Jump To Close Expand all Collapse all Table of contents Administration Guide I. Administering and Maintaining the Red Hat Virtualization Environment Expand section "I. Administering and Maintaining the Red Hat Virtualization Environment" Collapse section "I. Administering and Maintaining the Red Hat Virtualization Environment" 1. Global Configuration Expand section "1. Global Configuration" Collapse section "1. Global Configuration" 1.1. Roles Expand section "1.1. Roles" Collapse section "1.1. Roles" 1.1.1. Creating a New Role 1.1.2. Editing or Copying a Role 1.1.3. User Role and Authorization Examples 1.2. System Permissions Expand section "1.2. System Permissions" Collapse section "1.2. System Permissions" 1.2.1. User Properties 1.2.2. User and Administrator Roles 1.2.3. User Roles Explained 1.2.4. Administrator Roles Explained 1.2.5. Assigning an Administrator or User Role to a Resource 1.2.6. Removing an Administrator or User Role from a Resource 1.2.7. Managing System Permissions for a Data Center 1.2.8. Data Center Administrator Roles Explained 1.2.9. Managing System Permissions for a Cluster 1.2.10. Cluster Administrator Roles Explained 1.2.11. Managing System Permissions for a Network 1.2.12. Network Administrator and User Roles Explained 1.2.13. Managing System Permissions for a Host 1.2.14. Host Administrator Roles Explained 1.2.15. Managing System Permissions for a Storage Domain 1.2.16. Storage Administrator Roles Explained 1.2.17. Managing System Permissions for a Virtual Machine Pool 1.2.18. Virtual Machine Pool Administrator Roles Explained 1.2.19. Managing System Permissions for a Virtual Disk 1.2.20. Virtual Disk User Roles Explained 1.2.21. Setting a Legacy SPICE Cipher 1.3. Scheduling Policies Expand section "1.3. Scheduling Policies" Collapse section "1.3. Scheduling Policies" 1.3.1. Creating a Scheduling Policy 1.3.2. Explanation of Settings in the New Scheduling Policy and Edit Scheduling Policy Window 1.4. Instance Types Expand section "1.4. Instance Types" Collapse section "1.4. Instance Types" 1.4.1. Creating Instance Types 1.4.2. Editing Instance Types 1.4.3. Removing Instance Types 1.5. MAC Address Pools Expand section "1.5. MAC Address Pools" Collapse section "1.5. MAC Address Pools" 1.5.1. Creating MAC Address Pools 1.5.2. Editing MAC Address Pools 1.5.3. Editing MAC Address Pool Permissions 1.5.4. Removing MAC Address Pools 2. Dashboard Expand section "2. Dashboard" Collapse section "2. Dashboard" 2.1. Prerequisites 2.2. Global Inventory 2.3. Global Utilization Expand section "2.3. Global Utilization" Collapse section "2.3. Global Utilization" 2.3.1. Top Utilized Resources 2.4. Cluster Utilization Expand section "2.4. Cluster Utilization" Collapse section "2.4. Cluster Utilization" 2.4.1. CPU 2.4.2. Memory 2.5. Storage Utilization II. Administering the Resources Expand section "II. Administering the Resources" Collapse section "II. Administering the Resources" 3. Quality of Service Expand section "3. Quality of Service" Collapse section "3. Quality of Service" 3.1. Storage Quality of Service Expand section "3.1. Storage Quality of Service" Collapse section "3.1. Storage Quality of Service" 3.1.1. Creating a Storage Quality of Service Entry 3.1.2. Removing a Storage Quality of Service Entry 3.2. Virtual Machine Network Quality of Service Expand section "3.2. Virtual Machine Network Quality of Service" Collapse section "3.2. Virtual Machine Network Quality of Service" 3.2.1. Creating a Virtual Machine Network Quality of Service Entry 3.2.2. Settings in the New Virtual Machine Network QoS and Edit Virtual Machine Network QoS Windows Explained 3.2.3. Removing a Virtual Machine Network Quality of Service Entry 3.3. Host Network Quality of Service Expand section "3.3. Host Network Quality of Service" Collapse section "3.3. Host Network Quality of Service" 3.3.1. Creating a Host Network Quality of Service Entry 3.3.2. Settings in the New Host Network Quality of Service and Edit Host Network Quality of Service Windows Explained 3.3.3. Removing a Host Network Quality of Service Entry 3.4. CPU Quality of Service Expand section "3.4. CPU Quality of Service" Collapse section "3.4. CPU Quality of Service" 3.4.1. Creating a CPU Quality of Service Entry 3.4.2. Removing a CPU Quality of Service Entry 4. Data Centers Expand section "4. Data Centers" Collapse section "4. Data Centers" 4.1. Introduction to Data Centers 4.2. The Storage Pool Manager 4.3. SPM Priority 4.4. Data Center Tasks Expand section "4.4. Data Center Tasks" Collapse section "4.4. Data Center Tasks" 4.4.1. Creating a New Data Center 4.4.2. Explanation of Settings in the New Data Center and Edit Data Center Windows 4.4.3. Re-Initializing a Data Center: Recovery Procedure 4.4.4. Removing a Data Center 4.4.5. Force Removing a Data Center 4.4.6. Changing the Data Center Storage Type 4.4.7. Changing the Data Center Compatibility Version 4.5. Data Centers and Storage Domains Expand section "4.5. Data Centers and Storage Domains" Collapse section "4.5. Data Centers and Storage Domains" 4.5.1. Attaching an Existing Data Domain to a Data Center 4.5.2. Attaching an Existing ISO domain to a Data Center 4.5.3. Attaching an Existing Export Domain to a Data Center 4.5.4. Detaching a Storage Domain from a Data Center 5. Clusters Expand section "5. Clusters" Collapse section "5. Clusters" 5.1. Introduction to Clusters 5.2. Cluster Tasks Expand section "5.2. Cluster Tasks" Collapse section "5.2. Cluster Tasks" 5.2.1. Creating a New Cluster 5.2.2. General Cluster Settings Explained 5.2.3. Optimization Settings Explained 5.2.4. Migration Policy Settings Explained 5.2.5. Scheduling Policy Settings Explained 5.2.6. Cluster Console Settings Explained 5.2.7. Fencing Policy Settings Explained 5.2.8. Setting Load and Power Management Policies for Hosts in a Cluster 5.2.9. Updating the MoM Policy on Hosts in a Cluster 5.2.10. Creating a CPU Profile 5.2.11. Removing a CPU Profile 5.2.12. Importing an Existing Red Hat Gluster Storage Cluster 5.2.13. Explanation of Settings in the Add Hosts Window 5.2.14. Removing a Cluster 5.2.15. Changing the Cluster Compatibility Version 6. Logical Networks Expand section "6. Logical Networks" Collapse section "6. Logical Networks" 6.1. Logical Network Tasks Expand section "6.1. Logical Network Tasks" Collapse section "6.1. Logical Network Tasks" 6.1.1. Performing Networking Tasks 6.1.2. Creating a New Logical Network in a Data Center or Cluster 6.1.3. Editing a Logical Network 6.1.4. Removing a Logical Network 6.1.5. Configuring a Non-Management Logical Network as the Default Route 6.1.6. Viewing or Editing the Gateway for a Logical Network 6.1.7. Logical Network General Settings Explained 6.1.8. Logical Network Cluster Settings Explained 6.1.9. Logical Network vNIC Profiles Settings Explained 6.1.10. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window 6.1.11. Explanation of Settings in the Manage Networks Window 6.1.12. Editing the Virtual Function Configuration on a NIC 6.2. Virtual Network Interface Cards Expand section "6.2. Virtual Network Interface Cards" Collapse section "6.2. Virtual Network Interface Cards" 6.2.1. vNIC Profile Overview 6.2.2. Creating or Editing a vNIC Profile 6.2.3. Explanation of Settings in the VM Interface Profile Window 6.2.4. Enabling Passthrough on a vNIC Profile 6.2.5. Removing a vNIC Profile 6.2.6. Assigning Security Groups to vNIC Profiles 6.2.7. User Permissions for vNIC Profiles 6.2.8. Configuring vNIC Profiles for UCS Integration 6.3. External Provider Networks Expand section "6.3. External Provider Networks" Collapse section "6.3. External Provider Networks" 6.3.1. Importing Networks From External Providers 6.3.2. Limitations to Using External Provider Networks 6.3.3. Configuring Subnets on External Provider Logical Networks 6.3.4. Adding Subnets to External Provider Logical Networks 6.3.5. Removing Subnets from External Provider Logical Networks 6.4. Hosts and Networking Expand section "6.4. Hosts and Networking" Collapse section "6.4. Hosts and Networking" 6.4.1. Refreshing Host Capabilities 6.4.2. Editing Host Network Interfaces and Assigning Logical Networks to Hosts 6.4.3. Synchronizing Host Networks 6.4.4. Editing a Host’s VLAN Settings 6.4.5. Adding Multiple VLANs to a Single Network Interface Using Logical Networks 6.4.6. Assigning Additional IPv4 Addresses to a Host Network 6.4.7. Adding Network Labels to Host Network Interfaces 6.4.8. Changing the FQDN of a Host 6.5. Bond Devices Expand section "6.5. Bond Devices" Collapse section "6.5. Bond Devices" 6.5.1. Bonding Methods 6.5.2. Creating a Bond Device Using the Administration Portal 6.5.3. Creating a Bond Device Automatically 6.5.4. Bonding Logic in Red Hat Virtualization 6.5.5. Bonding Modes 6.5.6. Example Uses of Custom Bonding Options with Host Interfaces 7. Hosts Expand section "7. Hosts" Collapse section "7. Hosts" 7.1. Introduction to Hosts 7.2. Red Hat Virtualization Host 7.3. Red Hat Enterprise Linux Hosts 7.4. Satellite Host Provider Hosts 7.5. Host Tasks Expand section "7.5. Host Tasks" Collapse section "7.5. Host Tasks" 7.5.1. Adding a Host to the Red Hat Virtualization Manager 7.5.2. Adding a Satellite Host Provider Host 7.5.3. Configuring Satellite Errata Management for a Host 7.5.4. Explanation of Settings and Controls in the New Host and Edit Host Windows 7.5.5. Host General Settings Explained 7.5.6. Host Power Management Settings Explained 7.5.7. SPM Priority Settings Explained 7.5.8. Host Console Settings Explained 7.5.9. Network Provider Settings Explained 7.5.10. Kernel Settings Explained 7.5.11. Hosted Engine Settings Explained 7.5.12. Configuring Host Power Management Settings 7.5.13. Configuring Host Storage Pool Manager Settings 7.5.14. Moving a Host to Maintenance Mode 7.5.15. Activating a Host from Maintenance Mode 7.5.16. Configuring Host Firewall Rules 7.5.17. Removing a Host 7.5.18. Updating a Host Between Minor Releases Expand section "7.5.18. Updating a Host Between Minor Releases" Collapse section "7.5.18. Updating a Host Between Minor Releases" 7.5.18.1. Updating the Hosts 7.5.18.2. Manually Updating Hosts 7.5.19. Reinstalling Hosts 7.5.20. Customizing Hosts with Tags 7.5.21. Viewing Host Errata 7.5.22. Viewing the Health Status of a Host 7.5.23. Viewing Host Devices 7.5.24. Preparing Host and Guest Systems for GPU Passthrough 7.5.25. Accessing Cockpit from the Administration Portal 7.5.26. Setting a Legacy SPICE Cipher 7.6. Host Resilience Expand section "7.6. Host Resilience" Collapse section "7.6. Host Resilience" 7.6.1. Host High Availability 7.6.2. Power Management by Proxy in Red Hat Virtualization 7.6.3. Setting Fencing Parameters on a Host 7.6.4. fence_kdump Advanced Configuration Expand section "7.6.4. fence_kdump Advanced Configuration" Collapse section "7.6.4. fence_kdump Advanced Configuration" 7.6.4.1. fence_kdump listener Configuration 7.6.4.2. Configuring fence_kdump on the Manager 7.6.5. Soft-Fencing Hosts 7.6.6. Using Host Power Management Functions 7.6.7. Manually Fencing or Isolating a Non Responsive Host 8. Storage Expand section "8. Storage" Collapse section "8. Storage" 8.1. Understanding Storage Domains 8.2. Preparing and Adding NFS Storage Expand section "8.2. Preparing and Adding NFS Storage" Collapse section "8.2. Preparing and Adding NFS Storage" 8.2.1. Preparing NFS Storage 8.2.2. Attaching NFS Storage 8.2.3. Increasing NFS Storage 8.3. Preparing and Adding Local Storage Expand section "8.3. Preparing and Adding Local Storage" Collapse section "8.3. Preparing and Adding Local Storage" 8.3.1. Preparing Local Storage 8.3.2. Adding Local Storage 8.4. Adding POSIX Compliant File System Storage Expand section "8.4. Adding POSIX Compliant File System Storage" Collapse section "8.4. Adding POSIX Compliant File System Storage" 8.4.1. Attaching POSIX Compliant File System Storage 8.5. Adding Block Storage Expand section "8.5. Adding Block Storage" Collapse section "8.5. Adding Block Storage" 8.5.1. Adding iSCSI Storage 8.5.2. Configuring iSCSI Multipathing 8.5.3. Migrating a Logical Network to an iSCSI Bond 8.5.4. Adding FCP Storage 8.5.5. Increasing iSCSI or FCP Storage 8.5.6. Reusing LUNs 8.6. Adding Red Hat Gluster Storage 8.7. Importing Existing Storage Domains Expand section "8.7. Importing Existing Storage Domains" Collapse section "8.7. Importing Existing Storage Domains" 8.7.1. Overview of Importing Existing Storage Domains 8.7.2. Importing Storage Domains 8.7.3. Migrating Storage Domains between Data Centers in the Same Environment 8.7.4. Migrating Storage Domains between Data Centers in Different Environments 8.7.5. Importing Virtual Machines from Imported Data Storage Domains 8.7.6. Importing Templates from Imported Data Storage Domains 8.8. Storage Tasks Expand section "8.8. Storage Tasks" Collapse section "8.8. Storage Tasks" 8.8.1. Uploading Images to a Data Storage Domain 8.8.2. Moving Storage Domains to Maintenance Mode 8.8.3. Editing Storage Domains 8.8.4. Updating OVFs 8.8.5. Activating Storage Domains from Maintenance Mode 8.8.6. Detaching a Storage Domain from a Data Center 8.8.7. Attaching a Storage Domain to a Data Center 8.8.8. Removing a Storage Domain 8.8.9. Destroying a Storage Domain 8.8.10. Creating a Disk Profile 8.8.11. Removing a Disk Profile 8.8.12. Viewing the Health Status of a Storage Domain 8.8.13. Setting Discard After Delete for a Storage Domain 9. Pools Expand section "9. Pools" Collapse section "9. Pools" 9.1. Introduction to Virtual Machine Pools 9.2. Creating a Virtual Machine Pool 9.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows Expand section "9.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows" Collapse section "9.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows" 9.3.1. New Pool and Edit Pool General Settings Explained 9.3.2. New Pool and Edit Pool Type Settings Explained 9.3.3. New Pool and Edit Pool Console Settings Explained 9.3.4. Virtual Machine Pool Host Settings Explained 9.3.5. New Pool and Edit Pool Resource Allocation Settings Explained 9.4. Editing a Virtual Machine Pool 9.5. Prestarting Virtual Machines in a Pool 9.6. Adding Virtual Machines to a Virtual Machine Pool 9.7. Detaching Virtual Machines from a Virtual Machine Pool 9.8. Removing a Virtual Machine Pool 9.9. Trusted Compute Pools Expand section "9.9. Trusted Compute Pools" Collapse section "9.9. Trusted Compute Pools" 9.9.1. Connecting an OpenAttestation Server to the Manager 9.9.2. Creating a Trusted Cluster 9.9.3. Adding a Trusted Host 10. Virtual Disks Expand section "10. Virtual Disks" Collapse section "10. Virtual Disks" 10.1. Understanding Virtual Machine Storage 10.2. Understanding Virtual Disks 10.3. Settings to Wipe Virtual Disks After Deletion 10.4. Shareable Disks in Red Hat Virtualization 10.5. Read Only Disks in Red Hat Virtualization 10.6. Virtual Disk Tasks Expand section "10.6. Virtual Disk Tasks" Collapse section "10.6. Virtual Disk Tasks" 10.6.1. Creating a Virtual Disk 10.6.2. Explanation of Settings in the New Virtual Disk Window 10.6.3. Overview of Live Storage Migration 10.6.4. Moving a Virtual Disk 10.6.5. Changing the Disk Interface Type 10.6.6. Copying a Virtual Disk 10.6.7. Uploading Images to a Data Storage Domain 10.6.8. Importing a Disk Image from an Imported Storage Domain 10.6.9. Importing an Unregistered Disk Image from an Imported Storage Domain 10.6.10. Importing a Virtual Disk from an OpenStack Image Service 10.6.11. Exporting a Virtual Disk to an OpenStack Image Service 10.6.12. Reclaiming Virtual Disk Space 11. External Providers Expand section "11. External Providers" Collapse section "11. External Providers" 11.1. Introduction to External Providers in Red Hat Virtualization 11.2. Adding External Providers Expand section "11.2. Adding External Providers" Collapse section "11.2. Adding External Providers" 11.2.1. Adding a Red Hat Satellite Instance for Host Provisioning 11.2.2. Adding an OpenStack Image (Glance) Instance for Image Management 11.2.3. Adding an OpenStack Networking (Neutron) Instance for Network Provisioning 11.2.4. Adding an OpenStack Block Storage (Cinder) Instance for Storage Management 11.2.5. Adding a VMware Instance as a Virtual Machine Provider 11.2.6. Adding a RHEL 5 Xen Host as a Virtual Machine Provider 11.2.7. Adding a KVM Host as a Virtual Machine Provider 11.2.8. Adding Open Virtual Network (OVN) as an External Network Provider Expand section "11.2.8. Adding Open Virtual Network (OVN) as an External Network Provider" Collapse section "11.2.8. Adding Open Virtual Network (OVN) as an External Network Provider" 11.2.8.1. Installing a New OVN Network Provider 11.2.8.2. Adding an Existing OVN Network Provider 11.2.8.3. Configuring Hosts for an OVN Tunnel Network 11.2.8.4. Connecting an OVN Network to a Physical Network 11.2.9. Adding an External Network Provider 11.2.10. Add Provider General Settings Explained 11.2.11. Add Provider Agent Configuration Settings Explained 11.3. Editing an External Provider 11.4. Removing an External Provider III. Administering the Environment Expand section "III. Administering the Environment" Collapse section "III. Administering the Environment" 12. Backups and Migration Expand section "12. Backups and Migration" Collapse section "12. Backups and Migration" 12.1. Backing Up and Restoring the Red Hat Virtualization Manager Expand section "12.1. Backing Up and Restoring the Red Hat Virtualization Manager" Collapse section "12.1. Backing Up and Restoring the Red Hat Virtualization Manager" 12.1.1. Backing up Red Hat Virtualization Manager - Overview 12.1.2. Syntax for the engine-backup Command 12.1.3. Creating a Backup with the engine-backup Command 12.1.4. Restoring a Backup with the engine-backup Command 12.1.5. Restoring a Backup to a Fresh Installation 12.1.6. Restoring a Backup to Overwrite an Existing Installation 12.1.7. Restoring a Backup with Different Credentials 12.1.8. Migrating the Engine Database to a Remote Server Database 12.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API Expand section "12.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" Collapse section "12.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" 12.2.1. The Backup and Restore API 12.2.2. Backing Up a Virtual Machine 12.2.3. Restoring a Virtual Machine 13. Errata Management with Red Hat Satellite 14. Automating Configuration Tasks using Ansible Expand section "14. Automating Configuration Tasks using Ansible" Collapse section "14. Automating Configuration Tasks using Ansible" 14.1. Ansible Roles Expand section "14.1. Ansible Roles" Collapse section "14.1. Ansible Roles" 14.1.1. Installing Ansible Roles 14.1.2. Using Ansible Roles to Configure Red Hat Virtualization 15. Users and Roles Expand section "15. Users and Roles" Collapse section "15. Users and Roles" 15.1. Introduction to Users 15.2. Introduction to Directory Servers 15.3. Configuring an External LDAP Provider Expand section "15.3. Configuring an External LDAP Provider" Collapse section "15.3. Configuring an External LDAP Provider" 15.3.1. Configuring an External LDAP Provider (Interactive Setup) 15.3.2. Attaching an Active Directory 15.3.3. Configuring an External LDAP Provider (Manual Method) 15.3.4. Removing an External LDAP Provider 15.4. Configuring LDAP and Kerberos for Single Sign-on 15.5. User Authorization Expand section "15.5. User Authorization" Collapse section "15.5. User Authorization" 15.5.1. User Authorization Model 15.5.2. User Actions 15.6. Administering User Tasks From the Administration Portal Expand section "15.6. Administering User Tasks From the Administration Portal" Collapse section "15.6. Administering User Tasks From the Administration Portal" 15.6.1. Adding Users and Assigning VM Portal Permissions 15.6.2. Viewing User Information 15.6.3. Viewing User Permissions on Resources 15.6.4. Removing Users 15.6.5. Viewing Logged-In Users 15.6.6. Terminating a User Session 15.7. Administering User Tasks From the Command Line Expand section "15.7. Administering User Tasks From the Command Line" Collapse section "15.7. Administering User Tasks From the Command Line" 15.7.1. Creating a New User 15.7.2. Setting a User Password 15.7.3. Setting User Timeout 15.7.4. Pre-encrypting a User Password 15.7.5. Viewing User Information 15.7.6. Editing User Information 15.7.7. Removing a User 15.7.8. Disabling the Internal Administrative User 15.7.9. Managing Groups 15.7.10. Querying Users and Groups 15.7.11. Managing Account Settings 15.8. Configuring Additional Local Domains 16. Quotas and Service Level Agreement Policy Expand section "16. Quotas and Service Level Agreement Policy" Collapse section "16. Quotas and Service Level Agreement Policy" 16.1. Introduction to Quota 16.2. Shared Quota and Individually Defined Quota 16.3. Quota Accounting 16.4. Enabling and Changing a Quota Mode in a Data Center 16.5. Creating a New Quota Policy 16.6. Explanation of Quota Threshold Settings 16.7. Assigning a Quota to an Object 16.8. Using Quota to Limit Resources by User 16.9. Editing Quotas 16.10. Removing Quotas 16.11. Service Level Agreement Policy Enforcement 17. Event Notifications Expand section "17. Event Notifications" Collapse section "17. Event Notifications" 17.1. Configuring Event Notifications in the Administration Portal 17.2. Canceling Event Notifications in the Administration Portal 17.3. Parameters for Event Notifications in ovirt-engine-notifier.conf 17.4. Configuring the Red Hat Virtualization Manager to Send SNMP Traps 18. Utilities Expand section "18. Utilities" Collapse section "18. Utilities" 18.1. The oVirt Engine Rename Tool Expand section "18.1. The oVirt Engine Rename Tool" Collapse section "18.1. The oVirt Engine Rename Tool" 18.1.1. The oVirt Engine Rename Tool 18.1.2. Syntax for the oVirt Engine Rename Command 18.1.3. Renaming the Manager with the oVirt Engine Rename Tool 18.2. The Engine Configuration Tool Expand section "18.2. The Engine Configuration Tool" Collapse section "18.2. The Engine Configuration Tool" 18.2.1. The Engine Configuration Tool 18.2.2. Syntax for the engine-config Command 18.3. The USB Filter Editor Expand section "18.3. The USB Filter Editor" Collapse section "18.3. The USB Filter Editor" 18.3.1. Installing the USB Filter Editor 18.3.2. The USB Filter Editor Interface 18.3.3. Adding a USB Policy 18.3.4. Removing a USB Policy 18.3.5. Searching for USB Device Policies 18.3.6. Exporting a USB Policy 18.3.7. Importing a USB Policy 18.4. The Log Collector Tool Expand section "18.4. The Log Collector Tool" Collapse section "18.4. The Log Collector Tool" 18.4.1. Log Collector 18.4.2. Syntax for the ovirt-log-collector Command 18.4.3. Basic Log Collector Usage 18.5. The ISO Uploader Tool Expand section "18.5. The ISO Uploader Tool" Collapse section "18.5. The ISO Uploader Tool" 18.5.1. The ISO Uploader Tool 18.5.2. Syntax for the engine-iso-uploader Command 18.5.3. Specifying an NFS Server 18.5.4. Basic ISO Uploader Usage 18.5.5. Uploading the VirtIO and Guest Tool Image Files to an ISO Storage Domain 18.6. The Engine Vacuum Tool Expand section "18.6. The Engine Vacuum Tool" Collapse section "18.6. The Engine Vacuum Tool" 18.6.1. The Engine Vacuum Tool 18.6.2. Engine Vacuum Modes 18.6.3. Syntax for the engine-vacuum Command 18.7. The VDSM to Network Name Mapping Tool Expand section "18.7. The VDSM to Network Name Mapping Tool" Collapse section "18.7. The VDSM to Network Name Mapping Tool" 18.7.1. Mapping VDSM Names to Logical Network Names IV. Gathering Information About the Environment Expand section "IV. Gathering Information About the Environment" Collapse section "IV. Gathering Information About the Environment" 19. Log Files Expand section "19. Log Files" Collapse section "19. Log Files" 19.1. Manager Installation Log Files 19.2. Red Hat Virtualization Manager Log Files 19.3. SPICE Log Files Expand section "19.3. SPICE Log Files" Collapse section "19.3. SPICE Log Files" 19.3.1. SPICE Logs for Hypervisor SPICE Servers 19.3.2. SPICE Logs for Guest Machines 19.3.3. SPICE Logs for SPICE Clients Launched Using console.vv Files 19.4. Host Log Files 19.5. Setting Up a Host Logging Server 20. Proxies Expand section "20. Proxies" Collapse section "20. Proxies" 20.1. SPICE Proxy Expand section "20.1. SPICE Proxy" Collapse section "20.1. SPICE Proxy" 20.1.1. SPICE Proxy Overview 20.1.2. SPICE Proxy Machine Setup 20.1.3. Turning On a SPICE Proxy 20.1.4. Turning Off a SPICE Proxy 20.2. Squid Proxy Expand section "20.2. Squid Proxy" Collapse section "20.2. Squid Proxy" 20.2.1. Installing and Configuring a Squid Proxy 20.3. Websocket Proxy Expand section "20.3. Websocket Proxy" Collapse section "20.3. Websocket Proxy" 20.3.1. Websocket Proxy Overview 20.3.2. Migrating the Websocket Proxy to a Separate Machine A. VDSM and Hooks Expand section "A. VDSM and Hooks" Collapse section "A. VDSM and Hooks" A.1. VDSM A.2. VDSM Hooks A.3. Extending VDSM with Hooks A.4. Supported VDSM Events A.5. The VDSM Hook Environment A.6. The VDSM Hook Domain XML Object A.7. Defining Custom Properties A.8. Setting Virtual Machine Custom Properties A.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook A.10. Using the VDSM Hooking Module A.11. VDSM Hook Execution A.12. VDSM Hook Return Codes A.13. VDSM Hook Examples B. Custom Network Properties Expand section "B. Custom Network Properties" Collapse section "B. Custom Network Properties" B.1. Explanation of bridge_opts Parameters B.2. How to Set Up Red Hat Virtualization Manager to Use Ethtool B.3. How to Set Up Red Hat Virtualization Manager to Use FCoE C. Red Hat Virtualization User Interface Plugins Expand section "C. Red Hat Virtualization User Interface Plugins" Collapse section "C. Red Hat Virtualization User Interface Plugins" C.1. Red Hat Virtualization User Interface Plug-ins C.2. Red Hat Virtualization User Interface Plugin Lifecycle Expand section "C.2. Red Hat Virtualization User Interface Plugin Lifecycle" Collapse section "C.2. Red Hat Virtualization User Interface Plugin Lifecycle" C.2.1. Red Hat Virtualization User Interface Plug-in Life cycle C.2.2. Red Hat Virtualization User Interface Plug-in Discovery C.2.3. Red Hat Virtualization User Interface Plug-in Loading C.2.4. Red Hat Virtualization User Interface Plug-in Bootstrapping C.3. User Interface Plugin-related Files and Their Locations C.4. Example User Interface Plug-in Deployment D. Red Hat Virtualization and Encrypted Communication Expand section "D. Red Hat Virtualization and Encrypted Communication" Collapse section "D. Red Hat Virtualization and Encrypted Communication" D.1. Replacing the Red Hat Virtualization Manager CA Certificate D.2. Setting Up Encrypted Communication between the Manager and an LDAP Server D.3. Manually Setting Up Encrypted Communication for VDSM E. Branding Expand section "E. Branding" Collapse section "E. Branding" E.1. Branding Expand section "E.1. Branding" Collapse section "E.1. Branding" E.1.1. Re-Branding the Manager E.1.2. Login Screen E.1.3. Administration Portal Screen E.1.4. VM Portal Screen E.1.5. Pop-Up Windows E.1.6. Tabs E.1.7. The Welcome Page E.1.8. The Page Not Found Page F. System Accounts Expand section "F. System Accounts" Collapse section "F. System Accounts" F.1. System Accounts Expand section "F.1. System Accounts" Collapse section "F.1. System Accounts" F.1.1. Red Hat Virtualization Manager User Accounts F.1.2. Red Hat Virtualization Manager Groups F.1.3. Virtualization Host User Accounts F.1.4. Virtualization Host Groups Settings Close Language: English 日本語 Language: English 日本語 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English 日本語 Language: English 日本語 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Virtualization Part III. Administering the Environment Previous Next