Jump To Close Expand all Collapse all Table of contents Administration Guide I. Administering and Maintaining the Red Hat Virtualization Environment Expand section "I. Administering and Maintaining the Red Hat Virtualization Environment" Collapse section "I. Administering and Maintaining the Red Hat Virtualization Environment" 1. Global Configuration Expand section "1. Global Configuration" Collapse section "1. Global Configuration" 1.1. Roles Expand section "1.1. Roles" Collapse section "1.1. Roles" 1.1.1. Creating a New Role 1.1.2. Editing or Copying a Role 1.1.3. User Role and Authorization Examples 1.2. System Permissions Expand section "1.2. System Permissions" Collapse section "1.2. System Permissions" 1.2.1. User Properties 1.2.2. User and Administrator Roles 1.2.3. User Roles Explained 1.2.4. Administrator Roles Explained 1.3. Scheduling Policies Expand section "1.3. Scheduling Policies" Collapse section "1.3. Scheduling Policies" 1.3.1. Creating a Scheduling Policy 1.3.2. Explanation of Settings in the New Scheduling Policy and Edit Scheduling Policy Window 1.4. Instance Types Expand section "1.4. Instance Types" Collapse section "1.4. Instance Types" 1.4.1. Creating Instance Types 1.4.2. Editing Instance Types 1.4.3. Removing Instance Types 1.5. MAC Address Pools Expand section "1.5. MAC Address Pools" Collapse section "1.5. MAC Address Pools" 1.5.1. Creating MAC Address Pools 1.5.2. Editing MAC Address Pools 1.5.3. Editing MAC Address Pool Permissions 1.5.4. Removing MAC Address Pools 2. Dashboard Expand section "2. Dashboard" Collapse section "2. Dashboard" 2.1. Prerequisites 2.2. Global Inventory 2.3. Global Utilization Expand section "2.3. Global Utilization" Collapse section "2.3. Global Utilization" 2.3.1. Top Utilized Resources 2.4. Cluster Utilization Expand section "2.4. Cluster Utilization" Collapse section "2.4. Cluster Utilization" 2.4.1. CPU 2.4.2. Memory 2.5. Storage Utilization II. Administering the Resources Expand section "II. Administering the Resources" Collapse section "II. Administering the Resources" 3. Quality of Service Expand section "3. Quality of Service" Collapse section "3. Quality of Service" 3.1. Storage Quality of Service Expand section "3.1. Storage Quality of Service" Collapse section "3.1. Storage Quality of Service" 3.1.1. Creating a Storage Quality of Service Entry 3.1.2. Removing a Storage Quality of Service Entry 3.2. Virtual Machine Network Quality of Service Expand section "3.2. Virtual Machine Network Quality of Service" Collapse section "3.2. Virtual Machine Network Quality of Service" 3.2.1. Creating a Virtual Machine Network Quality of Service Entry 3.2.2. Settings in the New Virtual Machine Network QoS and Edit Virtual Machine Network QoS Windows Explained 3.2.3. Removing a Virtual Machine Network Quality of Service Entry 3.3. Host Network Quality of Service Expand section "3.3. Host Network Quality of Service" Collapse section "3.3. Host Network Quality of Service" 3.3.1. Creating a Host Network Quality of Service Entry 3.3.2. Settings in the New Host Network Quality of Service and Edit Host Network Quality of Service Windows Explained 3.3.3. Removing a Host Network Quality of Service Entry 3.4. CPU Quality of Service Expand section "3.4. CPU Quality of Service" Collapse section "3.4. CPU Quality of Service" 3.4.1. Creating a CPU Quality of Service Entry 3.4.2. Removing a CPU Quality of Service Entry 4. Data Centers Expand section "4. Data Centers" Collapse section "4. Data Centers" 4.1. Introduction to Data Centers 4.2. The Storage Pool Manager 4.3. SPM Priority 4.4. Using the Events Tab to Identify Problem Objects in Data Centers 4.5. Data Center Tasks Expand section "4.5. Data Center Tasks" Collapse section "4.5. Data Center Tasks" 4.5.1. Creating a New Data Center 4.5.2. Explanation of Settings in the New Data Center and Edit Data Center Windows 4.5.3. Re-Initializing a Data Center: Recovery Procedure 4.5.4. Removing a Data Center 4.5.5. Force Removing a Data Center 4.5.6. Changing the Data Center Storage Type 4.5.7. Changing the Data Center Compatibility Version 4.6. Data Centers and Storage Domains Expand section "4.6. Data Centers and Storage Domains" Collapse section "4.6. Data Centers and Storage Domains" 4.6.1. Attaching an Existing Data Domain to a Data Center 4.6.2. Attaching an Existing ISO domain to a Data Center 4.6.3. Attaching an Existing Export Domain to a Data Center 4.6.4. Detaching a Storage Domain from a Data Center 4.7. Data Centers and Permissions Expand section "4.7. Data Centers and Permissions" Collapse section "4.7. Data Centers and Permissions" 4.7.1. Managing System Permissions for a Data Center 4.7.2. Data Center Administrator Roles Explained 4.7.3. Assigning an Administrator or User Role to a Resource 4.7.4. Removing an Administrator or User Role from a Resource 5. Clusters Expand section "5. Clusters" Collapse section "5. Clusters" 5.1. Introduction to Clusters 5.2. Cluster Tasks Expand section "5.2. Cluster Tasks" Collapse section "5.2. Cluster Tasks" 5.2.1. Creating a New Cluster 5.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows Expand section "5.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows" Collapse section "5.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows" 5.2.2.1. General Cluster Settings Explained 5.2.2.2. Optimization Settings Explained 5.2.2.3. Migration Policy Settings Explained 5.2.2.4. Scheduling Policy Settings Explained 5.2.2.5. Cluster Console Settings Explained 5.2.2.6. Fencing Policy Settings Explained 5.2.3. Editing a Resource 5.2.4. Setting Load and Power Management Policies for Hosts in a Cluster 5.2.5. Updating the MoM Policy on Hosts in a Cluster 5.2.6. CPU Profiles Expand section "5.2.6. CPU Profiles" Collapse section "5.2.6. CPU Profiles" 5.2.6.1. Creating a CPU Profile 5.2.6.2. Removing a CPU Profile 5.2.7. Importing an Existing Red Hat Gluster Storage Cluster 5.2.8. Explanation of Settings in the Add Hosts Window 5.2.9. Removing a Cluster 5.2.10. Changing the Cluster Compatibility Version 5.3. Clusters and Permissions Expand section "5.3. Clusters and Permissions" Collapse section "5.3. Clusters and Permissions" 5.3.1. Managing System Permissions for a Cluster 5.3.2. Cluster Administrator Roles Explained 5.3.3. Assigning an Administrator or User Role to a Resource 5.3.4. Removing an Administrator or User Role from a Resource 6. Logical Networks Expand section "6. Logical Networks" Collapse section "6. Logical Networks" 6.1. Logical Network Tasks Expand section "6.1. Logical Network Tasks" Collapse section "6.1. Logical Network Tasks" 6.1.1. Using the Networks Tab 6.1.2. Creating a New Logical Network in a Data Center or Cluster 6.1.3. Editing a Logical Network 6.1.4. Removing a Logical Network 6.1.5. Viewing or Editing the Gateway for a Logical Network 6.1.6. Explanation of Settings and Controls in the New Logical Network and Edit Logical Network Windows Expand section "6.1.6. Explanation of Settings and Controls in the New Logical Network and Edit Logical Network Windows" Collapse section "6.1.6. Explanation of Settings and Controls in the New Logical Network and Edit Logical Network Windows" 6.1.6.1. Logical Network General Settings Explained 6.1.6.2. Logical Network Cluster Settings Explained 6.1.6.3. Logical Network vNIC Profiles Settings Explained 6.1.7. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window 6.1.8. Explanation of Settings in the Manage Networks Window 6.1.9. Editing the Virtual Function Configuration on a NIC 6.2. Virtual Network Interface Cards Expand section "6.2. Virtual Network Interface Cards" Collapse section "6.2. Virtual Network Interface Cards" 6.2.1. vNIC Profile Overview 6.2.2. Creating or Editing a vNIC Profile 6.2.3. Explanation of Settings in the VM Interface Profile Window 6.2.4. Enabling Passthrough on a vNIC Profile 6.2.5. Removing a vNIC Profile 6.2.6. Assigning Security Groups to vNIC Profiles 6.2.7. User Permissions for vNIC Profiles 6.2.8. Configuring vNIC Profiles for UCS Integration 6.3. External Provider Networks Expand section "6.3. External Provider Networks" Collapse section "6.3. External Provider Networks" 6.3.1. Importing Networks From External Providers 6.3.2. Limitations to Using External Provider Networks 6.3.3. Configuring Subnets on External Provider Logical Networks Expand section "6.3.3. Configuring Subnets on External Provider Logical Networks" Collapse section "6.3.3. Configuring Subnets on External Provider Logical Networks" 6.3.3.1. Configuring Subnets on External Provider Logical Networks 6.3.3.2. Adding Subnets to External Provider Logical Networks 6.3.3.3. Removing Subnets from External Provider Logical Networks 6.4. Logical Networks and Permissions Expand section "6.4. Logical Networks and Permissions" Collapse section "6.4. Logical Networks and Permissions" 6.4.1. Managing System Permissions for a Network 6.4.2. Network Administrator and User Roles Explained 6.4.3. Assigning an Administrator or User Role to a Resource 6.4.4. Removing an Administrator or User Role from a Resource 6.5. Hosts and Networking Expand section "6.5. Hosts and Networking" Collapse section "6.5. Hosts and Networking" 6.5.1. Refreshing Host Capabilities 6.5.2. Editing Host Network Interfaces and Assigning Logical Networks to Hosts 6.5.3. Adding Multiple VLANs to a Single Network Interface Using Logical Networks 6.5.4. Assigning Additional IPv4 Addresses to a Host Network 6.5.5. Adding Network Labels to Host Network Interfaces 6.5.6. Bonds Expand section "6.5.6. Bonds" Collapse section "6.5.6. Bonds" 6.5.6.1. Bonding Logic in Red Hat Virtualization 6.5.6.2. Bonds 6.5.6.3. Creating a Bond Device Using the Administration Portal 6.5.6.4. Example Uses of Custom Bonding Options with Host Interfaces 6.5.7. Changing the FQDN of a Host 7. Hosts Expand section "7. Hosts" Collapse section "7. Hosts" 7.1. Introduction to Hosts 7.2. Red Hat Virtualization Host 7.3. Red Hat Enterprise Linux Hosts 7.4. Satellite Host Provider Hosts 7.5. Host Tasks Expand section "7.5. Host Tasks" Collapse section "7.5. Host Tasks" 7.5.1. Adding a Host to the Red Hat Virtualization Manager 7.5.2. Adding a Satellite Host Provider Host 7.5.3. Configuring Satellite Errata Management for a Host 7.5.4. Adding a Red Hat OpenStack Platform Network Node as a Host 7.5.5. Explanation of Settings and Controls in the New Host and Edit Host Windows Expand section "7.5.5. Explanation of Settings and Controls in the New Host and Edit Host Windows" Collapse section "7.5.5. Explanation of Settings and Controls in the New Host and Edit Host Windows" 7.5.5.1. Host General Settings Explained 7.5.5.2. Host Power Management Settings Explained 7.5.5.3. SPM Priority Settings Explained 7.5.5.4. Host Console Settings Explained 7.5.5.5. Network Provider Settings Explained 7.5.5.6. Kernel Settings Explained 7.5.5.7. Hosted Engine Settings Explained 7.5.6. Configuring Host Power Management Settings 7.5.7. Configuring Host Storage Pool Manager Settings 7.5.8. Moving a Host to Maintenance Mode 7.5.9. Activating a Host from Maintenance Mode 7.5.10. Removing a Host 7.5.11. Updating a Host Between Minor Releases 7.5.12. Reinstalling Hosts 7.5.13. Customizing Hosts with Tags 7.5.14. Viewing Host Errata 7.5.15. Viewing the Health Status of a Host 7.5.16. Viewing Host Devices 7.5.17. Preparing Host and Guest Systems for GPU Passthrough 7.5.18. Accessing Cockpit from the Administration Portal 7.6. Host Resilience Expand section "7.6. Host Resilience" Collapse section "7.6. Host Resilience" 7.6.1. Host High Availability 7.6.2. Power Management by Proxy in Red Hat Virtualization 7.6.3. Setting Fencing Parameters on a Host 7.6.4. fence_kdump Advanced Configuration Expand section "7.6.4. fence_kdump Advanced Configuration" Collapse section "7.6.4. fence_kdump Advanced Configuration" 7.6.4.1. fence_kdump listener Configuration 7.6.4.2. Configuring fence_kdump on the Manager 7.6.5. Soft-Fencing Hosts 7.6.6. Using Host Power Management Functions 7.6.7. Manually Fencing or Isolating a Non-responsive Host 7.7. Hosts and Permissions Expand section "7.7. Hosts and Permissions" Collapse section "7.7. Hosts and Permissions" 7.7.1. Managing System Permissions for a Host 7.7.2. Host Administrator Roles Explained 7.7.3. Assigning an Administrator or User Role to a Resource 7.7.4. Removing an Administrator or User Role from a Resource 8. Storage Expand section "8. Storage" Collapse section "8. Storage" 8.1. Understanding Storage Domains 8.2. Preparing and Adding NFS Storage Expand section "8.2. Preparing and Adding NFS Storage" Collapse section "8.2. Preparing and Adding NFS Storage" 8.2.1. Preparing NFS Storage 8.2.2. Attaching NFS Storage 8.2.3. Increasing NFS Storage 8.3. Preparing and Adding Local Storage Expand section "8.3. Preparing and Adding Local Storage" Collapse section "8.3. Preparing and Adding Local Storage" 8.3.1. Preparing Local Storage 8.3.2. Adding Local Storage 8.4. Adding POSIX Compliant File System Storage Expand section "8.4. Adding POSIX Compliant File System Storage" Collapse section "8.4. Adding POSIX Compliant File System Storage" 8.4.1. Attaching POSIX Compliant File System Storage 8.5. Adding Block Storage Expand section "8.5. Adding Block Storage" Collapse section "8.5. Adding Block Storage" 8.5.1. Adding iSCSI Storage 8.5.2. Configuring iSCSI Multipathing 8.5.3. Adding FCP Storage 8.5.4. Increasing iSCSI or FCP Storage 8.5.5. Reusing LUNs 8.6. Importing Existing Storage Domains Expand section "8.6. Importing Existing Storage Domains" Collapse section "8.6. Importing Existing Storage Domains" 8.6.1. Overview of Importing Existing Storage Domains 8.6.2. Importing Storage Domains 8.6.3. Migrating Storage Domains between Data Centers in the Same Environment 8.6.4. Migrating Storage Domains between Data Centers in Different Environments 8.6.5. Importing Virtual Machines from Imported Data Storage Domains 8.6.6. Importing Templates from Imported Data Storage Domains 8.6.7. Importing a Disk Image from an Imported Storage Domain 8.6.8. Importing an Unregistered Disk Image from an Imported Storage Domain 8.7. Storage Tasks Expand section "8.7. Storage Tasks" Collapse section "8.7. Storage Tasks" 8.7.1. Populating the ISO Storage Domain 8.7.2. Moving Storage Domains to Maintenance Mode 8.7.3. Editing Storage Domains 8.7.4. Updating OVFs 8.7.5. Activating Storage Domains from Maintenance Mode 8.7.6. Removing a Storage Domain 8.7.7. Destroying a Storage Domain 8.7.8. Detaching a Storage Domain from a Data Center 8.7.9. Attaching a Storage Domain to a Data Center 8.7.10. Disk Profiles Expand section "8.7.10. Disk Profiles" Collapse section "8.7.10. Disk Profiles" 8.7.10.1. Creating a Disk Profile 8.7.10.2. Removing a Disk Profile 8.7.11. Viewing the Health Status of a Storage Domain 8.7.12. Setting Discard After Delete for a Storage Domain 8.8. Storage and Permissions Expand section "8.8. Storage and Permissions" Collapse section "8.8. Storage and Permissions" 8.8.1. Managing System Permissions for a Storage Domain 8.8.2. Storage Administrator Roles Explained 8.8.3. Assigning an Administrator or User Role to a Resource 8.8.4. Removing an Administrator or User Role from a Resource 9. Working with Red Hat Gluster Storage Expand section "9. Working with Red Hat Gluster Storage" Collapse section "9. Working with Red Hat Gluster Storage" 9.1. Red Hat Gluster Storage Nodes Expand section "9.1. Red Hat Gluster Storage Nodes" Collapse section "9.1. Red Hat Gluster Storage Nodes" 9.1.1. Adding Red Hat Gluster Storage Nodes 9.1.2. Removing a Red Hat Gluster Storage Node 9.2. Using Red Hat Gluster Storage as a Storage Domain Expand section "9.2. Using Red Hat Gluster Storage as a Storage Domain" Collapse section "9.2. Using Red Hat Gluster Storage as a Storage Domain" 9.2.1. Introduction to Red Hat Gluster Storage (GlusterFS) Volumes 9.2.2. Gluster Storage Terminology 9.2.3. Attaching a Red Hat Gluster Storage Volume as a Storage Domain 9.2.4. Creating a Storage Volume 9.2.5. Adding Bricks to a Volume 9.2.6. Explanation of Settings in the Add Bricks Window 9.2.7. Optimizing Red Hat Gluster Storage Volumes to Store Virtual Machine Images 9.2.8. Starting Volumes 9.2.9. Tuning Volumes 9.2.10. Editing Volume Options 9.2.11. Reset Volume Options 9.2.12. Removing Bricks from a Volume 9.2.13. Stopping Red Hat Gluster Storage Volumes 9.2.14. Deleting Red Hat Gluster Storage Volumes 9.2.15. Rebalancing Volumes 9.3. Clusters and Gluster Hooks Expand section "9.3. Clusters and Gluster Hooks" Collapse section "9.3. Clusters and Gluster Hooks" 9.3.1. Managing Gluster Hooks 9.3.2. Listing Hooks 9.3.3. Viewing the Content of Hooks 9.3.4. Enabling or Disabling Hooks 9.3.5. Refreshing Hooks 9.3.6. Resolving Conflicts 9.3.7. Resolving Content Conflicts 9.3.8. Resolving Missing Hook Conflicts 9.3.9. Resolving Status Conflicts 9.3.10. Resolving Multiple Conflicts 9.3.11. Managing Gluster Sync 10. Pools Expand section "10. Pools" Collapse section "10. Pools" 10.1. Introduction to Virtual Machine Pools 10.2. Virtual Machine Pool Tasks Expand section "10.2. Virtual Machine Pool Tasks" Collapse section "10.2. Virtual Machine Pool Tasks" 10.2.1. Creating a Virtual Machine Pool 10.2.2. Explanation of Settings and Controls in the New Pool and Edit Pool Windows Expand section "10.2.2. Explanation of Settings and Controls in the New Pool and Edit Pool Windows" Collapse section "10.2.2. Explanation of Settings and Controls in the New Pool and Edit Pool Windows" 10.2.2.1. New Pool and Edit Pool General Settings Explained 10.2.2.2. New and Edit Pool Type Settings Explained 10.2.2.3. New Pool and Edit Pool Console Settings Explained 10.2.2.4. Virtual Machine Pool Host Settings Explained 10.2.2.5. New Pool and Edit Pool Resource Allocation Settings Explained 10.2.3. Editing a Virtual Machine Pool Expand section "10.2.3. Editing a Virtual Machine Pool" Collapse section "10.2.3. Editing a Virtual Machine Pool" 10.2.3.1. Editing a Virtual Machine Pool 10.2.3.2. Prestarting Virtual Machines in a Pool 10.2.3.3. Adding Virtual Machines to a Virtual Machine Pool 10.2.3.4. Detaching Virtual Machines from a Virtual Machine Pool 10.2.4. Removing a Virtual Machine Pool 10.3. Pools and Permissions Expand section "10.3. Pools and Permissions" Collapse section "10.3. Pools and Permissions" 10.3.1. Managing System Permissions for a Virtual Machine Pool 10.3.2. Virtual Machine Pool Administrator Roles Explained 10.3.3. Assigning an Administrator or User Role to a Resource 10.3.4. Removing an Administrator or User Role from a Resource 10.4. Trusted Compute Pools Expand section "10.4. Trusted Compute Pools" Collapse section "10.4. Trusted Compute Pools" 10.4.1. Connecting an OpenAttestation Server to the Manager 10.4.2. Creating a Trusted Cluster 10.4.3. Adding a Trusted Host 11. Virtual Disks Expand section "11. Virtual Disks" Collapse section "11. Virtual Disks" 11.1. Understanding Virtual Machine Storage 11.2. Understanding Virtual Disks 11.3. Settings to Wipe Virtual Disks After Deletion 11.4. Shareable Disks in Red Hat Virtualization 11.5. Read Only Disks in Red Hat Virtualization 11.6. Virtual Disk Tasks Expand section "11.6. Virtual Disk Tasks" Collapse section "11.6. Virtual Disk Tasks" 11.6.1. Creating a Virtual Disk 11.6.2. Explanation of Settings in the New Virtual Disk Window 11.6.3. Overview of Live Storage Migration 11.6.4. Moving a Virtual Disk 11.6.5. Changing the Disk Interface Type 11.6.6. Copying a Virtual Disk 11.6.7. Uploading and Downloading a Virtual Disk to a Storage Domain 11.6.8. Importing a Disk Image from an Imported Storage Domain 11.6.9. Importing an Unregistered Disk Image from an Imported Storage Domain 11.6.10. Importing a Virtual Disk from an OpenStack Image Service 11.6.11. Exporting a Virtual Disk to an OpenStack Image Service 11.6.12. Reclaiming Virtual Disk Space 11.7. Virtual Disks and Permissions Expand section "11.7. Virtual Disks and Permissions" Collapse section "11.7. Virtual Disks and Permissions" 11.7.1. Managing System Permissions for a Virtual Disk 11.7.2. Virtual Disk User Roles Explained 11.7.3. Assigning an Administrator or User Role to a Resource 11.7.4. Removing an Administrator or User Role from a Resource 12. External Providers Expand section "12. External Providers" Collapse section "12. External Providers" 12.1. Introduction to External Providers in Red Hat Virtualization 12.2. Adding External Providers Expand section "12.2. Adding External Providers" Collapse section "12.2. Adding External Providers" 12.2.1. Adding a Red Hat Satellite Instance for Host Provisioning 12.2.2. Adding an OpenStack Image (Glance) Instance for Image Management 12.2.3. Adding an OpenStack Networking (Neutron) Instance for Network Provisioning 12.2.4. Adding an OpenStack Volume (Cinder) Instance for Storage Management 12.2.5. Adding a VMware Instance as a Virtual Machine Provider 12.2.6. Adding a Xen Host as a Virtual Machine Provider 12.2.7. Adding a KVM Host as a Virtual Machine Provider 12.2.8. Adding an External Network Provider 12.2.9. Adding Open Virtual Network (OVN) as an External Network Provider 12.2.10. Add Provider General Settings Explained 12.2.11. Add Provider Agent Configuration Settings Explained 12.3. Editing External Providers Expand section "12.3. Editing External Providers" Collapse section "12.3. Editing External Providers" 12.3.1. Editing an External Provider 12.4. Removing External Providers Expand section "12.4. Removing External Providers" Collapse section "12.4. Removing External Providers" 12.4.1. Removing an External Provider III. Administering the Environment Expand section "III. Administering the Environment" Collapse section "III. Administering the Environment" 13. Backups and Migration Expand section "13. Backups and Migration" Collapse section "13. Backups and Migration" 13.1. Backing Up and Restoring the Red Hat Virtualization Manager Expand section "13.1. Backing Up and Restoring the Red Hat Virtualization Manager" Collapse section "13.1. Backing Up and Restoring the Red Hat Virtualization Manager" 13.1.1. Backing up Red Hat Virtualization Manager - Overview 13.1.2. Syntax for the engine-backup Command 13.1.3. Creating a Backup with the engine-backup Command 13.1.4. Restoring a Backup with the engine-backup Command 13.1.5. Restoring a Backup to a Fresh Installation 13.1.6. Restoring a Backup to Overwrite an Existing Installation 13.1.7. Restoring a Backup with Different Credentials 13.1.8. Migrating the Engine Database to a Remote Server Database 13.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API Expand section "13.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" Collapse section "13.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" 13.2.1. The Backup and Restore API 13.2.2. Backing Up a Virtual Machine 13.2.3. Restoring a Virtual Machine 14. Errata Management with Red Hat Satellite 15. Automating Configuration Tasks using Ansible Expand section "15. Automating Configuration Tasks using Ansible" Collapse section "15. Automating Configuration Tasks using Ansible" 15.1. Ansible Roles Expand section "15.1. Ansible Roles" Collapse section "15.1. Ansible Roles" 15.1.1. Installing Ansible Roles 15.1.2. Using Ansible Roles to Configure Red Hat Virtualization 16. Users and Roles Expand section "16. Users and Roles" Collapse section "16. Users and Roles" 16.1. Introduction to Users 16.2. Introduction to Directory Servers 16.3. Configuring an External LDAP Provider Expand section "16.3. Configuring an External LDAP Provider" Collapse section "16.3. Configuring an External LDAP Provider" 16.3.1. Configuring an External LDAP Provider (Interactive Setup) 16.3.2. Attaching an Active Directory 16.3.3. Configuring an External LDAP Provider (Manual Method) 16.3.4. Removing an External LDAP Provider 16.4. Configuring LDAP and Kerberos for Single Sign-on 16.5. User Authorization Expand section "16.5. User Authorization" Collapse section "16.5. User Authorization" 16.5.1. User Authorization Model 16.5.2. User Actions 16.6. Administering User Tasks From the Administration Portal Expand section "16.6. Administering User Tasks From the Administration Portal" Collapse section "16.6. Administering User Tasks From the Administration Portal" 16.6.1. Adding Users and Assigning User Portal Permissions 16.6.2. Viewing User Information 16.6.3. Viewing User Permissions on Resources 16.6.4. Removing Users 16.6.5. Viewing Logged-In Users 16.6.6. Terminating a User Session 16.7. Administering User Tasks From the Command Line Expand section "16.7. Administering User Tasks From the Command Line" Collapse section "16.7. Administering User Tasks From the Command Line" 16.7.1. Creating a New User 16.7.2. Setting a User Password 16.7.3. Setting User Timeout 16.7.4. Pre-encrypting a User Password 16.7.5. Viewing User Information 16.7.6. Editing User Information 16.7.7. Removing a User 16.7.8. Disabling the Internal Administrative User 16.7.9. Managing Groups 16.7.10. Querying Users and Groups 16.7.11. Managing Account Settings 16.8. Configuring Additional Local Domains 17. Quotas and Service Level Agreement Policy Expand section "17. Quotas and Service Level Agreement Policy" Collapse section "17. Quotas and Service Level Agreement Policy" 17.1. Introduction to Quota 17.2. Shared Quota and Individually Defined Quota 17.3. Quota Accounting 17.4. Enabling and Changing a Quota Mode in a Data Center 17.5. Creating a New Quota Policy 17.6. Explanation of Quota Threshold Settings 17.7. Assigning a Quota to an Object 17.8. Using Quota to Limit Resources by User 17.9. Editing Quotas 17.10. Removing Quotas 17.11. Service Level Agreement Policy Enforcement 18. Event Notifications Expand section "18. Event Notifications" Collapse section "18. Event Notifications" 18.1. Configuring Event Notifications in the Administration Portal 18.2. Canceling Event Notifications in the Administration Portal 18.3. Parameters for Event Notifications in ovirt-engine-notifier.conf 18.4. Configuring the Red Hat Virtualization Manager to Send SNMP Traps 19. Utilities Expand section "19. Utilities" Collapse section "19. Utilities" 19.1. The oVirt Engine Rename Tool Expand section "19.1. The oVirt Engine Rename Tool" Collapse section "19.1. The oVirt Engine Rename Tool" 19.1.1. The oVirt Engine Rename Tool 19.1.2. Syntax for the oVirt Engine Rename Command 19.1.3. Renaming the Manager with the oVirt Engine Rename Tool 19.2. The Engine Configuration Tool Expand section "19.2. The Engine Configuration Tool" Collapse section "19.2. The Engine Configuration Tool" 19.2.1. The Engine Configuration Tool 19.2.2. Syntax for the engine-config Command 19.3. The Image Uploader Tool Expand section "19.3. The Image Uploader Tool" Collapse section "19.3. The Image Uploader Tool" 19.3.1. The Image Uploader Tool 19.4. The USB Filter Editor Expand section "19.4. The USB Filter Editor" Collapse section "19.4. The USB Filter Editor" 19.4.1. Installing the USB Filter Editor 19.4.2. The USB Filter Editor Interface 19.4.3. Adding a USB Policy 19.4.4. Removing a USB Policy 19.4.5. Searching for USB Device Policies 19.4.6. Exporting a USB Policy 19.4.7. Importing a USB Policy 19.5. The Log Collector Tool Expand section "19.5. The Log Collector Tool" Collapse section "19.5. The Log Collector Tool" 19.5.1. Log Collector 19.5.2. Syntax for the ovirt-log-collector Command 19.5.3. Basic Log Collector Usage 19.6. The ISO Uploader Tool Expand section "19.6. The ISO Uploader Tool" Collapse section "19.6. The ISO Uploader Tool" 19.6.1. The ISO Uploader Tool 19.6.2. Syntax for the engine-iso-uploader Command 19.6.3. Specifying an NFS Server 19.6.4. Basic ISO Uploader Usage 19.6.5. Uploading the VirtIO and Guest Tool Image Files to an ISO Storage Domain 19.6.6. VirtIO and Guest Tool Image Files 19.7. The Engine Vacuum Tool Expand section "19.7. The Engine Vacuum Tool" Collapse section "19.7. The Engine Vacuum Tool" 19.7.1. The Engine Vacuum Tool 19.7.2. Engine Vacuum Modes 19.7.3. Syntax for the Engine Vacuum IV. Gathering Information About the Environment Expand section "IV. Gathering Information About the Environment" Collapse section "IV. Gathering Information About the Environment" 20. Log Files Expand section "20. Log Files" Collapse section "20. Log Files" 20.1. Red Hat Virtualization Manager Installation Log Files 20.2. Red Hat Virtualization Manager Log Files 20.3. SPICE Log Files Expand section "20.3. SPICE Log Files" Collapse section "20.3. SPICE Log Files" 20.3.1. SPICE Logs for Hypervisor SPICE Servers 20.3.2. SPICE Logs for Guest Machines 20.3.3. SPICE Logs for SPICE Clients Launched Using console.vv Files 20.4. Red Hat Virtualization Host Log Files 20.5. Setting Up a Virtualization Host Logging Server 21. Proxies Expand section "21. Proxies" Collapse section "21. Proxies" 21.1. SPICE Proxy Expand section "21.1. SPICE Proxy" Collapse section "21.1. SPICE Proxy" 21.1.1. SPICE Proxy Overview 21.1.2. SPICE Proxy Machine Setup 21.1.3. Turning on SPICE Proxy 21.1.4. Turning Off a SPICE Proxy 21.2. Squid Proxy Expand section "21.2. Squid Proxy" Collapse section "21.2. Squid Proxy" 21.2.1. Installing and Configuring a Squid Proxy 21.3. Websocket Proxy Expand section "21.3. Websocket Proxy" Collapse section "21.3. Websocket Proxy" 21.3.1. Websocket Proxy Overview 21.3.2. Migrating the Websocket Proxy to a Separate Machine A. VDSM and Hooks Expand section "A. VDSM and Hooks" Collapse section "A. VDSM and Hooks" A.1. VDSM A.2. VDSM Hooks A.3. Extending VDSM with Hooks A.4. Supported VDSM Events A.5. The VDSM Hook Environment A.6. The VDSM Hook Domain XML Object A.7. Defining Custom Properties A.8. Setting Virtual Machine Custom Properties A.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook A.10. Using the VDSM Hooking Module A.11. VDSM Hook Execution A.12. VDSM Hook Return Codes A.13. VDSM Hook Examples B. Custom Network Properties Expand section "B. Custom Network Properties" Collapse section "B. Custom Network Properties" B.1. Explanation of bridge_opts Parameters B.2. How to Set Up Red Hat Virtualization Manager to Use Ethtool B.3. How to Set Up Red Hat Virtualization Manager to Use FCoE B.4. How to Set Up Red Hat Virtualization Manager to Use a Non-Management Network C. Red Hat Virtualization User Interface Plugins Expand section "C. Red Hat Virtualization User Interface Plugins" Collapse section "C. Red Hat Virtualization User Interface Plugins" C.1. Red Hat Virtualization User Interface Plug-ins C.2. Red Hat Virtualization User Interface Plugin Lifecycle Expand section "C.2. Red Hat Virtualization User Interface Plugin Lifecycle" Collapse section "C.2. Red Hat Virtualization User Interface Plugin Lifecycle" C.2.1. Red Hat Virtualization User Interface Plug-in Life cycle C.2.2. Red Hat Virtualization User Interface Plug-in Discovery C.2.3. Red Hat Virtualization User Interface Plug-in Loading C.2.4. Red Hat Virtualization User Interface Plug-in Bootstrapping C.3. User Interface Plugin-related Files and Their Locations C.4. Example User Interface Plug-in Deployment C.5. Using Red Hat Support Plug-in D. Red Hat Virtualization and SSL Expand section "D. Red Hat Virtualization and SSL" Collapse section "D. Red Hat Virtualization and SSL" D.1. Replacing the Red Hat Virtualization Manager SSL/TLS Certificate D.2. Setting Up SSL or TLS Connections between the Manager and an LDAP Server E. Using Search, Bookmarks, and Tags Expand section "E. Using Search, Bookmarks, and Tags" Collapse section "E. Using Search, Bookmarks, and Tags" E.1. Searches Expand section "E.1. Searches" Collapse section "E.1. Searches" E.1.1. Performing Searches in Red Hat Virtualization E.1.2. Search Syntax and Examples E.1.3. Search Auto-Completion E.1.4. Search Result Type Options E.1.5. Search Criteria E.1.6. Search: Multiple Criteria and Wildcards E.1.7. Search: Determining Search Order E.1.8. Searching for Data Centers E.1.9. Searching for Clusters E.1.10. Searching for Hosts E.1.11. Searching for Networks E.1.12. Searching for Storage E.1.13. Searching for Disks E.1.14. Searching for Volumes E.1.15. Searching for Virtual Machines E.1.16. Searching for Pools E.1.17. Searching for Templates E.1.18. Searching for Users E.1.19. Searching for Events E.2. Bookmarks Expand section "E.2. Bookmarks" Collapse section "E.2. Bookmarks" E.2.1. Saving a Query String as a Bookmark E.2.2. Editing a Bookmark E.2.3. Deleting a Bookmark E.3. Tags Expand section "E.3. Tags" Collapse section "E.3. Tags" E.3.1. Using Tags to Customize Interactions with Red Hat Virtualization E.3.2. Creating a Tag E.3.3. Modifying a Tag E.3.4. Deleting a Tag E.3.5. Adding and Removing Tags to and from Objects E.3.6. Searching for Objects Using Tags F. Branding Expand section "F. Branding" Collapse section "F. Branding" F.1. Branding Expand section "F.1. Branding" Collapse section "F.1. Branding" F.1.1. Re-Branding the Manager F.1.2. Login Screen F.1.3. Administration Portal Screen F.1.4. User Portal Screen F.1.5. Pop-Up Windows F.1.6. Tabs F.1.7. The Welcome Page F.1.8. The Page Not Found Page G. System Accounts Expand section "G. System Accounts" Collapse section "G. System Accounts" G.1. System Accounts Expand section "G.1. System Accounts" Collapse section "G.1. System Accounts" G.1.1. Red Hat Virtualization Manager User Accounts G.1.2. Red Hat Virtualization Manager Groups G.1.3. Virtualization Host User Accounts G.1.4. Virtualization Host Groups Legal Notice Settings Close Language: 简体中文 한국어 日本語 English Language: 简体中文 한국어 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 简体中文 한국어 日本語 English Language: 简体中文 한국어 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Virtualization Part II. Administering the Resources Previous Next