Red_Hat_Enterprise_Linux-6-Virtualization_Getting_Started_Guide-en-US.pdf
(
255 KB
)
Pobierz
Red Hat Enterprise Linux 6
Virtualization Getting
Started Guide
Virtualization Documentation
Virtualization Getting Started Guide
Red Hat Enterprise Linux 6 Virtualization Getting Started Guide
Virtualization Documentation
Edition 0.2
Author
Copyright
©
2011 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available
at
http://creativecommons.org/licenses/by-sa/3.0/
. In accordance with CC-BY-SA, if you distribute this
document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity
Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux
®
is the registered trademark of Linus Torvalds in the United States and other countries.
Java
®
is a registered trademark of Oracle and/or its affiliates.
XFS
®
is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL
®
is a registered trademark of MySQL AB in the United States, the European Union and other
countries.
All other trademarks are the property of their respective owners.
1801 Varsity Drive
Raleigh, NC 27606-2072 USA
Phone: +1 919 754 3700
Phone: 888 733 4281
Fax: +1 919 754 3701
The Red Hat Enterprise Linux Virtualization Getting Started Guide describes the basics of
virtualization and the virtualization products and technologies that are available with Red Hat
Enterprise Linux.
Preface
v
1. Document Conventions
...................................................................................................
v
1.1. Typographic Conventions
......................................................................................
v
1.2. Pull-quote Conventions
........................................................................................
vi
1.3. Notes and Warnings
............................................................................................
vii
2. Getting Help and Giving Feedback
.................................................................................
vii
2.1. Do You Need Help?
............................................................................................
vii
2.2. We Need Feedback!
...........................................................................................
viii
1. Introduction
1
1.1. Who should read this guide?
........................................................................................
1
1.2. Red Hat Enterprise Virtualization (RHEV)
......................................................................
1
2. Getting started with Virtualization
3
2.1. What is virtualization?
..................................................................................................
3
2.2. Migration
......................................................................................................................
3
2.3. Virtualized to virtualized migration (V2V)
........................................................................
4
3. Advantages and misconceptions of virtualization
5
3.1. Virtualization costs
.......................................................................................................
5
3.2. Virtualization learning curve
..........................................................................................
5
3.3. Performance
................................................................................................................
5
3.4. Disaster recovery
.........................................................................................................
6
3.5. Security
.......................................................................................................................
6
3.5.1. Virtualization security features
............................................................................
6
3.6. Virtualization for servers and individuals
........................................................................
7
4. Introduction to Red Hat virtualization products
9
4.1. KVM and virtualization in Red Hat Enterprise Linux
........................................................
9
4.2. libvirt and the libvirt tools
............................................................................................
10
4.3. Virtualized hardware devices
.......................................................................................
11
4.3.1. Virtualized and emulated devices
......................................................................
11
4.3.2. Para-virtualized drivers
.....................................................................................
13
4.3.3. Physical host devices
......................................................................................
14
4.3.4. Guest CPU models
..........................................................................................
15
4.4. Storage
......................................................................................................................
16
4.4.1. Storage pools
..................................................................................................
17
5. Virtualization Tools
19
5.1.
virsh
.......................................................................................................................
19
5.2.
virt-manager
..........................................................................................................
19
5.3.
virt-install
..........................................................................................................
19
5.4.
guestfish
................................................................................................................
19
5.5. Other useful tools
.......................................................................................................
20
A. Revision History
25
iii
iv
Preface
1. Document Conventions
This manual uses several conventions to highlight certain words and phrases and draw attention to
specific pieces of information.
In PDF and paper editions, this manual uses typefaces drawn from the
Liberation Fonts
1
set. The
Liberation Fonts set is also used in HTML editions if the set is installed on your system. If not,
alternative but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later includes
the Liberation Fonts set by default.
1.1. Typographic Conventions
Four typographic conventions are used to call attention to specific words and phrases. These
conventions, and the circumstances they apply to, are as follows.
Mono-spaced Bold
Used to highlight system input, including shell commands, file names and paths. Also used to highlight
keycaps and key combinations. For example:
To see the contents of the file
my_next_bestselling_novel
in your current
working directory, enter the
cat my_next_bestselling_novel
command at the
shell prompt and press
Enter
to execute the command.
The above includes a file name, a shell command and a keycap, all presented in mono-spaced bold
and all distinguishable thanks to context.
Key combinations can be distinguished from keycaps by the hyphen connecting each part of a key
combination. For example:
Press
Enter
to execute the command.
Press
Ctrl
+
Alt
+
F2
to switch to the first virtual terminal. Press
Ctrl
+
Alt
+
F1
to
return to your X-Windows session.
The first paragraph highlights the particular keycap to press. The second highlights two key
combinations (each a set of three keycaps with each set pressed simultaneously).
If source code is discussed, class names, methods, functions, variable names and returned values
mentioned within a paragraph will be presented as above, in
mono-spaced bold
. For example:
File-related classes include
filesystem
for file systems,
file
for files, and
dir
for
directories. Each class has its own associated set of permissions.
Proportional Bold
This denotes words or phrases encountered on a system, including application names; dialog box text;
labeled buttons; check-box and radio button labels; menu titles and sub-menu titles. For example:
Choose
System
Mouse
from the main menu bar to launch
Mouse
Preferences
. In the
Buttons
tab, click the
Left-handed mouse
check box and click
Preferences
®
®
1
https://fedorahosted.org/liberation-fonts/
v
Plik z chomika:
meganbit
Inne pliki z tego folderu:
Red_Hat_Enterprise_Linux-6-Deployment_Guide-en-US.pdf
(12267 KB)
Red_Hat_Enterprise_Linux-6-Developer_Guide-en-US.pdf
(2571 KB)
Red_Hat_Enterprise_Linux-6-Global_File_System_2-en-US.pdf
(506 KB)
Red_Hat_Enterprise_Linux-6-Hypervisor_Deployment_Guide-en-US.pdf
(696 KB)
Red_Hat_Enterprise_Linux-6-Identity_Management_Guide-en-US.pdf
(5031 KB)
Inne foldery tego chomika:
Analiza matematyczna
angielski
Automatyka
Nowy folder
Zgłoś jeśli
naruszono regulamin