Product SiteDocumentation Site

Red Hat Virtualization 4.1

Administration Guide

Administration Tasks in Red Hat Virtualization

Red Hat Virtualization Documentation Team

Red Hat Customer Content Services

Abstract

This book contains information and procedures relevant to Red Hat Virtualization administrators.
I. Administering and Maintaining the Red Hat Virtualization Environment
1. Global Configuration
1.1. Roles
1.1.1. Creating a New Role
1.1.2. Editing or Copying a Role
1.1.3. User Role and Authorization Examples
1.2. System Permissions
1.2.1. User Properties
1.2.2. User and Administrator Roles
1.2.3. User Roles Explained
1.2.4. Administrator Roles Explained
1.3. Scheduling Policies
1.3.1. Creating a Scheduling Policy
1.3.2. Explanation of Settings in the New Scheduling Policy and Edit Scheduling Policy Window
1.4. Instance Types
1.4.1. Creating Instance Types
1.4.2. Editing Instance Types
1.4.3. Removing Instance Types
1.5. MAC Address Pools
1.5.1. Creating MAC Address Pools
1.5.2. Editing MAC Address Pools
1.5.3. Editing MAC Address Pool Permissions
1.5.4. Removing MAC Address Pools
2. Dashboard
2.1. Prerequisites
2.2. Global Inventory
2.3. Global Utilization
2.3.1. Top Utilized Resources
2.4. Cluster Utilization
2.4.1. CPU
2.4.2. Memory
2.5. Storage Utilization
II. Administering the Resources
3. Quality of Service
3.1. Storage Quality of Service
3.1.1. Creating a Storage Quality of Service Entry
3.1.2. Removing a Storage Quality of Service Entry
3.2. Virtual Machine Network Quality of Service
3.2.1. Creating a Virtual Machine Network Quality of Service Entry
3.2.2. Settings in the New Virtual Machine Network QoS and Edit Virtual Machine Network QoS Windows Explained
3.2.3. Removing a Virtual Machine Network Quality of Service Entry
3.3. Host Network Quality of Service
3.3.1. Creating a Host Network Quality of Service Entry
3.3.2. Settings in the New Host Network Quality of Service and Edit Host Network Quality of Service Windows Explained
3.3.3. Removing a Host Network Quality of Service Entry
3.4. CPU Quality of Service
3.4.1. Creating a CPU Quality of Service Entry
3.4.2. Removing a CPU Quality of Service Entry
4. Data Centers
4.1. Introduction to Data Centers
4.2. The Storage Pool Manager
4.3. SPM Priority
4.4. Using the Events Tab to Identify Problem Objects in Data Centers
4.5. Data Center Tasks
4.5.1. Creating a New Data Center
4.5.2. Explanation of Settings in the New Data Center and Edit Data Center Windows
4.5.3. Re-Initializing a Data Center: Recovery Procedure
4.5.4. Removing a Data Center
4.5.5. Force Removing a Data Center
4.5.6. Changing the Data Center Storage Type
4.5.7. Changing the Data Center Compatibility Version
4.6. Data Centers and Storage Domains
4.6.1. Attaching an Existing Data Domain to a Data Center
4.6.2. Attaching an Existing ISO domain to a Data Center
4.6.3. Attaching an Existing Export Domain to a Data Center
4.6.4. Detaching a Storage Domain from a Data Center
4.7. Data Centers and Permissions
4.7.1. Managing System Permissions for a Data Center
4.7.2. Data Center Administrator Roles Explained
4.7.3. Assigning an Administrator or User Role to a Resource
4.7.4. Removing an Administrator or User Role from a Resource
5. Clusters
5.1. Introduction to Clusters
5.2. Cluster Tasks
5.2.1. Creating a New Cluster
5.2.2. Explanation of Settings and Controls in the New Cluster and Edit Cluster Windows
5.2.3. Editing a Resource
5.2.4. Setting Load and Power Management Policies for Hosts in a Cluster
5.2.5. Updating the MoM Policy on Hosts in a Cluster
5.2.6. CPU Profiles
5.2.7. Importing an Existing Red Hat Gluster Storage Cluster
5.2.8. Explanation of Settings in the Add Hosts Window
5.2.9. Removing a Cluster
5.2.10. Changing the Cluster Compatibility Version
5.3. Clusters and Permissions
5.3.1. Managing System Permissions for a Cluster
5.3.2. Cluster Administrator Roles Explained
5.3.3. Assigning an Administrator or User Role to a Resource
5.3.4. Removing an Administrator or User Role from a Resource
6. Logical Networks
6.1. Logical Network Tasks
6.1.1. Using the Networks Tab
6.1.2. Creating a New Logical Network in a Data Center or Cluster
6.1.3. Editing a Logical Network
6.1.4. Removing a Logical Network
6.1.5. Viewing or Editing the Gateway for a Logical Network
6.1.6. Explanation of Settings and Controls in the New Logical Network and Edit Logical Network Windows
6.1.7. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window
6.1.8. Explanation of Settings in the Manage Networks Window
6.1.9. Editing the Virtual Function Configuration on a NIC
6.2. Virtual Network Interface Cards
6.2.1. vNIC Profile Overview
6.2.2. Creating or Editing a vNIC Profile
6.2.3. Explanation of Settings in the VM Interface Profile Window
6.2.4. Enabling Passthrough on a vNIC Profile
6.2.5. Removing a vNIC Profile
6.2.6. Assigning Security Groups to vNIC Profiles
6.2.7. User Permissions for vNIC Profiles
6.2.8. Configuring vNIC Profiles for UCS Integration
6.3. External Provider Networks
6.3.1. Importing Networks From External Providers
6.3.2. Limitations to Using External Provider Networks
6.3.3. Configuring Subnets on External Provider Logical Networks
6.4. Logical Networks and Permissions
6.4.1. Managing System Permissions for a Network
6.4.2. Network Administrator and User Roles Explained
6.4.3. Assigning an Administrator or User Role to a Resource
6.4.4. Removing an Administrator or User Role from a Resource
6.5. Hosts and Networking
6.5.1. Refreshing Host Capabilities
6.5.2. Editing Host Network Interfaces and Assigning Logical Networks to Hosts
6.5.3. Adding Multiple VLANs to a Single Network Interface Using Logical Networks
6.5.4. Assigning Additional IPv4 Addresses to a Host Network
6.5.5. Adding Network Labels to Host Network Interfaces
6.5.6. Bonds
6.5.7. Changing the FQDN of a Host
7. Hosts
7.1. Introduction to Hosts
7.2. Red Hat Virtualization Host
7.3. Red Hat Enterprise Linux Hosts
7.4. Satellite Host Provider Hosts
7.5. Host Tasks
7.5.1. Adding a Host to the Red Hat Virtualization Manager
7.5.2. Adding a Satellite Host Provider Host
7.5.3. Configuring Satellite Errata Management for a Host
7.5.4. Adding a Red Hat OpenStack Platform Network Node as a Host
7.5.5. Explanation of Settings and Controls in the New Host and Edit Host Windows
7.5.6. Configuring Host Power Management Settings
7.5.7. Configuring Host Storage Pool Manager Settings
7.5.8. Moving a Host to Maintenance Mode
7.5.9. Activating a Host from Maintenance Mode
7.5.10. Removing a Host
7.5.11. Updating a Host Between Minor Releases
7.5.12. Reinstalling Hosts
7.5.13. Customizing Hosts with Tags
7.5.14. Viewing Host Errata
7.5.15. Viewing the Health Status of a Host
7.5.16. Viewing Host Devices
7.5.17. Preparing Host and Guest Systems for GPU Passthrough
7.5.18. Accessing Cockpit from the Administration Portal
7.6. Host Resilience
7.6.1. Host High Availability
7.6.2. Power Management by Proxy in Red Hat Virtualization
7.6.3. Setting Fencing Parameters on a Host
7.6.4. fence_kdump Advanced Configuration
7.6.5. Soft-Fencing Hosts
7.6.6. Using Host Power Management Functions
7.6.7. Manually Fencing or Isolating a Non Responsive Host
7.7. Hosts and Permissions
7.7.1. Managing System Permissions for a Host
7.7.2. Host Administrator Roles Explained
7.7.3. Assigning an Administrator or User Role to a Resource
7.7.4. Removing an Administrator or User Role from a Resource
8. Storage
8.1. Understanding Storage Domains
8.2. Preparing and Adding NFS Storage
8.2.1. Preparing NFS Storage
8.2.2. Attaching NFS Storage
8.2.3. Increasing NFS Storage
8.3. Preparing and Adding Local Storage
8.3.1. Preparing Local Storage
8.3.2. Adding Local Storage
8.4. Adding POSIX Compliant File System Storage
8.4.1. Attaching POSIX Compliant File System Storage
8.5. Adding Block Storage
8.5.1. Adding iSCSI Storage
8.5.2. Configuring iSCSI Multipathing
8.5.3. Adding FCP Storage
8.5.4. Increasing iSCSI or FCP Storage
8.5.5. Unusable LUNs in Red Hat Virtualization
8.6. Importing Existing Storage Domains
8.6.1. Overview of Importing Existing Storage Domains
8.6.2. Importing Storage Domains
8.6.3. Migrating Storage Domains between Data Centers in the Same Environment
8.6.4. Migrating Storage Domains between Data Centers in Different Environments
8.6.5. Importing Virtual Machines from Imported Data Storage Domains
8.6.6. Importing Templates from Imported Data Storage Domains
8.6.7. Importing a Disk Image from an Imported Storage Domain
8.6.8. Importing an Unregistered Disk Image from an Imported Storage Domain
8.7. Storage Tasks
8.7.1. Populating the ISO Storage Domain
8.7.2. Moving Storage Domains to Maintenance Mode
8.7.3. Editing Storage Domains
8.7.4. Activating Storage Domains from Maintenance Mode
8.7.5. Removing a Storage Domain
8.7.6. Destroying a Storage Domain
8.7.7. Detaching a Storage Domain from a Data Center
8.7.8. Attaching a Storage Domain to a Data Center
8.7.9. Disk Profiles
8.7.10. Viewing the Health Status of a Storage Domain
8.7.11. Setting Discard After Delete for a Storage Domain
8.8. Storage and Permissions
8.8.1. Managing System Permissions for a Storage Domain
8.8.2. Storage Administrator Roles Explained
8.8.3. Assigning an Administrator or User Role to a Resource
8.8.4. Removing an Administrator or User Role from a Resource
9. Working with Red Hat Gluster Storage
9.1. Red Hat Gluster Storage Nodes
9.1.1. Adding Red Hat Gluster Storage Nodes
9.1.2. Removing a Red Hat Gluster Storage Node
9.2. Using Red Hat Gluster Storage as a Storage Domain
9.2.1. Introduction to Red Hat Gluster Storage (GlusterFS) Volumes
9.2.2. Gluster Storage Terminology
9.2.3. Attaching a Red Hat Gluster Storage Volume as a Storage Domain
9.2.4. Creating a Storage Volume
9.2.5. Adding Bricks to a Volume
9.2.6. Explanation of Settings in the Add Bricks Window
9.2.7. Optimizing Red Hat Gluster Storage Volumes to Store Virtual Machine Images
9.2.8. Starting Volumes
9.2.9. Tuning Volumes
9.2.10. Editing Volume Options
9.2.11. Reset Volume Options
9.2.12. Removing Bricks from a Volume
9.2.13. Stopping Red Hat Gluster Storage Volumes
9.2.14. Deleting Red Hat Gluster Storage Volumes
9.2.15. Rebalancing Volumes
9.3. Clusters and Gluster Hooks
9.3.1. Managing Gluster Hooks
9.3.2. Listing Hooks
9.3.3. Viewing the Content of Hooks
9.3.4. Enabling or Disabling Hooks
9.3.5. Refreshing Hooks
9.3.6. Resolving Conflicts
9.3.7. Resolving Content Conflicts
9.3.8. Resolving Missing Hook Conflicts
9.3.9. Resolving Status Conflicts
9.3.10. Resolving Multiple Conflicts
9.3.11. Managing Gluster Sync
10. Pools
10.1. Introduction to Virtual Machine Pools
10.2. Virtual Machine Pool Tasks
10.2.1. Creating a Virtual Machine Pool
10.2.2. Explanation of Settings and Controls in the New Pool and Edit Pool Windows
10.2.3. Editing a Virtual Machine Pool
10.2.4. Removing a Virtual Machine Pool
10.3. Pools and Permissions
10.3.1. Managing System Permissions for a Virtual Machine Pool
10.3.2. Virtual Machine Pool Administrator Roles Explained
10.3.3. Assigning an Administrator or User Role to a Resource
10.3.4. Removing an Administrator or User Role from a Resource
10.4. Trusted Compute Pools
10.4.1. Connecting an OpenAttestation Server to the Manager
10.4.2. Creating a Trusted Cluster
10.4.3. Adding a Trusted Host
11. Virtual Disks
11.1. Understanding Virtual Machine Storage
11.2. Understanding Virtual Disks
11.3. Settings to Wipe Virtual Disks After Deletion
11.4. Shareable Disks in Red Hat Virtualization
11.5. Read Only Disks in Red Hat Virtualization
11.6. Virtual Disk Tasks
11.6.1. Creating a Virtual Disk
11.6.2. Explanation of Settings in the New Virtual Disk Window
11.6.3. Overview of Live Storage Migration
11.6.4. Moving a Virtual Disk
11.6.5. Changing the Disk Interface Type
11.6.6. Copying a Virtual Disk
11.6.7. Uploading and Downloading a Disk Image to a Storage Domain
11.6.8. Importing a Disk Image from an Imported Storage Domain
11.6.9. Importing an Unregistered Disk Image from an Imported Storage Domain
11.6.10. Importing a Virtual Disk Image from an OpenStack Image Service
11.6.11. Exporting a Virtual Disk to an OpenStack Image Service
11.6.12. Reclaiming Virtual Disk Space
11.7. Virtual Disks and Permissions
11.7.1. Managing System Permissions for a Virtual Disk
11.7.2. Virtual Disk User Roles Explained
11.7.3. Assigning an Administrator or User Role to a Resource
11.7.4. Removing an Administrator or User Role from a Resource
12. External Providers
12.1. Introduction to External Providers in Red Hat Virtualization
12.2. Adding External Providers
12.2.1. Adding a Red Hat Satellite Instance for Host Provisioning
12.2.2. Adding an OpenStack Image (Glance) Instance for Image Management
12.2.3. Adding an OpenStack Networking (Neutron) Instance for Network Provisioning
12.2.4. Adding an OpenStack Volume (Cinder) Instance for Storage Management
12.2.5. Adding a VMware Instance as a Virtual Machine Provider
12.2.6. Adding a Xen Host as a Virtual Machine Provider
12.2.7. Adding a KVM Host as a Virtual Machine Provider
12.2.8. Adding an External Network Provider
12.2.9. Adding Open Virtual Network (OVN) as an External Network Provider
12.2.10. Add Provider General Settings Explained
12.2.11. Add Provider Agent Configuration Settings Explained
12.3. Editing External Providers
12.3.1. Editing an External Provider
12.4. Removing External Providers
12.4.1. Removing an External Provider
III. Administering the Environment
13. Backups and Migration
13.1. Backing Up and Restoring the Red Hat Virtualization Manager
13.1.1. Backing up Red Hat Virtualization Manager - Overview
13.1.2. Syntax for the engine-backup Command
13.1.3. Creating a Backup with the engine-backup Command
13.1.4. Restoring a Backup with the engine-backup Command
13.1.5. Restoring a Backup to a Fresh Installation
13.1.6. Restoring a Backup to Overwrite an Existing Installation
13.1.7. Restoring a Backup with Different Credentials
13.1.8. Migrating the Engine Database to a Remote Server Database
13.2. Backing Up and Restoring Virtual Machines Using the Backup and Restore API
13.2.1. The Backup and Restore API
13.2.2. Backing Up a Virtual Machine
13.2.3. Restoring a Virtual Machine
14. Errata Management with Red Hat Satellite
15. Automating Configuration Tasks using Ansible
15.1. Ansible Roles
15.1.1. Installing Ansible Roles
15.1.2. Using Ansible Roles to Configure Red Hat Virtualization
16. Users and Roles
16.1. Introduction to Users
16.2. Introduction to Directory Servers
16.3. Configuring an External LDAP Provider
16.3.1. Configuring an External LDAP Provider (Interactive Setup)
16.3.2. Attaching an Active Directory
16.3.3. Configuring an External LDAP Provider (Manual Method)
16.3.4. Removing an External LDAP Provider
16.4. Configuring LDAP and Kerberos for Single Sign-on
16.5. User Authorization
16.5.1. User Authorization Model
16.5.2. User Actions
16.6. Administering User Tasks From the Administration Portal
16.6.1. Adding Users and Assigning User Portal Permissions
16.6.2. Viewing User Information
16.6.3. Viewing User Permissions on Resources
16.6.4. Removing Users
16.6.5. Viewing Logged-In Users
16.6.6. Terminating a User Session
16.7. Administering User Tasks From the Command Line
16.7.1. Managing Users
16.7.2. Changing the Password for the Internal Administrative User
16.7.3. Disabling the Internal Administrative User
16.7.4. Managing Groups
16.7.5. Querying Users and Groups
16.7.6. Managing Account Settings
16.8. Configuring Additional Local Domains
17. Quotas and Service Level Agreement Policy
17.1. Introduction to Quota
17.2. Shared Quota and Individually Defined Quota
17.3. Quota Accounting
17.4. Enabling and Changing a Quota Mode in a Data Center
17.5. Creating a New Quota Policy
17.6. Explanation of Quota Threshold Settings
17.7. Assigning a Quota to an Object
17.8. Using Quota to Limit Resources by User
17.9. Editing Quotas
17.10. Removing Quotas
17.11. Service Level Agreement Policy Enforcement
18. Event Notifications
18.1. Configuring Event Notifications in the Administration Portal
18.2. Canceling Event Notifications in the Administration Portal
18.3. Parameters for Event Notifications in ovirt-engine-notifier.conf
18.4. Configuring the Red Hat Virtualization Manager to Send SNMP Traps
19. Utilities
19.1. The oVirt Engine Rename Tool
19.1.1. The oVirt Engine Rename Tool
19.1.2. Syntax for the oVirt Engine Rename Command
19.1.3. Using the oVirt Engine Rename Tool
19.2. The Engine Configuration Tool
19.2.1. The Engine Configuration Tool
19.2.2. Syntax for the engine-config Command
19.3. The Image Uploader Tool
19.3.1. The Image Uploader Tool
19.4. The USB Filter Editor
19.4.1. Installing the USB Filter Editor
19.4.2. The USB Filter Editor Interface
19.4.3. Adding a USB Policy
19.4.4. Removing a USB Policy
19.4.5. Searching for USB Device Policies
19.4.6. Exporting a USB Policy
19.4.7. Importing a USB Policy
19.5. The Log Collector Tool
19.5.1. Log Collector
19.5.2. Syntax for the ovirt-log-collector Command
19.5.3. Basic Log Collector Usage
19.6. The ISO Uploader Tool
19.6.1. The ISO Uploader Tool
19.6.2. Syntax for the engine-iso-uploader Command
19.6.3. Specifying an NFS Server
19.6.4. Basic ISO Uploader Usage
19.6.5. Uploading the VirtIO and Guest Tool Image Files to an ISO Storage Domain
19.6.6. VirtIO and Guest Tool Image Files
19.7. The Engine Vacuum Tool
19.7.1. The Engine Vacuum Tool
19.7.2. Engine Vacuum Modes
19.7.3. Syntax for the Engine Vacuum
IV. Gathering Information About the Environment
20. Log Files
20.1. Red Hat Virtualization Manager Installation Log Files
20.2. Red Hat Virtualization Manager Log Files
20.3. SPICE Log Files
20.3.1. SPICE Logs for Hypervisor SPICE Servers
20.3.2. SPICE Logs for Guest Machines
20.3.3. SPICE Logs for SPICE Clients Launched Using console.vv Files
20.4. Red Hat Virtualization Host Log Files
20.5. Setting Up a Virtualization Host Logging Server
21. Proxies
21.1. SPICE Proxy
21.1.1. SPICE Proxy Overview
21.1.2. SPICE Proxy Machine Setup
21.1.3. Turning on SPICE Proxy
21.1.4. Turning Off a SPICE Proxy
21.2. Squid Proxy
21.2.1. Installing and Configuring a Squid Proxy
21.3. Websocket Proxy
21.3.1. Websocket Proxy Overview
21.3.2. Migrating the Websocket Proxy to a Separate Machine
A. VDSM and Hooks
A.1. VDSM
A.2. VDSM Hooks
A.3. Extending VDSM with Hooks
A.4. Supported VDSM Events
A.5. The VDSM Hook Environment
A.6. The VDSM Hook Domain XML Object
A.7. Defining Custom Properties
A.8. Setting Virtual Machine Custom Properties
A.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook
A.10. Using the VDSM Hooking Module
A.11. VDSM Hook Execution
A.12. VDSM Hook Return Codes
A.13. VDSM Hook Examples
B. Custom Network Properties
B.1. Explanation of bridge_opts Parameters
B.2. How to Set Up Red Hat Virtualization Manager to Use Ethtool
B.3. How to Set Up Red Hat Virtualization Manager to Use FCoE
B.4. How to Set Up Red Hat Virtualization Manager to Use a Non-Management Network
C. Red Hat Virtualization User Interface Plugins
C.1. Red Hat Virtualization User Interface Plug-ins
C.2. Red Hat Virtualization User Interface Plugin Lifecycle
C.2.1. Red Hat Virtualization User Interface Plug-in Life cycle
C.2.2. Red Hat Virtualization User Interface Plug-in Discovery
C.2.3. Red Hat Virtualization User Interface Plug-in Loading
C.2.4. Red Hat Virtualization User Interface Plug-in Bootstrapping
C.3. User Interface Plugin-related Files and Their Locations
C.4. Example User Interface Plug-in Deployment
C.5. Using Red Hat Support Plug-in
D. Red Hat Virtualization and SSL
D.1. Replacing the Red Hat Virtualization Manager SSL/TLS Certificate
D.2. Setting Up SSL or TLS Connections between the Manager and an LDAP Server
E. Using Search, Bookmarks, and Tags
E.1. Searches
E.1.1. Performing Searches in Red Hat Virtualization
E.1.2. Search Syntax and Examples
E.1.3. Search Auto-Completion
E.1.4. Search Result Type Options
E.1.5. Search Criteria
E.1.6. Search: Multiple Criteria and Wildcards
E.1.7. Search: Determining Search Order
E.1.8. Searching for Data Centers
E.1.9. Searching for Clusters
E.1.10. Searching for Hosts
E.1.11. Searching for Networks
E.1.12. Searching for Storage
E.1.13. Searching for Disks
E.1.14. Searching for Volumes
E.1.15. Searching for Virtual Machines
E.1.16. Searching for Pools
E.1.17. Searching for Templates
E.1.18. Searching for Users
E.1.19. Searching for Events
E.2. Bookmarks
E.2.1. Saving a Query String as a Bookmark
E.2.2. Editing a Bookmark
E.2.3. Deleting a Bookmark
E.3. Tags
E.3.1. Using Tags to Customize Interactions with Red Hat Virtualization
E.3.2. Creating a Tag
E.3.3. Modifying a Tag
E.3.4. Deleting a Tag
E.3.5. Adding and Removing Tags to and from Objects
E.3.6. Searching for Objects Using Tags
F. Branding
F.1. Branding
F.1.1. Re-Branding the Manager
F.1.2. Login Screen
F.1.3. Administration Portal Screen
F.1.4. User Portal Screen
F.1.5. Pop-Up Windows
F.1.6. Tabs
F.1.7. The Welcome Page
F.1.8. The Page Not Found Page
G. System Accounts
G.1. System Accounts
G.1.1. Red Hat Virtualization Manager User Accounts
G.1.2. Red Hat Virtualization Manager Groups
G.1.3. Virtualization Host User Accounts
G.1.4. Virtualization Host Groups