Product SiteDocumentation Site

Red Hat Enterprise Virtualization 3.6

Technical Reference

The Technical Architecture of Red Hat Enterprise Virtualization Environments

Red Hat Enterprise Virtualization Documentation Team

Red Hat Customer Content Services

Abstract

This reference documents the concepts, components, and technologies used in a Red Hat Enterprise Virtualization environment.
1. Introduction
1.1. Red Hat Enterprise Virtualization Manager
1.2. Red Hat Virtualization Hypervisor
1.3. Interfaces for Accessing the Manager
1.4. Components that Support the Manager
1.5. Storage
1.6. Network
1.7. Data Centers
2. Storage
2.1. Storage Domains Overview
2.2. Types of Storage Backing Storage Domains
2.3. Storage Domain Types
2.4. Storage Formats for Virtual Machine Disk Images
2.5. Virtual Machine Disk Image Storage Allocation Policies
2.6. Storage Metadata Versions in Red Hat Enterprise Virtualization
2.7. Storage Domain Autorecovery in Red Hat Enterprise Virtualization
2.8. The Storage Pool Manager
2.9. Storage Pool Manager Selection Process
2.10. Exclusive Resources and Sanlock in Red Hat Enterprise Virtualization
2.11. Thin Provisioning and Storage Over-Commitment
2.12. Logical Volume Extension
3. Network
3.1. Network Architecture
3.2. Introduction: Basic Networking Terms
3.3. Network Interface Controller
3.4. Bridge
3.5. Bonds
3.6. Switch Configuration for Bonding
3.7. Virtual Network Interface Cards
3.8. Virtual LAN (VLAN)
3.9. Network Labels
3.10. Cluster Networking
3.11. Logical Networks
3.12. Required Networks, Optional Networks, and Virtual Machine Networks
3.13. Virtual Machine Connectivity
3.14. Port Mirroring
3.15. Host Networking Configurations
3.16. Bridge Configuration
3.17. VLAN Configuration
3.18. Bridge and Bond Configuration
3.19. Multiple Bridge, Multiple VLAN, and NIC Configuration
3.20. Multiple Bridge, Multiple VLAN, and Bond Configuration
4. Power Management
4.1. Introduction to Power Management and Fencing
4.2. Power Management by Proxy in Red Hat Enterprise Virtualization
4.3. Power Management
4.4. Fencing
4.5. Soft-Fencing Hosts
4.6. Using Multiple Power Management Fencing Agents
5. Load Balancing, Scheduling, and Migration
5.1. Load Balancing, Scheduling, and Migration
5.2. Load Balancing Policy
5.3. Load Balancing Policy: VM_Evenly_Distributed
5.4. Load Balancing Policy: Evenly_Distributed
5.5. Load Balancing Policy: Power_Saving
5.6. Load Balancing Policy: None
5.7. Highly Available Virtual Machine Reservation
5.8. Scheduling
5.9. Migration
6. Directory Services
6.1. Directory Services
6.2. Local Authentication: Internal Domain
6.3. Remote Authentication Using GSSAPI
7. Templates and Pools
7.1. Templates and Pools
7.2. Templates
7.3. Pools
8. Virtual Machine Snapshots
8.1. Snapshots
8.2. Live Snapshots in Red Hat Enterprise Virtualization
8.3. Snapshot Creation
8.4. Snapshot Previews
8.5. Snapshot Deletion
9. Hardware Drivers and Devices
9.1. Virtualized Hardware
9.2. Stable Device Addresses in Red Hat Enterprise Virtualization
9.3. Central Processing Unit (CPU)
9.4. System Devices
9.5. Network Devices
9.6. Graphics Devices
9.7. Storage Devices
9.8. Sound Devices
9.9. Serial Driver
9.10. Balloon Driver
10. Minimum Requirements and Technical Limitations
10.1. Minimum Requirements and Supported Limits
10.2. Data Center Limitations
10.3. Cluster Limitations
10.4. Storage Domain Limitations
10.5. Red Hat Enterprise Virtualization Manager Limitations
10.6. Hypervisor Requirements
10.7. Guest Requirements and Support Limits
10.8. SPICE Limitations
10.9. Additional References
A. Revision History