Red_Hat_Enterprise_Linux-6-Virtualization_Getting_Started_Guide-en-US.pdf

(255 KB) Pobierz
Red Hat Enterprise Linux 6
Virtualization Getting
Started Guide
Virtualization Documentation
817139063.015.png 817139063.016.png 817139063.017.png 817139063.018.png 817139063.001.png 817139063.002.png
Virtualization Getting Started Guide
Red Hat Enterprise Linux 6 Virtualization Getting Started Guide
Virtualization Documentation
Edition 0.2
Author
Copyright © 2011 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available
at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this
document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity
Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux ® is the registered trademark of Linus Torvalds in the United States and other countries.
Java ® is a registered trademark of Oracle and/or its affiliates.
XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other
countries.
All other trademarks are the property of their respective owners.
1801 Varsity Drive
Raleigh, NC 27606-2072 USA
Phone: +1 919 754 3700
Phone: 888 733 4281
Fax: +1 919 754 3701
The Red Hat Enterprise Linux Virtualization Getting Started Guide describes the basics of
virtualization and the virtualization products and technologies that are available with Red Hat
Enterprise Linux.
817139063.003.png 817139063.004.png 817139063.005.png
1. Document Conventions ................................................................................................... v
1.1. Typographic Conventions ...................................................................................... v
1.2. Pull-quote Conventions ........................................................................................ vi
1.3. Notes and Warnings ............................................................................................ vii
2. Getting Help and Giving Feedback ................................................................................. vii
2.1. Do You Need Help? ............................................................................................ vii
2.2. We Need Feedback! ........................................................................................... viii
1.1. Who should read this guide? ........................................................................................ 1
1.2. Red Hat Enterprise Virtualization (RHEV) ...................................................................... 1
2.1. What is virtualization? .................................................................................................. 3
2.2. Migration ...................................................................................................................... 3
2.3. Virtualized to virtualized migration (V2V) ........................................................................ 4
3.1. Virtualization costs ....................................................................................................... 5
3.2. Virtualization learning curve .......................................................................................... 5
3.3. Performance ................................................................................................................ 5
3.4. Disaster recovery ......................................................................................................... 6
3.5. Security ....................................................................................................................... 6
3.5.1. Virtualization security features ............................................................................ 6
3.6. Virtualization for servers and individuals ........................................................................ 7
4.1. KVM and virtualization in Red Hat Enterprise Linux ........................................................ 9
4.2. libvirt and the libvirt tools ............................................................................................ 10
4.3. Virtualized hardware devices ....................................................................................... 11
4.3.1. Virtualized and emulated devices ...................................................................... 11
4.3.2. Para-virtualized drivers ..................................................................................... 13
4.3.3. Physical host devices ...................................................................................... 14
4.3.4. Guest CPU models .......................................................................................... 15
4.4. Storage ...................................................................................................................... 16
4.4.1. Storage pools .................................................................................................. 17
5.1. virsh ....................................................................................................................... 19
5.2. virt-manager .......................................................................................................... 19
5.3. virt-install .......................................................................................................... 19
5.4. guestfish ................................................................................................................ 19
5.5. Other useful tools ....................................................................................................... 20
iii
817139063.006.png 817139063.007.png 817139063.008.png
iv
817139063.009.png 817139063.010.png 817139063.011.png
Preface
1. Document Conventions
This manual uses several conventions to highlight certain words and phrases and draw attention to
specific pieces of information.
In PDF and paper editions, this manual uses typefaces drawn from the Liberation Fonts 1 set. The
Liberation Fonts set is also used in HTML editions if the set is installed on your system. If not,
alternative but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later includes
the Liberation Fonts set by default.
1.1. Typographic Conventions
Four typographic conventions are used to call attention to specific words and phrases. These
conventions, and the circumstances they apply to, are as follows.
Mono-spaced Bold
Used to highlight system input, including shell commands, file names and paths. Also used to highlight
keycaps and key combinations. For example:
To see the contents of the file my_next_bestselling_novel in your current
working directory, enter the cat my_next_bestselling_novel command at the
shell prompt and press Enter to execute the command.
The above includes a file name, a shell command and a keycap, all presented in mono-spaced bold
and all distinguishable thanks to context.
Key combinations can be distinguished from keycaps by the hyphen connecting each part of a key
combination. For example:
Press Enter to execute the command.
Press Ctrl + Alt + F2 to switch to the first virtual terminal. Press Ctrl + Alt + F1 to
return to your X-Windows session.
The first paragraph highlights the particular keycap to press. The second highlights two key
combinations (each a set of three keycaps with each set pressed simultaneously).
If source code is discussed, class names, methods, functions, variable names and returned values
mentioned within a paragraph will be presented as above, in mono-spaced bold . For example:
File-related classes include filesystem for file systems, file for files, and dir for
directories. Each class has its own associated set of permissions.
Proportional Bold
This denotes words or phrases encountered on a system, including application names; dialog box text;
labeled buttons; check-box and radio button labels; menu titles and sub-menu titles. For example:
Choose System
Mouse from the main menu bar to launch Mouse
Preferences . In the Buttons tab, click the Left-handed mouse check box and click
Preferences
®
®
v
817139063.012.png 817139063.013.png 817139063.014.png
 
Zgłoś jeśli naruszono regulamin