Jump To Close Expand all Collapse all Table of contents Administration Guide 1. Administering and Maintaining the Red Hat Virtualization Environment Expand section "1. Administering and Maintaining the Red Hat Virtualization Environment" Collapse section "1. Administering and Maintaining the Red Hat Virtualization Environment" 1.1. Global Configuration Expand section "1.1. Global Configuration" Collapse section "1.1. Global Configuration" 1.1.1. Roles Expand section "1.1.1. Roles" Collapse section "1.1.1. Roles" 1.1.1.1. Creating a New Role 1.1.1.2. Editing or Copying a Role 1.1.1.3. User Role and Authorization Examples 1.1.2. System Permissions Expand section "1.1.2. System Permissions" Collapse section "1.1.2. System Permissions" 1.1.2.1. User Properties 1.1.2.2. User and Administrator Roles 1.1.2.3. User Roles Explained 1.1.2.4. Administrator Roles Explained 1.1.2.5. Assigning an Administrator or User Role to a Resource 1.1.2.6. Removing an Administrator or User Role from a Resource 1.1.2.7. Managing System Permissions for a Data Center 1.1.2.8. Data Center Administrator Roles Explained 1.1.2.9. Managing System Permissions for a Cluster 1.1.2.10. Cluster Administrator Roles Explained 1.1.2.11. Managing System Permissions for a Network 1.1.2.12. Network Administrator and User Roles Explained 1.1.2.13. Managing System Permissions for a Host 1.1.2.14. Host Administrator Roles Explained 1.1.2.15. Managing System Permissions for a Storage Domain 1.1.2.16. Storage Administrator Roles Explained 1.1.2.17. Managing System Permissions for a Virtual Machine Pool 1.1.2.18. Virtual Machine Pool Administrator Roles Explained 1.1.2.19. Managing System Permissions for a Virtual Disk 1.1.2.20. Virtual Disk User Roles Explained Expand section "1.1.2.20. Virtual Disk User Roles Explained" Collapse section "1.1.2.20. Virtual Disk User Roles Explained" 1.1.2.20.1. Setting a Legacy SPICE Cipher 1.1.3. Scheduling Policies Expand section "1.1.3. Scheduling Policies" Collapse section "1.1.3. Scheduling Policies" 1.1.3.1. Creating a Scheduling Policy 1.1.3.2. Explanation of Settings in the New Scheduling Policy and Edit Scheduling Policy Window 1.1.4. Instance Types Expand section "1.1.4. Instance Types" Collapse section "1.1.4. Instance Types" 1.1.4.1. Creating Instance Types 1.1.4.2. Editing Instance Types 1.1.4.3. Removing Instance Types 1.1.5. MAC Address Pools Expand section "1.1.5. MAC Address Pools" Collapse section "1.1.5. MAC Address Pools" 1.1.5.1. Creating MAC Address Pools 1.1.5.2. Editing MAC Address Pools 1.1.5.3. Editing MAC Address Pool Permissions 1.1.5.4. Removing MAC Address Pools 1.2. Dashboard Expand section "1.2. Dashboard" Collapse section "1.2. Dashboard" 1.2.1. Prerequisites 1.2.2. Global Inventory 1.2.3. Global Utilization Expand section "1.2.3. Global Utilization" Collapse section "1.2.3. Global Utilization" 1.2.3.1. Top Utilized Resources 1.2.4. Cluster Utilization Expand section "1.2.4. Cluster Utilization" Collapse section "1.2.4. Cluster Utilization" 1.2.4.1. CPU 1.2.4.2. Memory 1.2.5. Storage Utilization 1.3. Searches Expand section "1.3. Searches" Collapse section "1.3. Searches" 1.3.1. Performing Searches in Red Hat Virtualization 1.3.2. Search Syntax and Examples 1.3.3. Search Auto-Completion 1.3.4. Search Result Type Options 1.3.5. Search Criteria 1.3.6. Search: Multiple Criteria and Wildcards 1.3.7. Search: Determining Search Order 1.3.8. Searching for Data Centers 1.3.9. Searching for Clusters 1.3.10. Searching for Hosts 1.3.11. Searching for Networks 1.3.12. Searching for Storage 1.3.13. Searching for Disks 1.3.14. Searching for Volumes 1.3.15. Searching for Virtual Machines 1.3.16. Searching for Pools 1.3.17. Searching for Templates 1.3.18. Searching for Users 1.3.19. Searching for Events 1.4. Bookmarks Expand section "1.4. Bookmarks" Collapse section "1.4. Bookmarks" 1.4.1. Saving a Query String as a Bookmark 1.4.2. Editing a Bookmark 1.4.3. Deleting a Bookmark 1.5. Tags Expand section "1.5. Tags" Collapse section "1.5. Tags" 1.5.1. Using Tags to Customize Interactions with Red Hat Virtualization 1.5.2. Creating a Tag 1.5.3. Modifying a Tag 1.5.4. Deleting a Tag 1.5.5. Adding and Removing Tags to and from Objects 1.5.6. Searching for Objects Using Tags 1.5.7. Customizing Hosts with Tags 2. Administering the Resources Expand section "2. Administering the Resources" Collapse section "2. Administering the Resources" 2.1. Quality of Service Expand section "2.1. Quality of Service" Collapse section "2.1. Quality of Service" 2.1.1. Storage Quality of Service Expand section "2.1.1. Storage Quality of Service" Collapse section "2.1.1. Storage Quality of Service" 2.1.1.1. Creating a Storage Quality of Service Entry 2.1.1.2. Removing a Storage Quality of Service Entry 2.1.2. Virtual Machine Network Quality of Service Expand section "2.1.2. Virtual Machine Network Quality of Service" Collapse section "2.1.2. Virtual Machine Network Quality of Service" 2.1.2.1. Creating a Virtual Machine Network Quality of Service Entry 2.1.2.2. Settings in the New Virtual Machine Network QoS and Edit Virtual Machine Network QoS Windows Explained 2.1.2.3. Removing a Virtual Machine Network Quality of Service Entry 2.1.3. Host Network Quality of Service Expand section "2.1.3. Host Network Quality of Service" Collapse section "2.1.3. Host Network Quality of Service" 2.1.3.1. Creating a Host Network Quality of Service Entry 2.1.3.2. Settings in the New Host Network Quality of Service and Edit Host Network Quality of Service Windows Explained 2.1.3.3. Removing a Host Network Quality of Service Entry 2.1.4. CPU Quality of Service Expand section "2.1.4. CPU Quality of Service" Collapse section "2.1.4. CPU Quality of Service" 2.1.4.1. Creating a CPU Quality of Service Entry 2.1.4.2. Removing a CPU Quality of Service Entry 2.2. Data Centers Expand section "2.2. Data Centers" Collapse section "2.2. Data Centers" 2.2.1. Introduction to Data Centers 2.2.2. The Storage Pool Manager 2.2.3. SPM Priority 2.2.4. Data Center Tasks Expand section "2.2.4. Data Center Tasks" Collapse section "2.2.4. Data Center Tasks" 2.2.4.1. Creating a New Data Center 2.2.4.2. Explanation of Settings in the New Data Center and Edit Data Center Windows 2.2.4.3. Re-Initializing a Data Center: Recovery Procedure 2.2.4.4. Removing a Data Center 2.2.4.5. Force Removing a Data Center 2.2.4.6. Changing the Data Center Storage Type 2.2.4.7. Changing the Data Center Compatibility Version 2.2.5. Data Centers and Storage Domains Expand section "2.2.5. Data Centers and Storage Domains" Collapse section "2.2.5. Data Centers and Storage Domains" 2.2.5.1. Attaching an Existing Data Domain to a Data Center 2.2.5.2. Attaching an Existing ISO domain to a Data Center 2.2.5.3. Attaching an Existing Export Domain to a Data Center 2.2.5.4. Detaching a Storage Domain from a Data Center 2.3. Clusters Expand section "2.3. Clusters" Collapse section "2.3. Clusters" 2.3.1. Introduction to Clusters 2.3.2. Cluster Tasks Expand section "2.3.2. Cluster Tasks" Collapse section "2.3.2. Cluster Tasks" 2.3.2.1. Creating a New Cluster 2.3.2.2. General Cluster Settings Explained 2.3.2.3. Optimization Settings Explained 2.3.2.4. Migration Policy Settings Explained 2.3.2.5. Scheduling Policy Settings Explained 2.3.2.6. MaxFreeMemoryForOverUtilized and MinFreeMemoryForUnderUtilized cluster scheduling policy properties 2.3.2.7. Cluster Console Settings Explained 2.3.2.8. Fencing Policy Settings Explained 2.3.2.9. Setting Load and Power Management Policies for Hosts in a Cluster 2.3.2.10. Updating the MoM Policy on Hosts in a Cluster 2.3.2.11. Creating a CPU Profile 2.3.2.12. Removing a CPU Profile 2.3.2.13. Importing an Existing Red Hat Gluster Storage Cluster 2.3.2.14. Explanation of Settings in the Add Hosts Window 2.3.2.15. Removing a Cluster 2.3.2.16. Memory Optimization 2.3.2.17. Memory Optimization and Memory Overcommitment 2.3.2.18. Swap Space and Memory Overcommitment 2.3.2.19. The Memory Overcommit Manager (MoM) 2.3.2.20. Memory Ballooning 2.3.2.21. Kernel Same-page Merging (KSM) 2.3.2.22. UEFI and the Q35 chipset 2.3.2.23. Configuring a cluster to use the Q35 Chipset and UEFI 2.3.2.24. Configuring a virtual machine to use the Q35 Chipset and UEFI 2.3.2.25. Changing the Cluster Compatibility Version 2.4. Logical Networks Expand section "2.4. Logical Networks" Collapse section "2.4. Logical Networks" 2.4.1. Logical Network Tasks Expand section "2.4.1. Logical Network Tasks" Collapse section "2.4.1. Logical Network Tasks" 2.4.1.1. Performing Networking Tasks 2.4.1.2. Creating a New Logical Network in a Data Center or Cluster 2.4.1.3. Editing a Logical Network 2.4.1.4. Removing a Logical Network 2.4.1.5. Configuring a Non-Management Logical Network as the Default Route 2.4.1.6. Adding a static route on a host 2.4.1.7. Removing a static route on a host 2.4.1.8. Viewing or Editing the Gateway for a Logical Network 2.4.1.9. Logical Network General Settings Explained 2.4.1.10. Logical Network Cluster Settings Explained 2.4.1.11. Logical Network vNIC Profiles Settings Explained 2.4.1.12. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window 2.4.1.13. Explanation of Settings in the Manage Networks Window 2.4.1.14. Configuring virtual functions on a NIC 2.4.2. Virtual Network Interface Cards (vNICs) Expand section "2.4.2. Virtual Network Interface Cards (vNICs)" Collapse section "2.4.2. Virtual Network Interface Cards (vNICs)" 2.4.2.1. vNIC Profile Overview 2.4.2.2. Creating or Editing a vNIC Profile 2.4.2.3. Explanation of Settings in the VM Interface Profile Window 2.4.2.4. Enabling Passthrough on a vNIC Profile 2.4.2.5. Enabling a vNIC profile for SR-IOV migration with failover 2.4.2.6. Removing a vNIC Profile 2.4.2.7. Assigning Security Groups to vNIC Profiles 2.4.2.8. User Permissions for vNIC Profiles 2.4.3. External Provider Networks Expand section "2.4.3. External Provider Networks" Collapse section "2.4.3. External Provider Networks" 2.4.3.1. Importing Networks From External Providers 2.4.3.2. Limitations to Using External Provider Networks 2.4.3.3. Configuring Subnets on External Provider Logical Networks 2.4.3.4. Adding Subnets to External Provider Logical Networks 2.4.3.5. Removing Subnets from External Provider Logical Networks 2.4.3.6. Assigning Security Groups to Logical Networks and Ports 2.4.4. Hosts and Networking Expand section "2.4.4. Hosts and Networking" Collapse section "2.4.4. Hosts and Networking" 2.4.4.1. Network Manager Stateful Configuration (nmstate) 2.4.4.2. Refreshing Host Capabilities 2.4.4.3. Editing Host Network Interfaces and Assigning Logical Networks to Hosts 2.4.4.4. Synchronizing Host Networks 2.4.4.5. Editing a Host’s VLAN Settings 2.4.4.6. Adding Multiple VLANs to a Single Network Interface Using Logical Networks Expand section "2.4.4.6. Adding Multiple VLANs to a Single Network Interface Using Logical Networks" Collapse section "2.4.4.6. Adding Multiple VLANs to a Single Network Interface Using Logical Networks" 2.4.4.6.1. Copying host networks 2.4.4.7. Assigning Additional IPv4 Addresses to a Host Network 2.4.4.8. Adding Network Labels to Host Network Interfaces Expand section "2.4.4.8. Adding Network Labels to Host Network Interfaces" Collapse section "2.4.4.8. Adding Network Labels to Host Network Interfaces" 2.4.4.8.1. Configuring the LLDP Labeler 2.4.4.9. Changing the FQDN of a Host Expand section "2.4.4.9. Changing the FQDN of a Host" Collapse section "2.4.4.9. Changing the FQDN of a Host" 2.4.4.9.1. IPv6 Networking Support 2.4.4.9.2. Setting Up and Configuring SR-IOV Expand section "2.4.4.9.2. Setting Up and Configuring SR-IOV" Collapse section "2.4.4.9.2. Setting Up and Configuring SR-IOV" 2.4.4.9.2.1. Additional Resources 2.4.5. Network Bonding Expand section "2.4.5. Network Bonding" Collapse section "2.4.5. Network Bonding" 2.4.5.1. Bonding methods 2.4.5.2. Creating a Bond Device in the Administration Portal 2.4.5.3. Creating a Bond Device with the LLDP Labeler Service Expand section "2.4.5.3. Creating a Bond Device with the LLDP Labeler Service" Collapse section "2.4.5.3. Creating a Bond Device with the LLDP Labeler Service" 2.4.5.3.1. Configuring the LLDP Labeler 2.4.5.4. Bonding Modes 2.5. Hosts Expand section "2.5. Hosts" Collapse section "2.5. Hosts" 2.5.1. Introduction to Hosts 2.5.2. Red Hat Virtualization Host 2.5.3. Red Hat Enterprise Linux hosts 2.5.4. Satellite Host Provider Hosts 2.5.5. Host Tasks Expand section "2.5.5. Host Tasks" Collapse section "2.5.5. Host Tasks" 2.5.5.1. Adding Standard Hosts to the Red Hat Virtualization Manager 2.5.5.2. Adding a Satellite Host Provider Host 2.5.5.3. Setting up Satellite errata viewing for a host Expand section "2.5.5.3. Setting up Satellite errata viewing for a host" Collapse section "2.5.5.3. Setting up Satellite errata viewing for a host" 2.5.5.3.1. Configuring a Host for PCI Passthrough 2.5.5.3.2. Enabling nested virtualization for all virtual machines 2.5.5.3.3. Enabling nested virtualization for individual virtual machines 2.5.5.4. Moving a Host to Maintenance Mode 2.5.5.5. Activating a Host from Maintenance Mode Expand section "2.5.5.5. Activating a Host from Maintenance Mode" Collapse section "2.5.5.5. Activating a Host from Maintenance Mode" 2.5.5.5.1. Configuring Host Firewall Rules 2.5.5.5.2. Removing a Host 2.5.5.5.3. Updating Hosts Between Minor Releases Expand section "2.5.5.5.3. Updating Hosts Between Minor Releases" Collapse section "2.5.5.5.3. Updating Hosts Between Minor Releases" 2.5.5.5.3.1. Updating All Hosts in a Cluster 2.5.5.5.3.2. Updating Individual Hosts 2.5.5.5.3.3. Manually Updating Hosts 2.5.5.5.4. Reinstalling Hosts 2.5.5.6. Viewing Host Errata 2.5.5.7. Viewing the Health Status of a Host 2.5.5.8. Viewing Host Devices 2.5.5.9. Accessing Cockpit from the Administration Portal Expand section "2.5.5.9. Accessing Cockpit from the Administration Portal" Collapse section "2.5.5.9. Accessing Cockpit from the Administration Portal" 2.5.5.9.1. Setting a Legacy SPICE Cipher 2.5.5.10. Configuring Host Power Management Settings 2.5.5.11. Configuring Host Storage Pool Manager Settings Expand section "2.5.5.11. Configuring Host Storage Pool Manager Settings" Collapse section "2.5.5.11. Configuring Host Storage Pool Manager Settings" 2.5.5.11.1. Migrating a self-hosted engine host to a different cluster 2.5.6. Explanation of Settings and Controls in the New Host and Edit Host Windows Expand section "2.5.6. Explanation of Settings and Controls in the New Host and Edit Host Windows" Collapse section "2.5.6. Explanation of Settings and Controls in the New Host and Edit Host Windows" 2.5.6.1. Host General Settings Explained 2.5.6.2. Host Power Management Settings Explained 2.5.6.3. SPM Priority Settings Explained 2.5.6.4. Host Console Settings Explained 2.5.6.5. Network Provider Settings Explained 2.5.6.6. Kernel Settings Explained 2.5.6.7. Hosted Engine Settings Explained 2.5.7. Host Resilience Expand section "2.5.7. Host Resilience" Collapse section "2.5.7. Host Resilience" 2.5.7.1. Host High Availability 2.5.7.2. Power Management by Proxy in Red Hat Virtualization 2.5.7.3. Setting Fencing Parameters on a Host 2.5.7.4. fence_kdump Advanced Configuration 2.5.7.5. fence_kdump listener Configuration 2.5.7.6. Configuring fence_kdump on the Manager 2.5.7.7. Soft-Fencing Hosts 2.5.7.8. Using Host Power Management Functions 2.5.7.9. Manually Fencing or Isolating a Non-Responsive Host 2.6. Storage Expand section "2.6. Storage" Collapse section "2.6. Storage" 2.6.1. About Red Hat Virtualization storage 2.6.2. Understanding Storage Domains 2.6.3. Preparing and Adding NFS Storage Expand section "2.6.3. Preparing and Adding NFS Storage" Collapse section "2.6.3. Preparing and Adding NFS Storage" 2.6.3.1. Preparing NFS Storage 2.6.3.2. Adding NFS Storage 2.6.3.3. Increasing NFS Storage 2.6.4. Preparing and adding local storage Expand section "2.6.4. Preparing and adding local storage" Collapse section "2.6.4. Preparing and adding local storage" 2.6.4.1. Preparing local storage 2.6.4.2. Adding a local storage domain 2.6.5. Preparing and Adding POSIX-compliant File System Storage Expand section "2.6.5. Preparing and Adding POSIX-compliant File System Storage" Collapse section "2.6.5. Preparing and Adding POSIX-compliant File System Storage" 2.6.5.1. Preparing POSIX-compliant File System Storage 2.6.5.2. Adding POSIX-compliant File System Storage 2.6.6. Preparing and Adding Block Storage Expand section "2.6.6. Preparing and Adding Block Storage" Collapse section "2.6.6. Preparing and Adding Block Storage" 2.6.6.1. Preparing iSCSI Storage 2.6.6.2. Adding iSCSI Storage 2.6.6.3. Configuring iSCSI Multipathing 2.6.6.4. Migrating a Logical Network to an iSCSI Bond 2.6.6.5. Preparing FCP Storage 2.6.6.6. Adding FCP Storage 2.6.6.7. Increasing iSCSI or FCP Storage 2.6.6.8. Reusing LUNs 2.6.6.9. Removing stale LUNs 2.6.6.10. Creating an LVM filter 2.6.7. Preparing and Adding Red Hat Gluster Storage Expand section "2.6.7. Preparing and Adding Red Hat Gluster Storage" Collapse section "2.6.7. Preparing and Adding Red Hat Gluster Storage" 2.6.7.1. Preparing Red Hat Gluster Storage 2.6.7.2. Adding Red Hat Gluster Storage 2.6.8. Importing Existing Storage Domains Expand section "2.6.8. Importing Existing Storage Domains" Collapse section "2.6.8. Importing Existing Storage Domains" 2.6.8.1. Overview of Importing Existing Storage Domains 2.6.8.2. Importing storage domains 2.6.8.3. Migrating Storage Domains between Data Centers in the Same Environment 2.6.8.4. Migrating Storage Domains between Data Centers in Different Environments 2.6.8.5. Importing Templates from Imported Data Storage Domains 2.6.9. Storage Tasks Expand section "2.6.9. Storage Tasks" Collapse section "2.6.9. Storage Tasks" 2.6.9.1. Uploading Images to a Data Storage Domain 2.6.9.2. Uploading the VirtIO image files to a storage domain 2.6.9.3. Uploading images to an ISO domain 2.6.9.4. Moving Storage Domains to Maintenance Mode 2.6.9.5. Editing Storage Domains 2.6.9.6. Updating OVFs 2.6.9.7. Activating Storage Domains from Maintenance Mode 2.6.9.8. Detaching a Storage Domain from a Data Center 2.6.9.9. Attaching a Storage Domain to a Data Center 2.6.9.10. Removing a Storage Domain 2.6.9.11. Destroying a Storage Domain 2.6.9.12. Creating a Disk Profile 2.6.9.13. Removing a Disk Profile 2.6.9.14. Viewing the Health Status of a Storage Domain 2.6.9.15. Setting Discard After Delete for a Storage Domain 2.6.9.16. Enabling 4K support on environments with more than 250 hosts 2.6.9.17. Disabling 4K support 2.6.9.18. Monitoring available space in a storage domain 2.7. Pools Expand section "2.7. Pools" Collapse section "2.7. Pools" 2.7.1. Introduction to Virtual Machine Pools 2.7.2. Creating a virtual machine pool 2.7.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows Expand section "2.7.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows" Collapse section "2.7.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows" 2.7.3.1. New Pool and Edit Pool General Settings Explained 2.7.3.2. New Pool and Edit Pool Type Settings Explained 2.7.3.3. New Pool and Edit Pool Console Settings Explained 2.7.3.4. Virtual Machine Pool Host Settings Explained 2.7.3.5. New Pool and Edit Pool Resource Allocation Settings Explained 2.7.3.6. Editing a Virtual Machine Pool 2.7.3.7. Prestarting Virtual Machines in a Pool 2.7.3.8. Adding Virtual Machines to a Virtual Machine Pool 2.7.3.9. Detaching Virtual Machines from a Virtual Machine Pool 2.7.3.10. Removing a Virtual Machine Pool 2.8. Virtual Disks Expand section "2.8. Virtual Disks" Collapse section "2.8. Virtual Disks" 2.8.1. Understanding Virtual Machine Storage 2.8.2. Understanding Virtual Disks 2.8.3. Settings to Wipe Virtual Disks After Deletion 2.8.4. Shareable Disks in Red Hat Virtualization 2.8.5. Read Only Disks in Red Hat Virtualization 2.8.6. Virtual Disk Tasks Expand section "2.8.6. Virtual Disk Tasks" Collapse section "2.8.6. Virtual Disk Tasks" 2.8.6.1. Creating a Virtual Disk 2.8.6.2. Explanation of settings in the New Virtual Disk window 2.8.6.3. Overview of Live Storage Migration 2.8.6.4. Moving a Virtual Disk 2.8.6.5. Changing the Disk Interface Type 2.8.6.6. Copying a Virtual Disk 2.8.6.7. Improving disk performance 2.8.6.8. Uploading Images to a Data Storage Domain 2.8.6.9. Importing a Disk Image from an Imported Storage Domain 2.8.6.10. Importing an Unregistered Disk Image from an Imported Storage Domain 2.8.6.11. Importing a Virtual Disk from an OpenStack Image Service 2.8.6.12. Exporting a Virtual Disk to an OpenStack Image Service 2.8.6.13. Reclaiming Virtual Disk Space 2.9. External Providers Expand section "2.9. External Providers" Collapse section "2.9. External Providers" 2.9.1. Introduction to External Providers in Red Hat Virtualization 2.9.2. Adding External Providers Expand section "2.9.2. Adding External Providers" Collapse section "2.9.2. Adding External Providers" 2.9.2.1. Adding a Red Hat Satellite Instance for Host Provisioning 2.9.2.2. Adding an OpenStack Image (Glance) Instance for Image Management 2.9.2.3. Adding KubeVirt/Openshift Virtualization as an external provider 2.9.2.4. Adding a VMware Instance as a Virtual Machine Provider 2.9.2.5. Adding a RHEL 5 Xen Host as a Virtual Machine Provider 2.9.2.6. Adding a KVM Host as a Virtual Machine Provider 2.9.2.7. Adding Open Virtual Network (OVN) as an External Network Provider Expand section "2.9.2.7. Adding Open Virtual Network (OVN) as an External Network Provider" Collapse section "2.9.2.7. Adding Open Virtual Network (OVN) as an External Network Provider" 2.9.2.7.1. Installing a New OVN Network Provider 2.9.2.7.2. Updating the OVN Tunnel Network on a Single Host 2.9.2.7.3. Connecting an OVN Network to a Physical Network 2.9.2.8. Add Provider General Settings Explained 2.9.3. Editing an External Provider 2.9.4. Removing an External Provider 3. Administering the Environment Expand section "3. Administering the Environment" Collapse section "3. Administering the Environment" 3.1. Administering the Self-Hosted Engine Expand section "3.1. Administering the Self-Hosted Engine" Collapse section "3.1. Administering the Self-Hosted Engine" 3.1.1. Maintaining the Self-hosted engine Expand section "3.1.1. Maintaining the Self-hosted engine" Collapse section "3.1.1. Maintaining the Self-hosted engine" 3.1.1.1. Self-hosted engine maintenance modes explained 3.1.1.2. Setting local maintenance mode 3.1.1.3. Setting global maintenance mode 3.1.2. Administering the Manager Virtual Machine Expand section "3.1.2. Administering the Manager Virtual Machine" Collapse section "3.1.2. Administering the Manager Virtual Machine" 3.1.2.1. Updating the Self-Hosted Engine Configuration 3.1.2.2. Configuring Email Notifications 3.1.3. Configuring Memory Slots Reserved for the Self-Hosted Engine on Additional Hosts 3.1.4. Adding Self-Hosted Engine Nodes to the Red Hat Virtualization Manager 3.1.5. Reinstalling an Existing Host as a Self-Hosted Engine Node 3.1.6. Booting the Manager Virtual Machine in Rescue Mode 3.1.7. Removing a Host from a Self-Hosted Engine Environment 3.1.8. Updating a Self-Hosted Engine 3.1.9. Changing the FQDN of the Manager in a Self-Hosted Engine 3.2. Backups and Migration Expand section "3.2. Backups and Migration" Collapse section "3.2. Backups and Migration" 3.2.1. Backing Up and Restoring the Red Hat Virtualization Manager Expand section "3.2.1. Backing Up and Restoring the Red Hat Virtualization Manager" Collapse section "3.2.1. Backing Up and Restoring the Red Hat Virtualization Manager" 3.2.1.1. Backing up Red Hat Virtualization Manager - Overview 3.2.1.2. Syntax for the engine-backup Command 3.2.1.3. Creating a backup with the engine-backup command 3.2.1.4. Restoring a Backup with the engine-backup Command 3.2.1.5. Restoring a Backup to a Fresh Installation 3.2.1.6. Restoring a Backup to Overwrite an Existing Installation 3.2.1.7. Restoring a Backup with Different Credentials 3.2.1.8. Backing up and Restoring a Self-Hosted Engine Expand section "3.2.1.8. Backing up and Restoring a Self-Hosted Engine" Collapse section "3.2.1.8. Backing up and Restoring a Self-Hosted Engine" 3.2.1.8.1. Backing up the Original Manager 3.2.1.8.2. Restoring the Backup on a New Self-Hosted Engine 3.2.1.8.3. Enabling the Red Hat Virtualization Manager Repositories 3.2.1.8.4. Reinstalling Hosts 3.2.1.8.5. Removing a Storage Domain 3.2.1.9. Recovering a Self-Hosted Engine from an Existing Backup Expand section "3.2.1.9. Recovering a Self-Hosted Engine from an Existing Backup" Collapse section "3.2.1.9. Recovering a Self-Hosted Engine from an Existing Backup" 3.2.1.9.1. Restoring the Backup on a New Self-Hosted Engine 3.2.1.9.2. Enabling the Red Hat Virtualization Manager Repositories 3.2.1.9.3. Reinstalling Hosts 3.2.1.9.4. Removing a Storage Domain 3.2.1.10. Overwriting a Self-Hosted Engine from an Existing Backup Expand section "3.2.1.10. Overwriting a Self-Hosted Engine from an Existing Backup" Collapse section "3.2.1.10. Overwriting a Self-Hosted Engine from an Existing Backup" 3.2.1.10.1. Enabling global maintenance mode 3.2.1.10.2. Restoring a Backup to Overwrite an Existing Installation 3.2.1.10.3. Disabling global maintenance mode 3.2.2. Migrating the Data Warehouse to a Separate Machine Expand section "3.2.2. Migrating the Data Warehouse to a Separate Machine" Collapse section "3.2.2. Migrating the Data Warehouse to a Separate Machine" 3.2.2.1. Migrating the Data Warehouse Database to a Separate Machine Expand section "3.2.2.1. Migrating the Data Warehouse Database to a Separate Machine" Collapse section "3.2.2.1. Migrating the Data Warehouse Database to a Separate Machine" 3.2.2.1.1. Enabling the Red Hat Virtualization Manager Repositories 3.2.2.1.2. Migrating the Data Warehouse Database to a Separate Machine 3.2.2.2. Migrating the Data Warehouse Service to a Separate Machine Expand section "3.2.2.2. Migrating the Data Warehouse Service to a Separate Machine" Collapse section "3.2.2.2. Migrating the Data Warehouse Service to a Separate Machine" 3.2.2.2.1. Setting up the New Data Warehouse Machine 3.2.2.2.2. Stopping the Data Warehouse Service on the Manager Machine 3.2.2.2.3. Configuring the New Data Warehouse Machine 3.2.2.2.4. Disabling the Data Warehouse Service on the Manager Machine 3.2.3. Backing Up and Restoring Virtual Machines Using a Backup Storage Domain Expand section "3.2.3. Backing Up and Restoring Virtual Machines Using a Backup Storage Domain" Collapse section "3.2.3. Backing Up and Restoring Virtual Machines Using a Backup Storage Domain" 3.2.3.1. Backup storage domains explained 3.2.3.2. Setting a data storage domain to be a backup domain 3.2.3.3. Backing up or Restoring a Virtual Machine or Snapshot Using a Backup Domain 3.2.4. Backing Up and Restoring Virtual Machines Using the Backup and Restore API Expand section "3.2.4. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" Collapse section "3.2.4. Backing Up and Restoring Virtual Machines Using the Backup and Restore API" 3.2.4.1. The Backup and Restore API 3.2.4.2. Backing Up a Virtual Machine 3.2.4.3. Restoring a Virtual Machine 3.2.5. Backing Up and Restoring Virtual Machines Using the Incremental Backup and Restore API Expand section "3.2.5. Backing Up and Restoring Virtual Machines Using the Incremental Backup and Restore API" Collapse section "3.2.5. Backing Up and Restoring Virtual Machines Using the Incremental Backup and Restore API" 3.2.5.1. Incremental Backup and Restore API Expand section "3.2.5.1. Incremental Backup and Restore API" Collapse section "3.2.5.1. Incremental Backup and Restore API" 3.2.5.1.1. Incremental Backup Flow 3.2.5.1.2. Incremental Restore Flow 3.2.5.1.3. Incremental Backup and Restore API Tasks 3.2.5.1.4. Enabling Incremental Backup on a new virtual disk 3.2.5.1.5. Enabling Incremental Backup on an existing RAW virtual disk 3.2.5.1.6. Enabling incremental backup 3.2.5.1.7. Finding disks that are enabled for incremental backup 3.2.5.1.8. Starting a full backup 3.2.5.1.9. Starting an incremental backup 3.2.5.1.10. Getting information about a backup 3.2.5.1.11. Getting information about the disks in a backup 3.2.5.1.12. Finalizing a backup 3.2.5.1.13. Creating an image transfer object for incremental backup 3.2.5.1.14. Creating an image transfer object for incremental restore 3.2.5.1.15. Listing checkpoints for a virtual machine 3.2.5.1.16. Listing a specific checkpoint for a virtual machine 3.2.5.1.17. Removing a checkpoint 3.2.5.1.18. Using the imageio API to transfer backup data 3.3. Setting up errata viewing with Red Hat Satellite 3.4. Renewing certificates before they expire 3.5. Automating Configuration Tasks using Ansible Expand section "3.5. Automating Configuration Tasks using Ansible" Collapse section "3.5. Automating Configuration Tasks using Ansible" 3.5.1. oVirt Ansible Collection Expand section "3.5.1. oVirt Ansible Collection" Collapse section "3.5.1. oVirt Ansible Collection" 3.5.1.1. Installing oVirt Ansible Collection from an RPM package 3.5.1.2. Installing oVirt Ansible Collection from Automation Hub 3.5.1.3. Using oVirt Ansible Collection to Configure Red Hat Virtualization 3.6. Users and Roles Expand section "3.6. Users and Roles" Collapse section "3.6. Users and Roles" 3.6.1. Introduction to Users 3.6.2. Introduction to Directory Servers 3.6.3. Configuring an External LDAP Provider Expand section "3.6.3. Configuring an External LDAP Provider" Collapse section "3.6.3. Configuring an External LDAP Provider" 3.6.3.1. Configuring an External LDAP Provider (Interactive Setup) 3.6.3.2. Attaching an Active Directory 3.6.3.3. Configuring an External LDAP Provider (Manual Method) 3.6.3.4. Removing an External LDAP Provider 3.6.4. Configuring LDAP and Kerberos for Single Sign-on Expand section "3.6.4. Configuring LDAP and Kerberos for Single Sign-on" Collapse section "3.6.4. Configuring LDAP and Kerberos for Single Sign-on" 3.6.4.1. Configuring Kerberos for the Apache Service 3.6.5. Installing and Configuring Red Hat Single Sign-On Expand section "3.6.5. Installing and Configuring Red Hat Single Sign-On" Collapse section "3.6.5. Installing and Configuring Red Hat Single Sign-On" 3.6.5.1. Installing Red Hat SSO 3.6.5.2. Configuring the LDAP group mapper 3.6.5.3. Configuring Apache in the Manager 3.6.5.4. Configuring OVN 3.6.5.5. Configuring the Monitoring Portal (Grafana) 3.6.6. User Authorization Expand section "3.6.6. User Authorization" Collapse section "3.6.6. User Authorization" 3.6.6.1. User Authorization Model 3.6.6.2. User Actions 3.6.7. Administering User Tasks From the Administration Portal Expand section "3.6.7. Administering User Tasks From the Administration Portal" Collapse section "3.6.7. Administering User Tasks From the Administration Portal" 3.6.7.1. The Account Settings window 3.6.7.2. Adding Users and Assigning VM Portal Permissions 3.6.7.3. Viewing User Information 3.6.7.4. Viewing User Permissions on Resources 3.6.7.5. Removing Users 3.6.7.6. Viewing Logged-In Users 3.6.7.7. Terminating a User Session 3.6.8. Administering User Tasks From the Command Line Expand section "3.6.8. Administering User Tasks From the Command Line" Collapse section "3.6.8. Administering User Tasks From the Command Line" 3.6.8.1. Creating a New User 3.6.8.2. Setting a User Password 3.6.8.3. Setting User Timeout 3.6.8.4. Pre-encrypting a User Password 3.6.8.5. Viewing User Information 3.6.8.6. Editing User Information 3.6.8.7. Removing a User 3.6.8.8. Disabling the Internal Administrative User 3.6.8.9. Managing Groups 3.6.8.10. Querying Users and Groups 3.6.8.11. Managing Account Settings 3.6.9. Configuring Additional Local Domains 3.7. Quotas and Service Level Agreement Policy Expand section "3.7. Quotas and Service Level Agreement Policy" Collapse section "3.7. Quotas and Service Level Agreement Policy" 3.7.1. Introduction to Quota 3.7.2. Shared Quota and Individually Defined Quota 3.7.3. Quota Accounting 3.7.4. Enabling and Changing a Quota Mode in a Data Center 3.7.5. Creating a New Quota Policy 3.7.6. Explanation of Quota Threshold Settings 3.7.7. Assigning a Quota to an Object 3.7.8. Using Quota to Limit Resources by User 3.7.9. Editing Quotas 3.7.10. Removing Quotas 3.7.11. Service Level Agreement Policy Enforcement 3.8. Event Notifications Expand section "3.8. Event Notifications" Collapse section "3.8. Event Notifications" 3.8.1. Configuring Event Notifications in the Administration Portal 3.8.2. Canceling Event Notifications in the Administration Portal 3.8.3. Parameters for Event Notifications in ovirt-engine-notifier.conf 3.8.4. Configuring the Red Hat Virtualization Manager to Send SNMP Traps 3.9. Utilities Expand section "3.9. Utilities" Collapse section "3.9. Utilities" 3.9.1. The oVirt Engine Rename Tool Expand section "3.9.1. The oVirt Engine Rename Tool" Collapse section "3.9.1. The oVirt Engine Rename Tool" 3.9.1.1. The oVirt Engine Rename Tool 3.9.1.2. Syntax for the oVirt Engine Rename Command 3.9.1.3. Renaming the Manager with the oVirt Engine Rename Tool 3.9.2. The Engine Configuration Tool Expand section "3.9.2. The Engine Configuration Tool" Collapse section "3.9.2. The Engine Configuration Tool" 3.9.2.1. The Engine Configuration Tool 3.9.2.2. Syntax for the engine-config Command 3.9.3. The USB Filter Editor Expand section "3.9.3. The USB Filter Editor" Collapse section "3.9.3. The USB Filter Editor" 3.9.3.1. Installing the USB Filter Editor 3.9.3.2. The USB Filter Editor Interface 3.9.3.3. Adding a USB Policy 3.9.3.4. Removing a USB Policy 3.9.3.5. Searching for USB Device Policies 3.9.3.6. Exporting a USB Policy 3.9.3.7. Importing a USB Policy 3.9.4. The Image discrepancies tool Expand section "3.9.4. The Image discrepancies tool" Collapse section "3.9.4. The Image discrepancies tool" 3.9.4.1. Monitoring snapshot health with the image discrepancies tool 3.9.5. The Log Collector Tool Expand section "3.9.5. The Log Collector Tool" Collapse section "3.9.5. The Log Collector Tool" 3.9.5.1. Log Collector 3.9.5.2. Syntax for the ovirt-log-collector Command 3.9.5.3. Basic Log Collector Usage 3.9.6. The Engine Vacuum Tool Expand section "3.9.6. The Engine Vacuum Tool" Collapse section "3.9.6. The Engine Vacuum Tool" 3.9.6.1. The Engine Vacuum Tool 3.9.6.2. Engine Vacuum Modes 3.9.6.3. Syntax for the engine-vacuum Command 3.9.7. The VDSM to Network Name Mapping Tool Expand section "3.9.7. The VDSM to Network Name Mapping Tool" Collapse section "3.9.7. The VDSM to Network Name Mapping Tool" 3.9.7.1. Mapping VDSM Names to Logical Network Names 4. Gathering Information About the Environment Expand section "4. Gathering Information About the Environment" Collapse section "4. Gathering Information About the Environment" 4.1. Monitoring and observability Expand section "4.1. Monitoring and observability" Collapse section "4.1. Monitoring and observability" 4.1.1. Using Data Warehouse and Grafana to monitor RHV Expand section "4.1.1. Using Data Warehouse and Grafana to monitor RHV" Collapse section "4.1.1. Using Data Warehouse and Grafana to monitor RHV" 4.1.1.1. Grafana overview 4.1.1.2. Installation Expand section "4.1.1.2. Installation" Collapse section "4.1.1.2. Installation" 4.1.1.2.1. Configuring Grafana for Single Sign-on 4.1.1.3. Built-in Grafana dashboards 4.1.1.4. Customized Grafana dashboards 4.1.2. Sending metrics and logs to a remote instance of Elasticsearch Expand section "4.1.2. Sending metrics and logs to a remote instance of Elasticsearch" Collapse section "4.1.2. Sending metrics and logs to a remote instance of Elasticsearch" 4.1.2.1. Installing collectd and rsyslog 4.1.2.2. Logging schema and analyzing logs 4.1.3. Deploying Insights Expand section "4.1.3. Deploying Insights" Collapse section "4.1.3. Deploying Insights" 4.1.3.1. Register the system to Red Hat Insights 4.1.3.2. Enable data collection from the Red Hat Virtualization environment 4.1.3.3. View your Insights results in the Insights Console 4.2. Log Files Expand section "4.2. Log Files" Collapse section "4.2. Log Files" 4.2.1. Manager Installation Log Files 4.2.2. Red Hat Virtualization Manager Log Files 4.2.3. SPICE Log Files Expand section "4.2.3. SPICE Log Files" Collapse section "4.2.3. SPICE Log Files" 4.2.3.1. SPICE Logs for Hypervisor SPICE Servers 4.2.3.2. SPICE Logs for Guest Machines 4.2.3.3. SPICE Logs for SPICE Clients Launched Using console.vv Files 4.2.4. Host Log Files 4.2.5. Setting debug-level logging for Red Hat Virtualization services 4.2.6. Main configuration files for Red Hat Virtualization services 4.2.7. Setting Up a Host Logging Server 4.2.8. Enabling SyslogHandler to pass RHV Manager logs to a remote syslog server A. VDSM Service and Hooks Expand section "A. VDSM Service and Hooks" Collapse section "A. VDSM Service and Hooks" A.1. Installing a VDSM hook A.2. Supported VDSM Events A.3. The VDSM Hook Environment A.4. The VDSM Hook Domain XML Object A.5. Defining Custom Properties A.6. Setting Virtual Machine Custom Properties A.7. Evaluating Virtual Machine Custom Properties in a VDSM Hook A.8. Using the VDSM Hooking Module A.9. VDSM Hook Execution A.10. VDSM Hook Return Codes A.11. VDSM Hook Examples B. Custom Network Properties Expand section "B. Custom Network Properties" Collapse section "B. Custom Network Properties" B.1. Explanation of bridge_opts Parameters B.2. How to Set Up Red Hat Virtualization Manager to Use Ethtool B.3. How to Set Up Red Hat Virtualization Manager to Use FCoE C. Red Hat Virtualization User Interface Plugins Expand section "C. Red Hat Virtualization User Interface Plugins" Collapse section "C. Red Hat Virtualization User Interface Plugins" C.1. About Red Hat Virtualization User Interface Plug-ins C.2. Red Hat Virtualization User Interface Plugin Lifecycle Expand section "C.2. Red Hat Virtualization User Interface Plugin Lifecycle" Collapse section "C.2. Red Hat Virtualization User Interface Plugin Lifecycle" C.2.1. Red Hat Virtualization User Interface Plug-in Discovery C.2.2. Red Hat Virtualization User Interface Plug-in Loading C.2.3. Red Hat Virtualization User Interface Plug-in Bootstrapping C.3. User Interface Plugin-related Files and Their Locations C.4. Example User Interface Plug-in Deployment D. Enabling FIPS in Red Hat Virtualization Expand section "D. Enabling FIPS in Red Hat Virtualization" Collapse section "D. Enabling FIPS in Red Hat Virtualization" D.1. Enabling FIPS in a self-hosted engine D.2. Enabling FIPS in RHV hosts and the standalone Manager D.3. Additional resources E. Red Hat Virtualization and encrypted communication Expand section "E. Red Hat Virtualization and encrypted communication" Collapse section "E. Red Hat Virtualization and encrypted communication" E.1. Replacing the Red Hat Virtualization Manager CA Certificate Expand section "E.1. Replacing the Red Hat Virtualization Manager CA Certificate" Collapse section "E.1. Replacing the Red Hat Virtualization Manager CA Certificate" E.1.1. Extracting the Certificate and Private Key from a P12 Bundle E.1.2. Replacing the Red Hat Virtualization Manager Apache CA Certificate E.2. Setting Up Encrypted Communication between the Manager and an LDAP Server E.3. Enabling encrypted VNC consoles for FIPS Expand section "E.3. Enabling encrypted VNC consoles for FIPS" Collapse section "E.3. Enabling encrypted VNC consoles for FIPS" E.3.1. Configuring the cluster to enable VNC Encryption E.3.2. Running the VNC SASL Ansible playbook for each host E.3.3. Configuring the Remote Viewer to trust the Manager’s CA certificate F. Proxies Expand section "F. Proxies" Collapse section "F. Proxies" F.1. SPICE Proxy Expand section "F.1. SPICE Proxy" Collapse section "F.1. SPICE Proxy" F.1.1. SPICE Proxy Overview F.1.2. SPICE Proxy Machine Setup F.1.3. Turning On a SPICE Proxy F.1.4. Turning Off a SPICE Proxy F.2. Squid Proxy Expand section "F.2. Squid Proxy" Collapse section "F.2. Squid Proxy" F.2.1. Installing and Configuring a Squid Proxy F.3. Websocket Proxy Expand section "F.3. Websocket Proxy" Collapse section "F.3. Websocket Proxy" F.3.1. Websocket Proxy Overview G. Branding Expand section "G. Branding" Collapse section "G. Branding" G.1. Branding Expand section "G.1. Branding" Collapse section "G.1. Branding" G.1.1. Re-Branding the Manager G.1.2. Login Screen G.1.3. Administration Portal Screen G.1.4. VM Portal Screen G.1.5. Pop-Up Windows G.1.6. Tabs G.1.7. The Welcome Page G.1.8. The Page Not Found Page H. System Accounts Expand section "H. System Accounts" Collapse section "H. System Accounts" H.1. Red Hat Virtualization Manager User Accounts H.2. Red Hat Virtualization Manager Groups H.3. Virtualization Host User Accounts H.4. Virtualization Host Groups I. Legal notice Settings Close Language: 한국어 简体中文 日本語 English Language: 한국어 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 한국어 简体中文 日本語 English Language: 한국어 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF D.3. Additional resources Installing Red Hat Virtualization Hosts Configuring and Applying SCAP Policies During Installation Installers and Images for Red Hat Virtualization Manager (v. 4.4 for x86_64) Security policies available in the SCAP Security Guide Security Hardening for Red Hat Enterprise Linux 8 Previous Next