies for Hosts in a Cluster 4.2.7. Creating a New Logical Network in a Data Center or Cluster 4.2.8. Removing a Cluster 4.2.9. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window 4.2.10. Explanation of Settings in the Manage Networks Window 4.2.11. Changing the Cluster Compatibility Version 4.3. Clusters and Permissions Expand section "4.3. Clusters and Permissions" Collapse section "4.3. Clusters and Permissions" 4.3.1. Managing System Permissions for a Cluster 4.3.2. Cluster Administrator Roles Explained 4.3.3. Assigning an Administrator or User Role to a Resource 4.3.4. Removing an Administrator or User Role from a Resource 5. Logical Networks Expand section "5. Logical Networks" Collapse section "5. Logical Networks" 5.1. Introduction to Logical Networks 5.2. Port Mirroring 5.3. Required Networks, Optional Networks, and Virtual Machine Networks 5.4. VNIC Profiles and QoS Expand section "5.4. VNIC Profiles and QoS" Collapse section "5.4. VNIC Profiles and QoS" 5.4.1. VNIC Profile Overview 5.4.2. Creating a VNIC Profile 5.4.3. Assigning Security Groups to VNIC Profiles 5.4.4. Explanation of Settings in the VM Interface Profile Window 5.4.5. Removing a VNIC Profile 5.4.6. User Permissions for VNIC Profiles 5.4.7. QoS Overview 5.4.8. Adding QoS 5.4.9. Settings in the New Network QoS and Edit Network QoS Windows Explained 5.4.10. Removing QoS 5.5. Logical Network Tasks Expand section "5.5. Logical Network Tasks" Collapse section "5.5. Logical Network Tasks" 5.5.1. Creating a New Logical Network in a Data Center or Cluster 5.5.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows Expand section "5.5.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows" Collapse section "5.5.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows" 5.5.2.1. Logical Network General Settings Explained 5.5.2.2. Logical Network Cluster Settings Explained 5.5.2.3. Logical Network vNIC Profiles Settings Explained 5.5.3. Editing a Logical Network 5.5.4. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window 5.5.5. Explanation of Settings in the Manage Networks Window 5.5.6. Adding Multiple VLANs to a Single Network Interface Using Logical Networks 5.5.7. Network Labels Expand section "5.5.7. Network Labels" Collapse section "5.5.7. Network Labels" 5.5.7.1. Network Labels 5.5.7.2. Adding Network Labels to Host Network Interfaces 5.5.8. Using the Networks Tab 5.6. External Provider Networks Expand section "5.6. External Provider Networks" Collapse section "5.6. External Provider Networks" 5.6.1. Importing Networks From External Providers 5.6.2. Limitations to Using External Provider Networks 5.6.3. Configuring Subnets on External Provider Logical Networks Expand section "5.6.3. Configuring Subnets on External Provider Logical Networks" Collapse section "5.6.3. Configuring Subnets on External Provider Logical Networks" 5.6.3.1. Configuring Subnets on External Provider Logical Networks 5.6.3.2. Adding Subnets to External Provider Logical Networks 5.6.3.3. Removing Subnets from External Provider Logical Networks 5.7. Logical Networks and Permissions Expand section "5.7. Logical Networks and Permissions" Collapse section "5.7. Logical Networks and Permissions" 5.7.1. Managing System Permissions for a Network 5.7.2. Network Administrator and User Roles Explained 5.7.3. Assigning an Administrator or User Role to a Resource 5.7.4. Removing an Administrator or User Role from a Resource 6. Hosts Expand section "6. Hosts" Collapse section "6. Hosts" 6.1. Introduction to Red Hat Enterprise Virtualization Hosts 6.2. Red Hat Enterprise Virtualization Hypervisor Hosts 6.3. Foreman Host Provider Hosts 6.4. Red Hat Enterprise Linux Hosts 6.5. Host Tasks Expand section "6.5. Host Tasks" Collapse section "6.5. Host Tasks" 6.5.1. Adding a Red Hat Enterprise Linux Host 6.5.2. Adding a Foreman Host Provider Host 6.5.3. Approving a Hypervisor 6.5.4. Explanation of Settings and Controls in the New Host and Edit Host Windows Expand section "6.5.4. Explanation of Settings and Controls in the New Host and Edit Host Windows" Collapse section "6.5.4. Explanation of Settings and Controls in the New Host and Edit Host Windows" 6.5.4.1. Host General Settings Explained 6.5.4.2. Host Power Management Settings Explained 6.5.4.3. SPM Priority Settings Explained 6.5.4.4. Host Console Settings Explained 6.5.5. Configuring Host Power Management Settings 6.5.6. Configuring Host Storage Pool Manager Settings 6.5.7. Editing a Resource 6.5.8. Approving Newly Added Red Hat Enterprise Virtualization Hypervisor Hosts 6.5.9. Moving a Host to Maintenance Mode 6.5.10. Activating a Host from Maintenance Mode 6.5.11. Removing a Host 6.5.12. Customizing Hosts with Tags 6.6. Hosts and Networking Expand section "6.6. Hosts and Networking" Collapse section "6.6. Hosts and Networking" 6.6.1. Refreshing Host Capabilities 6.6.2. Editing Host Network Interfaces and Assigning Logical Networks to Hosts 6.6.3. Bonds Expand section "6.6.3. Bonds" Collapse section "6.6.3. Bonds" 6.6.3.1. Bonding Logic in Red Hat Enterprise Virtualization 6.6.3.2. Bonding Modes 6.6.3.3. Creating a Bond Device Using the Administration Portal 6.6.3.4. Example Uses of Custom Bonding Options with Host Interfaces 6.6.4. Saving a Host Network Configuration 6.7. Host Resilience Expand section "6.7. Host Resilience" Collapse section "6.7. Host Resilience" 6.7.1. Host High Availability 6.7.2. Power Management by Proxy in Red Hat Enterprise Virtualization 6.7.3. Setting Fencing Parameters on a Host 6.7.4. Soft-Fencing Hosts 6.7.5. Using Host Power Management Functions 6.7.6. Manually Fencing or Isolating a Non Responsive Host 6.8. Hosts and Permissions Expand section "6.8. Hosts and Permissions" Collapse section "6.8. Hosts and Permissions" 6.8.1. Managing System Permissions for a Host 6.8.2. Host Administrator Roles Explained 6.8.3. Assigning an Administrator or User Role to a Resource 6.8.4. Removing an Administrator or User Role from a Resource 7. Storage Expand section "7. Storage" Collapse section "7. Storage" 7.1. Understanding Storage Domains 7.2. Storage Metadata Versions in Red Hat Enterprise Virtualization 7.3. Preparing and Adding File-Based Storage Expand section "7.3. Preparing and Adding File-Based Storage" Collapse section "7.3. Preparing and Adding File-Based Storage" 7.3.1. Preparing NFS Storage 7.3.2. Attaching NFS Storage 7.3.3. Preparing Local Storage 7.3.4. Adding Local Storage 7.4. Adding POSIX Compliant File System Storage Expand section "7.4. Adding POSIX Compliant File System Storage" Collapse section "7.4. Adding POSIX Compliant File System Storage" 7.4.1. Attaching POSIX Compliant File System Storage 7.4.2. Preparing pNFS Storage 7.4.3. Attaching pNFS Storage 7.5. Preparing and Adding Block Storage Expand section "7.5. Preparing and Adding Block Storage" Collapse section "7.5. Preparing and Adding Block Storage" 7.5.1. Preparing iSCSI Storage 7.5.2. Adding iSCSI Storage 7.5.3. Adding FCP Storage 7.5.4. Unusable LUNs in Red Hat Enterprise Virtualization 7.6. Storage Tasks Expand section "7.6. Storage Tasks" Collapse section "7.6. Storage Tasks" 7.6.1. Importing Existing ISO or Export Storage Domains 7.6.2. Populating the ISO Storage Domain 7.6.3. Moving Storage Domains to Maintenance Mode 7.6.4. Editing a Resource 7.6.5. Activating Storage Domains 7.6.6. Removing a Storage Domain 7.6.7. Destroying a Storage Domain 7.6.8. Detaching the Export Domain 7.6.9. Attaching an Export Domain to a Data Center 7.7. Storage and Permissions Expand section "7.7. Storage and Permissions" Collapse section "7.7. Storage and Permissions" 7.7.1. Managing System Permissions for a Storage Domain 7.7.2. Storage Administrator Roles Explained 7.7.3. Assigning an Administrator or User Role to a Resource 7.7.4. Removing an Administrator or User Role from a Resource 8. Working with Red Hat Storage Expand section "8. Working with Red Hat Storage" Collapse section "8. Working with Red Hat Storage" 8.1. Red Hat Storage Nodes Expand section "8.1. Red Hat Storage Nodes" Collapse section "8.1. Red Hat Storage Nodes" 8.1.1. Adding Red Hat Storage Nodes 8.1.2. Removing a Red Hat Storage Node 8.2. Using Red Hat Storage Expand section "8.2. Using Red Hat Storage" Collapse section "8.2. Using Red Hat Storage" 8.2.1. Introduction to Red Hat Storage (GlusterFS) Volumes 8.2.2. Gluster Storage Terminology 8.2.3. Creating a Storage Volume 8.2.4. Adding Bricks to a Volume 8.2.5. Explanation of Settings in the Add Bricks Window 8.2.6. Optimizing Red Hat Storage Volumes to Store Virtual Machine Images 8.2.7. Starting Volumes 8.2.8. Tuning Volumes 8.2.9. Editing Volume Options 8.2.10. Reset Volume Options 8.2.11. Removing Bricks from a Volume 8.2.12. Stopping Red Hat Storage Volumes 8.2.13. Deleting Red Hat Storage Volumes 8.2.14. Rebalancing Volumes 8.3. Clusters and Gluster Hooks Expand section "8.3. Clusters and Gluster Hooks" Collapse section "8.3. Clusters and Gluster Hooks" 8.3.1. Managing Gluster Hooks 8.3.2. Listing Hooks 8.3.3. Viewing the Content of Hooks 8.3.4. Enabling or Disabling Hooks 8.3.5. Refreshing Hooks 8.3.6. Resolving Conflicts 8.3.7. Resolving Content Conflicts 8.3.8. Resolving Missing Hook Conflicts 8.3.9. Resolving Status Conflicts 8.3.10. Resolving Multiple Conflicts 8.3.11. Managing Gluster Sync 9. Virtual Machines Expand section "9. Virtual Machines" Collapse section "9. Virtual Machines" 9.1. Introduction to Virtual Machines 9.2. Supported Virtual Machine Operating Systems 9.3. Virtual Machine Performance Parameters 9.4. Creating Virtual Machines Expand section "9.4. Creating Virtual Machines" Collapse section "9.4. Creating Virtual Machines" 9.4.1. Creating a Virtual Machine 9.4.2. Creating a Virtual Machine Based on a Template 9.4.3. Creating a Cloned Virtual Machine Based on a Template 9.5. Explanation of Settings and Controls in the New Virtual Machine and Edit Virtual Machine Windows Expand section "9.5. Explanation of Settings and Controls in the New Virtual Machine and Edit Virtual Machine Windows" Collapse section "9.5. Explanation of Settings and Controls in the New Virtual Machine and Edit Virtual Machine Windows" 9.5.1. Virtual Machine General Settings Explained 9.5.2. Virtual Machine System Settings Explained 9.5.3. Virtual Machine Initial Run Settings Explained 9.5.4. Virtual Machine Console Settings Explained 9.5.5. Virtual Machine Host Settings Explained 9.5.6. Virtual Machine High Availability Settings Explained 9.5.7. Virtual Machine Resource Allocation Settings Explained 9.5.8. Virtual Machine Boot Options Settings Explained 9.5.9. Virtual Machine Custom Properties Settings Explained 9.6. Configuring Virtual Machines Expand section "9.6. Configuring Virtual Machines" Collapse section "9.6. Configuring Virtual Machines" 9.6.1. Completing the Configuration of a Virtual Machine by Defining Network Interfaces and Hard Disks 9.6.2. Installing Windows on VirtIO-Optimized Hardware 9.6.3. Virtual Machine Run Once Settings Explained 9.6.4. Configuring a Watchdog Expand section "9.6.4. Configuring a Watchdog" Collapse section "9.6.4. Configuring a Watchdog" 9.6.4.1. Adding a Watchdog Card to a Virtual Machine 9.6.4.2. Configuring a Watchdog 9.6.4.3. Confirming Watchdog Functionality 9.6.4.4. Parameters for Watchdogs in watchdog.conf 9.7. Editing Virtual Machines Expand section "9.7. Editing Virtual Machines" Collapse section "9.7. Editing Virtual Machines" 9.7.1. Editing Virtual Machine Properties 9.7.2. Network Interfaces Expand section "9.7.2. Network Interfaces" Collapse section "9.7.2. Network Interfaces" 9.7.2.1. Adding and Editing Virtual Machine Network Interfaces 9.7.2.2. Editing a Network Interface 9.7.2.3. Removing a Network Interface 9.7.2.4. Explanation of Settings in the Virtual Machine Network Interface Window 9.7.2.5. Hot Plugging Network Interfaces 9.7.2.6. Removing Network Interfaces From Virtual Machines 9.7.3. Virtual Disks Expand section "9.7.3. Virtual Disks" Collapse section "9.7.3. Virtual Disks" 9.7.3.1. Adding and Editing Virtual Machine Disks 9.7.3.2. Hot Plugging Virtual Machine Disks 9.7.3.3. Removing Virtual Disks From Virtual Machines 9.7.4. Extending the Size of an Online Virtual Disk 9.7.5. Floating Disks 9.7.6. Associating a Virtual Disk with a Virtual Machine 9.7.7. Changing the CD for a Virtual Machine 9.7.8. Smart card Authentication 9.7.9. Enabling and Disabling Smart cards 9.8. Running Virtual Machines Expand section "9.8. Running Virtual Machines" Collapse section "9.8. Running Virtual Machines" 9.8.1. Installing Console Components Expand section "9.8.1. Installing Console Components" Collapse section "9.8.1. Installing Console Components" 9.8.1.1. Console Components 9.8.1.2. Installing Remote Viewer on Linux 9.8.1.3. Installing Remote Viewer for Internet Explorer on Windows 9.8.1.4. Installing Remote Viewer on Windows 9.8.2. Guest Drivers and Agents Expand section "9.8.2. Guest Drivers and Agents" Collapse section "9.8.2. Guest Drivers and Agents" 9.8.2.1. Installing Guest Agents and Drivers 9.8.2.2. Automating Guest Additions on Windows Guests with Red Hat Enterprise Virtualization Application Provisioning Tool(APT) 9.8.2.3. Red Hat Enterprise Virtualization Guest Drivers and Guest Agents 9.8.2.4. Subscribing to Channels Expand section "9.8.2.4. Subscribing to Channels" Collapse section "9.8.2.4. Subscribing to Channels" 9.8.2.4.1. Subscribing to Channels Using Subscription Manager 9.8.2.4.2. Subscribing to Channels Using RHN Classic 9.8.3. Accessing Virtual machines Expand section "9.8.3. Accessing Virtual machines" Collapse section "9.8.3. Accessing Virtual machines" 9.8.3.1. Starting a Virtual Machine 9.8.3.2. Opening a Console to a Virtual Machine 9.8.3.3. Shutting Down a Virtual Machine 9.8.3.4. Pausing a Virtual Machine 9.8.3.5. Rebooting a Virtual Machine 9.9. Removing Virtual Machines Expand section "9.9. Removing Virtual Machines" Collapse section "9.9. Removing Virtual Machines" 9.9.1. Removing a Virtual Machine 9.10. Virtual Machines and Permissions Expand section "9.10. Virtual Machines and Permissions" Collapse section "9.10. Virtual Machines and Permissions" 9.10.1. Managing System Permissions for a Virtual Machine 9.10.2. Virtual Machines Administrator Roles Explained 9.10.3. Virtual Machine User Roles Explained 9.10.4. Assigning Virtual Machines to Users 9.10.5. Removing Access to Virtual Machines from Users 9.11. Snapshots Expand section "9.11. Snapshots" Collapse section "9.11. Snapshots" 9.11.1. Creating a Snapshot of a Virtual Machine 9.11.2. Using a Snapshot to Restore a Virtual Machine 9.11.3. Creating a Virtual Machine from a Snapshot 9.11.4. Deleting a Snapshot 9.12. Affinity Groups Expand section "9.12. Affinity Groups" Collapse section "9.12. Affinity Groups" 9.12.1. Introduction to Virtual Machine Affinity 9.12.2. Creating an Affinity Group 9.12.3. Editing an Affinity Group 9.12.4. Removing an Affinity Group 9.13. Importing and Exporting Virtual Machines Expand section "9.13. Importing and Exporting Virtual Machines" Collapse section "9.13. Importing and Exporting Virtual Machines" 9.13.1. Exporting and Importing Virtual Machines and Templates 9.13.2. Overview of the Export and Import Process 9.13.3. Exporting and Importing Virtual Machines and Templates 9.13.4. Exporting a Virtual Machine to the Export Domain 9.13.5. Importing a Virtual Machine into the Destination Data Center 9.14. Migrating Virtual Machines Between Hosts Expand section "9.14. Migrating Virtual Machines Between Hosts" Collapse section "9.14. Migrating Virtual Machines Between Hosts" 9.14.1. What is Live Migration? 9.14.2. Live Migration Prerequisites 9.14.3. Automatic Virtual Machine Migration 9.14.4. Preventing Automatic Migration of a Virtual Machine 9.14.5. Manually Migrating Virtual Machines 9.14.6. Setting Migration Priority 9.14.7. Canceling Ongoing Virtual Machine Migrations 9.14.8. Event and Log Notification upon Automatic Migration of Highly Available Virtual Servers 9.15. Improving Uptime with Virtual Machine High Availability Expand section "9.15. Improving Uptime with Virtual Machine High Availability" Collapse section "9.15. Improving Uptime with Virtual Machine High Availability" 9.15.1. Why Use High Availability? 9.15.2. What is High Availability? 9.15.3. High Availability Considerations 9.15.4. Configuring a Highly Available Virtual Machine 9.16. Other Virtual Machine Tasks Expand section "9.16. Other Virtual Machine Tasks" Collapse section "9.16. Other Virtual Machine Tasks" 9.16.1. Enabling SAP monitoring for a virtual machine from the Administration Portal 9.16.2. Configuring Red Hat Enterprise Linux 5.4 or Higher Virtual Machines to use SPICE Expand section "9.16.2. Configuring Red Hat Enterprise Linux 5.4 or Higher Virtual Machines to use SPICE" Collapse section "9.16.2. Configuring Red Hat Enterprise Linux 5.4 or Higher Virtual Machines to use SPICE" 9.16.2.1. Using SPICE on virtual machines running versions of Red Hat Enterprise Linux released prior to 5.4 9.16.2.2. Installing qxl drivers on virtual machines 9.16.2.3. Configuring qxl drivers on virtual machines 9.16.2.4. Configuring a virtual machine's tablet and mouse to use SPICE 9.16.3. KVM virtual machine timing management 9.16.4. Monitoring Virtual Machine Login Activity Using the Sessions Tab 10. Templates Expand section "10. Templates" Collapse section "10. Templates" 10.1. Introduction to Templates 10.2. Template Tasks Expand section "10.2. Template Tasks" Collapse section "10.2. Template Tasks" 10.2.1. Creating a Template 10.2.2. Explanation of Settings and Controls in the New Template Window 10.2.3. Editing a Template 10.2.4. Deleting a Template 10.2.5. Exporting Templates Expand section "10.2.5. Exporting Templates" Collapse section "10.2.5. Exporting Templates" 10.2.5.1. Migrating Templates to the Export Domain 10.2.5.2. Copying a Template's Virtual Hard Disk 10.2.6. Importing Templates Expand section "10.2.6. Importing Templates" Collapse section "10.2.6. Importing Templates" 10.2.6.1. Importing a Template into a Data Center 10.2.6.2. Importing a Virtual Disk Image from an OpenStack Image Service as a Template 10.3. Sealing Templates in Preparation for Deployment Expand section "10.3. Sealing Templates in Preparation for Deployment" Collapse section "10.3. Sealing Templates in Preparation for Deployment" 10.3.1. Sealing a Linux Virtual Machine Manually for Deployment as a Template 10.3.2. Sealing a Linux Virtual Machine for Deployment as a Template using sys-unconfig 10.3.3. Sealing a Windows Template Expand section "10.3.3. Sealing a Windows Template" Collapse section "10.3.3. Sealing a Windows Template" 10.3.3.1. Considerations when Sealing a Windows Template with Sysprep 10.3.3.2. Sealing a Windows XP Template 10.3.3.3. Sealing a Windows 7 or Windows 2008 Template 10.3.4. Using Cloud-Init to Automate the Configuration of Virtual Machines Expand section "10.3.4. Using Cloud-Init to Automate the Configuration of Virtual Machines" Collapse section "10.3.4. Using Cloud-Init to Automate the Configuration of Virtual Machines" 10.3.4.1. Cloud-Init Overview 10.3.4.2. Cloud-Init Use Case Scenarios 10.3.4.3. Installing Cloud-Init 10.3.4.4. Using Cloud-Init to Initialize a Virtual Machine 10.3.4.5. Using Cloud-Init to Prepare a Template 10.4. Templates and Permissions Expand section "10.4. Templates and Permissions" Collapse section "10.4. Templates and Permissions" 10.4.1. Managing System Permissions for a Template 10.4.2. Template Administrator Roles Explained 10.4.3. Template User Roles Explained 10.4.4. Assigning an Administrator or User Role to a Resource 10.4.5. Removing an Administrator or User Role from a Resource 11. Pools Expand section "11. Pools" Collapse section "11. Pools" 11.1. Introduction to Virtual Machine Pools 11.2. Virtual Machine Pool Tasks Expand section "11.2. Virtual Machine Pool Tasks" Collapse section "11.2. Virtual Machine Pool Tasks" 11.2.1. Creating a Virtual Machine Pool 11.2.2. Explanation of Settings and Controls in the New Pool Window Expand section "11.2.2. Explanation of Settings and Controls in the New Pool Window" Collapse section "11.2.2. Explanation of Settings and Controls in the New Pool Window" 11.2.2.1. New Pool General Settings Explained 11.2.2.2. New Pool Pool Settings Explained 11.2.2.3. New Pool and Edit Pool Console Settings Explained 11.2.3. Editing a Virtual Machine Pool 11.2.4. Explanation of Settings and Controls in the Edit Pool Window Expand section "11.2.4. Explanation of Settings and Controls in the Edit Pool Window" Collapse section "11.2.4. Explanation of Settings and Controls in the Edit Pool Window" 11.2.4.1. Edit Pool General Settings Explained 11.2.5. Prestarting Virtual Machines in a Pool 11.2.6. Adding Virtual Machines to a Virtual Machine Pool 11.2.7. Detaching Virtual Machines from a Virtual Machine Pool 11.2.8. Removing a Virtual Machine Pool 11.3. Pools and Permissions Expand section "11.3. Pools and Permissions" Collapse section "11.3. Pools and Permissions" 11.3.1. Managing System Permissions for a Virtual Machine Pool 11.3.2. Virtual Machine Pool Administrator Roles Explained 11.3.3. Assigning an Administrator or User Role to a Resource 11.3.4. Removing an Administrator or User Role from a Resource 11.4. Trusted Compute Pools Expand section "11.4. Trusted Compute Pools" Collapse section "11.4. Trusted Compute Pools" 11.4.1. Creating a Trusted Cluster 11.4.2. Adding a Trusted Host 12. Virtual Machine Disks Expand section "12. Virtual Machine Disks" Collapse section "12. Virtual Machine Disks" 12.1. Understanding Virtual Machine Storage 12.2. Understanding Virtual Disks 12.3. Shareable Disks in Red Hat Enterprise Virtualization 12.4. Read Only Disks in Red Hat Enterprise Virtualization 12.5. Virtual Disk Tasks Expand section "12.5. Virtual Disk Tasks" Collapse section "12.5. Virtual Disk Tasks" 12.5.1. Creating Floating Virtual Disks 12.5.2. Explanation of Settings in the New Virtual Disk Window 12.5.3. Overview of Live Storage Migration 12.5.4. Moving a Virtual Disk 12.5.5. Copying a Virtual Disk 12.5.6. Importing a Virtual Disk Image from an OpenStack Image Service 12.5.7. Exporting a Virtual Machine Disk to an OpenStack Image Service 12.6. Virtual Disks and Permissions Expand section "12.6. Virtual Disks and Permissions" Collapse section "12.6. Virtual Disks and Permissions" 12.6.1. Managing System Permissions for a Virtual Disk 12.6.2. Virtual Disk User Roles Explained 12.6.3. Assigning an Administrator or User Role to a Resource 12.6.4. Removing an Administrator or User Role from a Resource 13. External Providers Expand section "13. External Providers" Collapse section "13. External Providers" 13.1. Introduction to External Providers in Red Hat Enterprise Virtualization 13.2. Enabling the Authentication of OpenStack Providers 13.3. Adding External Providers Expand section "13.3. Adding External Providers" Collapse section "13.3. Adding External Providers" 13.3.1. Adding an External Provider 13.3.2. Adding a Foreman Instance for Host Provisioning 13.3.3. Adding an OpenStack Networking (Neutron) Instance for Network Provisioning 13.3.4. Adding an OpenStack Image Service (Glance) Instance for Image Management 13.3.5. Add Provider General Settings Explained 13.3.6. Add Provider Agent Configuration Settings Explained 13.4. Editing External Providers Expand section "13.4. Editing External Providers" Collapse section "13.4. Editing External Providers" 13.4.1. Editing an External Provider 13.5. Removing External Providers Expand section "13.5. Removing External Providers" Collapse section "13.5. Removing External Providers" 13.5.1. Removing an External Provider II. Administering the Environment Expand section "II. Administering the Environment" Collapse section "II. Administering the Environment" 14. Updating the Red Hat Enterprise Virtualization Environment Expand section "14. Updating the Red Hat Enterprise Virtualization Environment" Collapse section "14. Updating the Red Hat Enterprise Virtualization Environment" 14.1. Upgrades between Minor Releases Expand section "14.1. Upgrades between Minor Releases" Collapse section "14.1. Upgrades between Minor Releases" 14.1.1. Checking for Red Hat Enterprise Virtualization Manager Updates 14.1.2. Updating the Red Hat Enterprise Virtualization Manager 14.1.3. Updating Red Hat Enterprise Virtualization Hypervisors 14.1.4. Updating Red Hat Enterprise Linux Virtualization Hosts 14.1.5. Updating the Red Hat Enterprise Virtualization Guest Tools 14.2. Upgrading to Red Hat Enterprise Virtualization 3.4 Expand section "14.2. Upgrading to Red Hat Enterprise Virtualization 3.4" Collapse section "14.2. Upgrading to Red Hat Enterprise Virtualization 3.4" 14.2.1. Red Hat Enterprise Virtualization Manager 3.4 Upgrade Overview 14.2.2. Features Requiring a Compatibility Upgrade to Red Hat Enterprise Virtualization 3.4 14.2.3. Red Hat Enterprise Virtualization 3.4 Upgrade Considerations 14.2.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.4 14.3. Upgrading to Red Hat Enterprise Virtualization 3.3 Expand section "14.3. Upgrading to Red Hat Enterprise Virtualization 3.3" Collapse section "14.3. Upgrading to Red Hat Enterprise Virtualization 3.3" 14.3.1. Red Hat Enterprise Virtualization Manager 3.3 Upgrade Overview 14.3.2. Features Requiring a Compatibility Upgrade to Red Hat Enterprise Virtualization 3.3 14.3.3. Red Hat Enterprise Virtualization 3.3 Upgrade Considerations 14.3.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.3 14.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.2 Expand section "14.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.2" Collapse section "14.4. Upgrading to Red Hat Enterprise Virtualization Manager 3.2" 14.4.1. Upgrading to Red Hat Enterprise Virtualization Manager 3.2 14.5. Upgrading to Red Hat Enterprise Virtualization Manager 3.1 Expand section "14.5. Upgrading to Red Hat Enterprise Virtualization Manager 3.1" Collapse section "14.5. Upgrading to Red Hat Enterprise Virtualization Manager 3.1" 14.5.1. Upgrading to Red Hat Enterprise Virtualization Manager 3.1 14.6. Post-upgrade Tasks Expand section "14.6. Post-upgrade Tasks" Collapse section "14.6. Post-upgrade Tasks" 14.6.1. Changing the Cluster Compatibility Version 14.6.2. Changing the Data Center Compatibility Version 15. Backups Expand section "15. Backups" Collapse section "15. Backups" 15.1. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager Expand section "15.1. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager" Collapse section "15.1. Backing Up and Restoring the Red Hat Enterprise Virtualization Manager" 15.1.1. Backing up Red Hat Enterprise Virtualization Manager - Overview 15.1.2. Syntax for the engine-backup Command 15.1.3. Creating a Backup with the engine-backup Command 15.1.4. Restoring a Backup with the engine-backup Command 15.1.5. Restoring a Backup to a Fresh Installation 15.1.6. Restoring a Backup to Overwrite an Existing Installation 15.1.7. Restoring a Backup with Different Credentials 15.2. Manually Backing Up and Restoring the Red Hat Enterprise Virtualization Manager Expand section "15.2. Manually Backing Up and Restoring the Red Hat Enterprise Virtualization Manager" Collapse section "15.2. Manually Backing Up and Restoring the Red Hat Enterprise Virtualization Manager" 15.2.1. Backing Up the Engine Database Using the backup.sh Script 15.2.2. Backing Up Manager Configuration Files 15.2.3. Restoring the Engine Database Using the restore.sh Script 15.2.4. Restoring Red Hat Enterprise Virtualization Manager Configuration Files 15.3. Backing Up and Restoring Virtual Machines Using the Backup and Restore API Expand section "15.3. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" Collapse section "15.3. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" 15.3.1. The Backup and Restore API 15.3.2. Backing Up a Virtual Machine 15.3.3. Restoring a Virtual Machine 16. Users and Roles Expand section "16. Users and Roles" Collapse section "16. Users and Roles" 16.1. Introduction to Users 16.2. Directory Users Expand section "16.2. Directory Users" Collapse section "16.2. Directory Users" 16.2.1. Directory Services Support in Red Hat Enterprise Virtualization 16.3. User Authorization Expand section "16.3. User Authorization" Collapse section "16.3. User Authorization" 16.3.1. User Authorization Model 16.3.2. User Actions 16.3.3. User Permissions 16.4. Red Hat Enterprise Virtualization Manager User Properties and Roles Expand section "16.4. Red Hat Enterprise Virtualization Manager User Properties and Roles" Collapse section "16.4. Red Hat Enterprise Virtualization Manager User Properties and Roles" 16.4.1. User Properties 16.4.2. User and Administrator Roles 16.4.3. User Roles Explained 16.4.4. Administrator Roles Explained 16.5. Red Hat Enterprise Virtualization Manager User Tasks Expand section "16.5. Red Hat Enterprise Virtualization Manager User Tasks" Collapse section "16.5. Red Hat Enterprise Virtualization Manager User Tasks" 16.5.1. Adding Users 16.5.2. Viewing User Information 16.5.3. Viewing User Permissions on Resources 16.5.4. Removing Users 16.5.5. Configuring Roles 16.5.6. Creating a New Role 16.5.7. Editing or Copying a Role 16.6. User Role and Authorization Examples 17. Quotas and Service Level Agreement Policy Expand section "17. Quotas and Service Level Agreement Policy" Collapse section "17. Quotas and Service Level Agreement Policy" 17.1. Introduction to Quota 17.2. Shared Quota and Individually Defined Quota 17.3. Quota Accounting 17.4. Enabling and Changing a Quota Mode in a Data Center 17.5. Creating a New Quota Policy 17.6. Explanation of Quota Threshold Settings 17.7. Assigning a Quota to an Object 17.8. Using Quota to Limit Resources by User 17.9. Editing Quotas 17.10. Removing Quotas 17.11. Service-level Agreement Policy Enforcement 18. Event Notifications Expand section "18. Event Notifications" Collapse section "18. Event Notifications" 18.1. Configuring Event Notifications 18.2. Parameters for Event Notifications in ovirt-engine-notifier.conf 18.3. Canceling Event Notifications 19. Utilities Expand section "19. Utilities" Collapse section "19. Utilities" 19.1. The Ovirt Engine Rename Tool Expand section "19.1. The Ovirt Engine Rename Tool" Collapse section "19.1. The Ovirt Engine Rename Tool" 19.1.1. The Ovirt Engine Rename Tool 19.1.2. Syntax for the Ovirt Engine Rename Command 19.1.3. Using the Ovirt Engine Rename Tool 19.2. The Domain Management Tool Expand section "19.2. The Domain Management Tool" Collapse section "19.2. The Domain Management Tool" 19.2.1. The Domain Management Tool 19.2.2. Syntax for the Domain Management Tool 19.2.3. Using the Domain Management Tool 19.2.4. Listing Domains in Configuration 19.2.5. Adding Domains to Configuration 19.2.6. Editing a Domain in the Configuration 19.2.7. Validating Domain Configuration 19.2.8. Deleting a Domain from the Configuration 19.3. The Configuration Tool Expand section "19.3. The Configuration Tool" Collapse section "19.3. The Configuration Tool" 19.3.1. The Configuration Tool 19.3.2. Syntax for engine-config Command 19.3.3. Getting a Configuration Value 19.3.4. Setting a Configuration Value 19.3.5. The admin@internal User 19.3.6. Changing the Password for admin@internal 19.3.7. Configuration Tool Examples 19.3.8. Red Hat Enterprise Virtualization Manager Configuration Options 19.4. The Image Uploader Tool Expand section "19.4. The Image Uploader Tool" Collapse section "19.4. The Image Uploader Tool" 19.4.1. The Image Uploader Tool 19.4.2. Syntax for the engine-image-uploader Command 19.4.3. Creating an OVF Archive That is Compatible With the Image Uploader 19.4.4. Basic engine-image-uploader Usage Examples 19.5. The USB Filter Editor Expand section "19.5. The USB Filter Editor" Collapse section "19.5. The USB Filter Editor" 19.5.1. Installing the USB Filter Editor 19.5.2. The USB Filter Editor Interface 19.5.3. Adding a USB Policy 19.5.4. Removing a USB Policy 19.5.5. Searching for USB Device Policies 19.5.6. Exporting a USB Policy 19.5.7. Importing a USB Policy 19.6. The Log Collector Tool Expand section "19.6. The Log Collector Tool" Collapse section "19.6. The Log Collector Tool" 19.6.1. Log Collector 19.6.2. Syntax for engine-log-collector Command 19.6.3. Basic Log Collector Usage 19.7. The ISO Uploader Tool Expand section "19.7. The ISO Uploader Tool" Collapse section "19.7. The ISO Uploader Tool" 19.7.1. The ISO Uploader Tool 19.7.2. Syntax for the engine-iso-uploader Command 19.7.3. Specifying an NFS Server 19.7.4. Basic ISO Uploader Usage 19.7.5. Uploading the VirtIO and Guest Tool Image Files to an ISO Storage Domain 19.7.6. VirtIO and Guest Tool Image Files 20. Log Files Expand section "20. Log Files" Collapse section "20. Log Files" 20.1. Red Hat Enterprise Virtualization Manager Installation Log Files 20.2. Red Hat Enterprise Virtualization Manager Log Files 20.3. SPICE Log Files 20.4. Red Hat Enterprise Virtualization Host Log Files 20.5. Remotely Logging Host Activities Expand section "20.5. Remotely Logging Host Activities" Collapse section "20.5. Remotely Logging Host Activities" 20.5.1. Setting Up a Virtualization Host Logging Server 20.5.2. Configuring Red Hat Enterprise Virtualization Hypervisor Hosts to Use a Logging Server 21. Proxies Expand section "21. Proxies" Collapse section "21. Proxies" 21.1. SPICE Proxy Expand section "21.1. SPICE Proxy" Collapse section "21.1. SPICE Proxy" 21.1.1. SPICE Proxy Overview 21.1.2. SPICE Proxy Machine Setup 21.1.3. Turning on SPICE Proxy 21.1.4. Turning Off a SPICE Proxy 21.2. Squid Proxy Expand section "21.2. Squid Proxy" Collapse section "21.2. Squid Proxy" 21.2.1. Installing and Configuring a Squid Proxy III. Gathering Information About the Environment Expand section "III. Gathering Information About the Environment" Collapse section "III. Gathering Information About the Environment" 22. Reports, History Database Reports, and Dashboards Expand section "22. Reports, History Database Reports, and Dashboards" Collapse section "22. Reports, History Database Reports, and Dashboards" 22.1. Reports Expand section "22.1. Reports" Collapse section "22.1. Reports" 22.1.1. Reports 22.1.2. Database Names in Red Hat Enterprise Virtualization 3.0 and 3.1 22.1.3. JasperReports and JasperServer in Red Hat Enterprise Virtualization 22.1.4. Online Help for JasperReports 22.1.5. Jasper Reports System Requirements 22.1.6. Users in the Red Hat Enterprise Virtualization Reports Portal 22.1.7. Logging in to Access the Reports Portal 22.1.8. Accessing the Red Hat Enterprise Virtualization Reports User Management Menu 22.1.9. Reports Portal User Roles 22.1.10. Navigating Reports and Dashboards 22.1.11. Report Parameters 22.1.12. Right-click Reporting Integration with the Red Hat Enterprise Virtualization Administration Portal 22.1.13. Executive Reports Expand section "22.1.13. Executive Reports" Collapse section "22.1.13. Executive Reports" 22.1.13.1. Executive reports: Active Virtual Machines by OS 22.1.13.2. Executive Reports: Cluster Capacity Vs Usage 22.1.13.3. Executive Reports: Host Operating System Break Down 22.1.13.4. Executive Reports: Summary of Host Usage Resources 22.1.14. Inventory Reports Expand section "22.1.14. Inventory Reports" Collapse section "22.1.14. Inventory Reports" 22.1.14.1. Inventory Reports: Hosts Inventory 22.1.14.2. Inventory Reports: Storage Domain Over Time 22.1.14.3. Inventory Reports: Virtual Machines Inventory 22.1.14.4. Inventory Reports: Cloud Provider Virtual Machine Inventory 22.1.14.5. Inventory Reports: Storage Domains 22.1.15. Service Level Reports Expand section "22.1.15. Service Level Reports" Collapse section "22.1.15. Service Level Reports" 22.1.15.1. Service Level Reports: Cluster Host Uptime 22.1.15.2. Service Level Reports: Cluster Quality of Service - Hosts 22.1.15.3. Service Level Reports: Cluster Quality of Service - Virtual Machines 22.1.15.4. Service Level Reports: Single Host Uptime 22.1.15.5. Service Level Reports: Top 10 Downtime Hosts 22.1.15.6. Service Level Reports: High Availability Virtual Servers Uptime 22.1.16. Trend Reports Expand section "22.1.16. Trend Reports" Collapse section "22.1.16. Trend Reports" 22.1.16.1. Trend Reports: Five Least Utilized Hosts (Over Time) 22.1.16.2. Trend Reports: Five Least Utilized Virtual Machines (Over Time) 22.1.16.3. Trend Reports: Five Most Utilized Hosts (Over Time) 22.1.16.4. Trend Reports: Five Most Utilized Virtual Machines (Over Time) 22.1.16.5. Trend Reports: Multiple Hosts Resource Usage (Over Time) 22.1.16.6. Trend Reports: Multiple Virtual Machines Resource Usage (Over Time) 22.1.16.7. Trend Reports: Single Host Resource Usage (Days of Week) 22.1.16.8. Trend Reports: Single Host Resource Usage (Hour of Day) 22.1.16.9. Trend Reports: Single Virtual Machine Resources (Days of Week) 22.1.16.10. Trend Reports: Single Virtual Machine Resources (Hour of Day) 22.1.16.11. Trend Reports: Single Virtual Machine Resources (Over Time) 22.1.17. Ad Hoc Reports 22.1.18. Reports Schema: Tag History and ENUM Views 22.2. History Database Reports Expand section "22.2. History Database Reports" Collapse section "22.2. History Database Reports" 22.2.1. Red Hat Enterprise Virtualization History Database 22.2.2. Tracking Configuration History 22.2.3. Recording Statistical History 22.2.4. Tracking Tag History 22.2.5. Connecting to the History Database 22.2.6. Allowing Read-Only Access to the History Database 22.2.7. History Database Report Examples 22.3. Dashboards Expand section "22.3. Dashboards" Collapse section "22.3. Dashboards" 22.3.1. Dashboards 22.3.2. Inventory Dashboard 22.3.3. Trends Dashboard 22.3.4. Uptime Dashboard 22.3.5. Integrated Reporting Dashboard in the Red Hat Enterprise Virtualization Administration Portal A. Firewalls Expand section "A. Firewalls" Collapse section "A. Firewalls" A.1. Red Hat Enterprise Virtualization Manager Firewall Requirements A.2. Virtualization Host Firewall Requirements A.3. Directory Server Firewall Requirements A.4. Database Server Firewall Requirements B. VDSM and Hooks Expand section "B. VDSM and Hooks" Collapse section "B. VDSM and Hooks" B.1. VDSM B.2. VDSM Hooks B.3. Extending VDSM with Hooks B.4. Supported VDSM Events B.5. The VDSM Hook Environment B.6. The VDSM Hook Domain XML Object B.7. Defining Custom Properties B.8. Setting Virtual Machine Custom Properties B.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook B.10. Using the VDSM Hooking Module B.11. VDSM Hook Execution B.12. VDSM Hook Return Codes B.13. VDSM Hook Examples C. Red Hat Enterprise Virtualization User Interface Plugins Expand section "C. Red Hat Enterprise Virtualization User Interface Plugins" Collapse section "C. Red Hat Enterprise Virtualization User Interface Plugins" C.1. Red Hat Enterprise Virtualization User Interface Plug-ins C.2. Red Hat Enterprise Virtualization User Interface Plugin Lifecycle Expand section "C.2. Red Hat Enterprise Virtualization User Interface Plugin Lifecycle" Collapse section "C.2. Red Hat Enterprise Virtualization User Interface Plugin Lifecycle" C.2.1. Red Hat Enterprise Virtualization User Interface Plug-in Life cycle C.2.2. Red Hat Enterprise Virtualization User Interface Plug-in Discovery C.2.3. Red Hat Enterprise Virtualization User Interface Plug-in Loading C.2.4. Red Hat Enterprise Virtualization User Interface Plug-in Bootstrapping C.3. User Interface Plugin-related Files and Their Locations C.4. Example User Interface Plug-in Deployment C.5. Installing the Red Hat Support Plug-in C.6. Using Red Hat Support Plug-in D. Red Hat Enterprise Virtualization and SSL Expand section "D. Red Hat Enterprise Virtualization and SSL" Collapse section "D. Red Hat Enterprise Virtualization and SSL" D.1. Replacing the Red Hat Enterprise Virtualization Manager SSL Certificate E. Using Search, Bookmarks, and Tags Expand section "E. Using Search, Bookmarks, and Tags" Collapse section "E. Using Search, Bookmarks, and Tags" E.1. Searches Expand section "E.1. Searches" Collapse section "E.1. Searches" E.1.1. Performing Searches in Red Hat Enterprise Virtualization E.1.2. Search Syntax and Examples E.1.3. Search Auto-Completion E.1.4. Search Result Type Options E.1.5. Search Criteria E.1.6. Search: Multiple Criteria and Wildcards E.1.7. Search: Determining Search Order E.1.8. Searching for Data Centers E.1.9. Searching for Clusters E.1.10. Searching for Hosts E.1.11. Searching for Networks E.1.12. Searching for Storage E.1.13. Searching for Disks E.1.14. Searching for Volumes E.1.15. Searching for Virtual Machines E.1.16. Searching for Pools E.1.17. Searching for Templates E.1.18. Searching for Users E.1.19. Searching for Events E.2. Bookmarks Expand section "E.2. Bookmarks" Collapse section "E.2. Bookmarks" E.2.1. Saving a Query String as a Bookmark E.2.2. Editing a Bookmark E.2.3. Deleting a Bookmark E.3. Tags Expand section "E.3. Tags" Collapse section "E.3. Tags" E.3.1. Using Tags to Customize Interactions with Red Hat Enterprise Virtualization E.3.2. Creating a Tag E.3.3. Modifying a Tag E.3.4. Deleting a Tag E.3.5. Adding and Removing Tags to and from Objects E.3.6. Searching for Objects Using Tags F. Branding Expand section "F. Branding" Collapse section "F. Branding" F.1. Branding Expand section "F.1. Branding" Collapse section "F.1. Branding" F.1.1. Re-Branding the Manager F.1.2. Login Screen F.1.3. Administration Portal Screen F.1.4. User Portal Screen F.1.5. Pop-Up Windows F.1.6. Tabs F.1.7. The Welcome Page F.1.8. The Page Not Found Page G. Revision History Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF 19.7.3. Specifying an NFS Server Example 19.14. Uploading to an NFS Server# engine-iso-uploader --nfs-server=storage.demo.redhat.com:/iso/path upload RHEL6.0.iso Report a bug Previous Next