Linux Virtualization Concepts: Difference between revisions
Line 27: | Line 27: | ||
=Security and Virtualization= | =Security and Virtualization= | ||
KVM virtual machines use [[SELinux]] and sVirt to enforce security. | KVM virtual machines use [[Selinux|SELinux]] and sVirt to enforce security. | ||
=Steal Time= | =Steal Time= |
Revision as of 20:26, 23 June 2017
External
- https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Virtualization_Getting_Started_Guide/index.html
- https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Virtualization_Deployment_and_Administration_Guide/index.html
Internal
Generic Virtualization Concepts
Virtualization Solutions from Red Hat
RHEL 7 includes a hypervisor and a number of virtualization tools, which allows running guest operating systems, so it can function as a virtualization platform. However, the solution supports a limited number of guests per host and a limited range of guest types. Red Hat Virtualization is an enterprise virtualization solution based on the KVM technology, offering more features than Red Hat Enterprise Linux. Red Hat OpenStack Platform support OpenStack clouds.
KVM (Kernel-based Virtual Machine)
libvirt
Storage and Virtualization
Networking and Virtualization
Security and Virtualization
KVM virtual machines use SELinux and sVirt to enforce security.
Steal Time
"Steal time" is the percentage of time a virtual CPU waits for real CPU while the hypervisor is servicing another virtual processor.
A high value means the physical CPU is overcommitted and more physical CPU should be allocated to the environment - or the VM should be moved on a different physical server. The steal time is reported by vmstat st.