Linux Virtualization Concepts

From NovaOrdis Knowledge Base
Jump to navigation Jump to search

External

Internal

Generic Virtualization Concepts

Virtualization Concepts

Virtualization Solutions from Red Hat

RHEL 7 includes a hypervisor and a number of virtualization tools, which allows running guest operating systems, so it can function as a virtualization platform. However, the solution supports a limited number of guests per host and a limited range of guest types. Red Hat Virtualization is an enterprise virtualization solution based on the KVM technology, offering more features than Red Hat Enterprise Linux. Red Hat OpenStack Platform support OpenStack clouds.

KVM (Kernel-based Virtual Machine)

KVM is a hypervisor that only runs on systems with hardware supporting virtualization extensions. It is built into the standard RHEL 7 kernel, and it can run Linux, Windows, Solaris and BSD guests. KVM is integrated with the Quick Emulator (QEMU). KVM is managed with the libvirt API. The virtual machines are executed as multi-threaded Linux processes controlled by tools built in top of libvirt. KVM supports overcommitting, kernel same-page merging (KSM), disk I/O throttling, automatic NUMA balancing and virtual CPU hot add.

Xen

Xen can do full virtualization on systems that support virtualization extensions, but can also work as hypervisor on the machines that don't.

Quick Emulator (QEMU)

QEMU Guest Agent

The QEMU guest agent runs on the guest operating system and makes it possible for the host machine to issue commands to the guest operating system.

RHEL 7 Virtualization Administration Guide - QEMU guest agent

libvirt

libvirt is an Open Source framework providing a hypervisor-independent C-based API that can be used to manage KVM as well as Xen. libvirt's clients are the virtualization management tools. The management tools do not need to be on the same physical machine as the machines on which the hosts are running.

libvirt provides access to management of virtual machines on a host. The API can be used to provision, create, modify, monitor, control, migrate and stop virtual machines. Resources such as CPUs, memory, storage, networking and non-uniform memory access (NUMA) partitions can be listed with libvirt. libvirt delegates management operations to the hypervisor, so only operations supported by the hypervisor can be performed with libvirt.

virsh, the primary command-line virtualization management tool, is baed on libvirt.

libvirtd

There is an associated libvirtd service which runs on the virtualization host. The service is configured to automatically start at boot during libvirt package installation. The service's functions are:

The associated configuration file is /etc/sysconfig/libvirtd.

libvirt-guests

This is a service that automatically saves guests to the disk when the host shuts down, and restores them to their pre-shutdown state when the host reboots. Note that this service is not automatically enabled, it must be enabled explicitly.

The associated configuration file is /etc/sysconfig/libvirt-guests.

virtio

virtio is a package that provides KVM hypervisor-specific code, and exposes paravirtualized devices to the guest operating system. virtio is a layer sitting between the hypervisor and the guest. All virtio devices have two parts: the host device and the guest driver. The paravirtualized device drivers allow the guest operating system to access the corresponding physical device installed on the host system, and they must be installed on the guest operating system. Examples of paravirtualized devices: the paravirtualized network device virtio-net, the paravirtualized block device (virtio-blk), which is a high-performance virtual storage device supported by the hypervisor, the paravirtualized controller device (virtio-scsi), and others (clock, virtio-serial, virtio-balloon, virtio-rng, QXL graphic card)

RHEL 7 Virtualization Administration Guide - Paravirtualized virtio Drivers

Also see paravirtualization and paravirtualized devices.

KVM Virtual Machine

A KVM guest has two components: the VM definition, expressed in XML, and the VM image, usually maintained on a storage volume in one of the formats described below. The virtual machine, and implicitly its definition, can be created on command-line with virt-install. The VM definition can then be edited with virsh edit and exported as XML with virsh dumpxml. An XML definition file can be used to create a virtual machine with virsh define.

Guests can be started with virsh start and stopped with virsh shutdown.

KVM Virtual Machine States

  • running - The domain is currently running on a CPU.
  • idle - The domain is idle, and not running or runnable. This can be caused because the domain is waiting on IO (a traditional wait state) or has gone to sleep because there was nothing else for it to do.
  • paused - The domain has been paused, usually occurring through the administrator running virsh suspend. When in a paused state the domain will still consume allocated resources like memory, but will not be eligible for scheduling by the hypervisor.
  • shutdown - The domain is in the process of shutting down, i.e. the guest operating system has been notified and should be in the process of stopping its operations gracefully.
  • shut off - The domain is not running. Usually this indicates the domain has been shut down completely, or has not been started.
  • crashed - The domain has crashed, which is always a violent ending. Usually this state can only occur if the domain has been configured not to restart on crash.
  • dying - The domain is in process of dying, but hasn't completely shutdown or crashed.
  • pmsuspended - The domain has been suspended by guest power management, e.g. entered into s3 state.

The state of a virtual machine is reported by virsh domstate.

KVM Virtual Machine XML Definition

The XML definition of an KVM guest can be generated with virsh dumpxml. An example of a virtual machine XML definition is available here:

KVM Virtual Machine XML Configuration Example

KVM Virtual Machine Snapshot

The snapshot of a virtual machine consists in a copy of its XML definition and snapshots of all of its attached disk images, so the virtual machine can be recreated in that specific state. The snapshot can be manual, by saving the XML configuration of the guest and the state of its storage, or it can involve the virsh snapshot functionality, in which case formal snapshots are recorded as part of the state of the virtualization host, and can possibly include the state of the guest memory. Both procedures are described below:

KVM and Physically Shared Devices

Also see physically shared devices.

Storage and Virtualization

Virtualization Host Storage

Storage Pool

RHEL 7 Virtualization Administration Guide - Storage Pools

A storage pool is a quantity of storage set aside on the virtualization host for use by guest virtual machines. The storage pool is divided into storage volumes which are assigned to the virtual machines as block devices.

In case the pool's underlying storage is directly attached to the host physical machine, the pool is referred to as local storage pool. Local storage pools include local directories, directly attached disks, physical partitions and logical volume management (LVM) volumes. Local storage pools do not support live migration. It is also possible for the storage not to be physically attached to the virtualization host, but accessible over the network. This is the case for networked (shared) storage pools. Networked storage pools consists of storage devices shared over a network over standard protocols, such as NFS, iSCSI, GFS2, etc.

The storage pool is managed by libvirt on the virtualization host. The size of the storage pool may not exceed the size of the underlying physical storage. Storage pools store virtual machine images or are attached to virtual machines as additional storage. Multiple guests can share the same storage pool.

If not configured otherwise, libvirt uses a directory-based storage pool located in /var/lib/libvirt/images/.

Information about a storage pool status and usage can be obtained with:

virsh pool-list
virsh pool-info
virsh pool-dumpxml

Storage pools can be configured as follows:

KVM Virtualization Disk-Based Storage Pool Configuration
KVM Virtualization Partition-Based Storage Pool Configuration
KVM Virtualization Directory-Based Storage Pool Configuration
KVM Virtualization LVM-Based Storage Pool Configuration

Storage Volume

A storage pool is divided into storage volumes, which are abstractions of physical partitions, LVM logical volumes, file-based disk images and other storage types handled by libvirt. Storage volumes are presented to virtual machines as local storage devices, regardless of the underlying hardware. Once defined, the storage volumes' paths can be declared into the storage section of the guest virtual machine XML definition.

A storage volume is uniquely identified by an volume key. The format of the volume key depends upon the storage used. When used with block based storage, such as LVM, the volume key may be a unique string of alphanumeric characters. When used with file based storage, the key may be the full path to the volume storage.

There are three ways to refer a specific volume:

  1. Using the name of the volume and the storage pool.
  2. Using the full path to the storage on the host physical machine file system.
  3. Using an unique volume key.

Note that storage pools and volumes are optional, guest virtual machines may operate without them, but if that is the case, system administrators must ensure availability of the guest virtual machine's storage using alternate tools. Storage pools and volumes provide a way for libvirt to insure that a particular piece of storage will be available for a guest virtual machine.

Storage volume operations: Template:InternalLinux Virtualization Operations

Virtual Machine Image

The virtual machine image file can only be stored on a host file system, such as xfs, ext4 or NFS.

Virtual machine images can be manipulated with qemu-img.

Virtual Machine Image Formats

raw

It is also known as QEMU raw format. It contains the content of the disk with no additional metadata. Raw files can be pre-allocated or sparse. Sparse files allocate host disk space on demand, and are therefore form of thin provisioning. Pre-allocated files are fully provisioned but have higher performance than sparse files. Raw files are desirable when disk I/O performance is critical and transferring the image file over a network is rarely necessary.

qcow2

The QEMU image format. It offers backing files, snapshot, compression and encryption. They can be used to instantiate virtual machines from template images. qcow2 files are typically more efficient to transfer over the network, because only sectors written by the virtual machine are allocated in the image.

Disk Image Snapshots

Disk image snapshot definition.

Snapshots of a disk image can be taken with qemu-img snapshot command. When taking snapshots, it is recommended to apply the following snapshot tag name conventions.

Guest-Side Storage

The storage for virtual machines is abstracted from the physical storage attached to the host. The storage is attached to the virtual machine using paravirtualized or emulated block device drivers, deployed within the virtual machine. Commonly used storage devices:

Naming Conventions

Linux Virtualization Naming Conventions

Networking

KVM Virtual Networking Concepts

Security and Virtualization

KVM virtual machines use SELinux and sVirt to enforce security.

sVirt

sVirt is a technology included in RHEL 7 to integrate SELinux and virtualization. It applies Mandatory Access Control (MAC) to improve security when using virtual machines.

Steal Time

"Steal time" is the percentage of time a virtual CPU waits for real CPU while the hypervisor is servicing another virtual processor.

A high value means the physical CPU is overcommitted and more physical CPU should be allocated to the environment - or the VM should be moved on a different physical server. The steal time is reported by vmstat st.

RHEL 7 Virtualization Resource Limits

RHEL capabilities and limits
RHEL KVM virtualization capabilities and limits