SlideShare a Scribd company logo
1 of 33
Download to read offline
© 2013 IBM Corporation
KVM简介
张军利
2014年5月16日
© 2013 IBM Corporation
KVM(Kernel-based Virtual Machine)
2 IBM Confidential
apps
Linuxkvm
qemu qemu
Linux
apps apps
VM
Linux
apps apps
VM
libvirt
apps
apps
openstack,
ovirt
© 2013 IBM Corporation
QEMU(Quick EMUlator)
3 IBM Confidential
© 2013 IBM Corporation
libvirt
4 IBM Confidential
http://www.libvirt.org/
© 2013 IBM Corporation
KVM支持特征概览
5 IBM Confidential
© 2013 IBM Corporation
采用cgroup控制实例资源配比
6 IBM Confidential
© 2013 IBM Corporation
KVM支持的网卡模式
7 IBM Confidential
Direct Device Assignment SR-IOVEmulated Devices(Virtio) Vhost-net Devices
© 2013 IBM Corporation
KVM下的各种网卡模式性能表现
8 IBM Confidential
Emulated Devices(Virtio)
Vhost-net Devices
SR-IOV
Direct Device Assignment
© 2013 IBM Corporation
KVM中的存储池
9 IBM Confidential
Ref: http://wiki.libvirt.org/page/NPIV_in_libvirt
© 2013 IBM Corporation
Virtual Reliability, Availability, Serviceability
10 IBM Confidential
Virtual CPU/Mem
Hot-Plug
Live
Snapshots
Live Snapshots
Merge and Delete
Live Storage
Migration
vRAS
R
A
S
© 2013 IBM Corporation
KVM中的安全和隔离
11 IBM Confidential
Attacks on guests are isolated from the host kernel, any associated storage, as well as other virtual machines
© 2013 IBM Corporation
基于libvirt库的KVM管理工具Virt-manager
12 IBM Confidential
© 2013 IBM Corporation
Power8服务器上的KVM管理架构概览
13 IBM Confidential
© 2013 IBM Corporation
Sapphire技术细节
14 IBM Confidential
© 2013 IBM Corporation
切换Power8服务器至KVM模式
15 IBM Confidential
 机器上电;
 待服务器面板显示“01 N V=N”时,
连线服务器的HMC端口;
 通过浏览器登录ASM界面,其中默认
情况下,端口1地址为169.254.2.147;
端口2地址为169.254.2.147。用户名
和密码均为admin。
© 2013 IBM Corporation
切换Power8服务器至KVM模式(续)
16 IBM Confidential
 成功登录之后,修改admin的密码。
本例admin密码依旧保持admin不变。
© 2013 IBM Corporation
切换Power8服务器至KVM模式(续)
17 IBM Confidential
 切换至开关机界面,确保机器处于关
机状态,以便后续修改固件中的
PowerVM和PowerKVM选项。
© 2013 IBM Corporation
切换Power8服务器至KVM模式(续)
18 IBM Confidential
 切换至系统信息中的虚拟化层配置,
在虚拟化模式中有PowerVM和KVM
两种选项,切换至KVM选项以便后续
安装PowerKVM介质。
 配置admin用户的IPMI密码,本例密
码为admin。
© 2013 IBM Corporation
切换Power8服务器至KVM模式(续)
19 IBM Confidential
 切换至开关机界面,选择保存和开机。
© 2013 IBM Corporation
切换Power8服务器至KVM模式(续)
20 IBM Confidential
 切换至系统信息中的实时进度查询,弹出界面显示系统进度码,该码与前面板显示一致。待面板显示为CB010008时,可以通过显示器或
ipmitool连线服务器终端显示,终端中将显示出Petiboot界面。
© 2013 IBM Corporation
Sapphire中的Petiboot引导器
21 IBM Confidential
● Essentially the user interface for the OPAL firmware
● Looks like a menu based boot loader
● Has advanced function
● Menu items generated at boot time
● Automatically searches for bootable entities on local drives
and network
● Menu items editable at boot time; new entries can be added
● System can drop to a Linux command prompt
● busybox
● System settings can be edited/updated, including network
● System information can be listed
● Local storage devices
● Network settings and MAC IDs
● Default 10 second timeout before default item is loaded
© 2013 IBM Corporation
采用光驱模式安装PowerKVM
22 IBM Confidential
1 2
3 4
Kernel A
Sapphire
Kernel B
Linux Host
kexec
© 2013 IBM Corporation
采用光驱模式安装PowerKVM(续)
23 IBM Confidential
5 6
7 8
© 2013 IBM Corporation
采用光驱模式安装PowerKVM(续)
24 IBM Confidential
9 10
11
12
© 2013 IBM Corporation
采用IPMI工具远程管理Power8服务器
25 IBM Confidential
Command options Description
ipmitool -I lanplus -H FSP_IP -P mypass chassis power on Power on server
ipmitool -I lanplus -H FSP_IP -P mypass chassis power off Power off server
ipmitool -I lanplus -H FSP_IP -P mypass chassis status Check server status
ipmitool -I lanplus -H FSP_IP -P mypass chassis power soft Gracefully shut down the server
ipmitool -I lanplus -H FSP_IP -P mypass chassis power reset Immediately shuts down the server
ipmitool -I lanplus -H FSP_IP -P mypass sol activate Activate SOL system console
ipmitool -I lanplus -H FSP_IP -P mypass sol deactivate Deactivate SOL system console
ipmitool -I lanplus -H FSP_IP -P mypass sel list Get error log
ipmitool -I lanplus -H FSP_IP -P mypass sdr list List status of all sensor
IPMI命令中的密码为在ASM中设置的IPMI密码,通过IPMI可以远程对主机上下点、软重启、统计资产信息和连线控制台等操作。
© 2013 IBM Corporation
大端和小端简介
26 IBM Confidential
Definition: Endianness
 Endianness refers to how a data element and its individual bytes are stored and addressed in memory.
 When a word is placed in memory, starting from the lowest address, there are only two options:
– Little endian: Place the least significant byte first
– Big endian: Place the most significant byte first
Examples for big endian systems:
 IBM Power systems
 most RISC-based computers
– SUN Sparc systems
– HP PA-RISC systems (HP-UX)
– HP Itanium systems (HP-UX)
– etc.
 Internet protocol (IP)
Examples for little endian systems:
 Intel x86 and x86-64 systems
 Intel Itanium with Linux
 Compaq Alpha processors
 some networking hardware
Sources of endianness problems:
 Nonuniform data referencing
– It is often featured by data type mismatches resulting from either data element casting, use of a union data structure, or the use and manipulation of bit
fields.
 Sharing data across platforms
– For example, a big-endian system retrieves database data stored by a little-endian system.
 Exchanging of data between devices of different endianness and devices on a network
– For example, AIX on Power systems uses the big-endian model, but the PCI bus uses the little-endian model.
– TCP/IP protocols requires data to be sent in network byte order, which is the big-endian model.
© 2013 IBM Corporation
采用virt-install命令安装虚拟机示例
27 IBM Confidential
 通过网络安装RHEL7.0 (大端)
[root@powerkvm ~]# virt-install 
--name rhel7BE01--os-type=linux --os-variant=rhel7 
--virt-type=kvm --memballoon=virtio 
--vcpus 4 --ram 8196 
--network bridge=brenp160s0f0,model=virtio 
--graphics none 
--location ftp://172.16.15.29/os/rhel/7.0/os 
--extra-args "console=ttyS0 ip=172.16.51.246::172.16.51.1:255.255.255.0:rhel7BE:eth0:none inst.text" 
--disk /var/lib/libvirt/images/rhel7BE01.img,bus=virtio,size=60,cache=none,format=qcow2
 参数简介:
--name:虚拟机名称;
--os-type:系统类型,支持持Linux,Windows,BSD和Soloris等, PowerKVM只支持Linux选项;
--os-variant:系统具体版本;
--virt-type:虚拟化层,支持KVM全虚拟化、Xen半虚拟化和LXC容器,PowerKVM只支持KVM模式;
--memballoon:开启虚拟机内存随宿主机负载自动调节内存;
--vcpus:虚拟处理器个数;
--ram:虚拟内存容量(MB);
--network:网卡配置及网卡配置参数;
--graphics:显示配置,是否采用VNC,spice还是禁用;
--location:安装介质存放位置,支持FTP、NFS和HTTP协议;
--extra-args:仅当与--location配合使用,传递给内核的参数;
--disk:虚拟机硬盘存放路径及硬盘配置参数,其中--size指定磁盘容量(GB)。
© 2013 IBM Corporation
采用virt-install命令安装虚拟机示例(续)
28 IBM Confidential
 通过本地ISO镜像安装Ubuntu14.04(小端)
[root@powerkvm ~]# virt-install 
--name u1404LE 
--vcpus 4 --ram 8196 
--virt-type=kvm --memballoon=virtio 
--disk /var/lib/libvirt/images/u1404LE.img,bus=virtio,size=60,cache=none,format=qcow2 
--network bridge=brenp160s0f0,model=e1000 
--graphics vnc,listen=0.0.0.0 
--video vga 
--cdrom /var/lib/libvirt/images/iso/trusty-server-ppc64el.iso
[root@powerkvm ~]# virsh vncdisplay u1404LE #查询监听端口
 参数简介:
--name:虚拟机名称;
--vcpus:虚拟处理器个数;
--ram:虚拟内存容量(MB);
--virt-type:虚拟化层,支持KVM全虚拟化、Xen半虚拟化和LXC容器,PowerKVM只支持KVM模式;
--memballoon:开启虚拟机内存随宿主机负载自动调节内存;
--disk:虚拟机硬盘存放路径及硬盘配置参数,其中--size指定磁盘容量(GB);
--network:网卡配置及网卡配置参数;
--graphics:采用VNC显示,且在宿主机所有网络接口上启动监听(默认仅监听127.0.0.1);
--video:显卡类型,PowerKVM仅支持vga模式;
--cdrom:安装介质存放位置,支持FTP、NFS和HTTP协议。
© 2013 IBM Corporation
采用virsh管理虚拟机
29 IBM Confidential
Command option Description
virsh list --all List guests
virsh start guest_name Start
virsh shutdown guest_name Graceful shutdown
virsh destroy guest_name Force shutdown
virsh reboot guest_name Reboot
virsh suspend guest_name Pauses the gues
virsh resume guest_name Resumes a guest that was paused
virsh save guest_name fileName Save the state of the guest to a file
virsh restore fileName Restores a guest from a saved file
Command option Description
virsh autostart guest_name Turn on autostart
virsh autostart --disable guest_name Turn off autostart
virsh console guest_name Log into the guest's console
virsh dominfo guest_name Displays information about a guest
virsh dumpxml guest_name Dump guest's configuration in XML format
virsh undefine guest_name Deletes the guest, but not the image file
virsh define xmlfile.xml Creates a guest from an XML configuration file
virsh undefine guest_name --remove-all-
storage
Deletes the guest and all the associated
storage
virsh nodeinfo Displays information about the host
关于virsh针对虚拟机的管理可以参见man手册
© 2013 IBM Corporation
采用virt-clone克隆虚拟机
30 IBM Confidential
挂起虚拟机
• virsh suspend guest_name
克隆虚拟机
• virt-clone --original=guest_name --name=new_guest_name
--file=/var/lib/libvirt/images/new_guest_name.img
继续虚拟机
• virsh resume guest_name
© 2013 IBM Corporation
在线迁移KVM虚拟机:共享存储类型
31 IBM Confidential
Requirements
● Storage must be remote and accessible on both hosts (NFS, iSCSI, FCoE)
● Virtio busses must be used for storage volumes
● Firewalls on hosts must allow remote connections
● Within same subnet so target guest network can stay up
● No guests with same name on target host
● No virtFS use
● URL of target host must be resolvable (or in /etc/hosts) from the source host
# virsh migrate 
--live 
-–persistent 
–-undefinesource GUEST DestinationURL
Parameters:
--live: Does a live migration (--suspend for offline)
--persistent: assign the target host as this guest new “home”.
--transient is default, which means the migrated guest will disappear on target host reboot.
--undefinesource: delete the guest from the source Host
GUEST: Name of the guest to migrate
DestinationURL: Location of the destination host
Ex: qemu+ssh://host2.example.com/system
© 2013 IBM Corporation
在线迁移KVM虚拟机:独立存储类型
32 IBM Confidential
Requirements
● Storage sparse file must be existed on the destination host
● Virtio busses must be used for storage volumes
● Firewalls on hosts must allow remote connections
● Within same subnet so target guest network can stay up
● No guests with same name on target host
● No virtFS use
● URL of target host must be resolvable (or in /etc/hosts) from the source host
# virsh migrate --live --persistent --undefinesource --copy-storage-all 
--verbose --desturi DestinationUR GUEST
Parameters:
--live: Does a live migration (--suspend for offline)
--persistent: assign the target host as this guest new “home”.
--transient is default, which means the migrated guest will disappear on target host reboot.
--undefinesource: delete the guest from the source Host
GUEST: Name of the guest to migrate
DestinationURL: Location of the destination host
Ex: qemu+ssh://host2.example.com/system
© 2013 IBM Corporation33 IBM Confidential

More Related Content

What's hot

Presentation power vm editions and power systems virtualization - basic
Presentation   power vm editions and power systems virtualization - basicPresentation   power vm editions and power systems virtualization - basic
Presentation power vm editions and power systems virtualization - basicsolarisyougood
 
Deploying vn fs with kubernetes pods and vms
Deploying vn fs with kubernetes pods and vmsDeploying vn fs with kubernetes pods and vms
Deploying vn fs with kubernetes pods and vmsLibbySchulze1
 
LCA13: Xen on ARM
LCA13: Xen on ARMLCA13: Xen on ARM
LCA13: Xen on ARMLinaro
 
Flexing Network Muscle with IBM Flex System Fabric Technology
Flexing Network Muscle with IBM Flex System Fabric TechnologyFlexing Network Muscle with IBM Flex System Fabric Technology
Flexing Network Muscle with IBM Flex System Fabric TechnologyBrocade
 
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARMXPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARMThe Linux Foundation
 
BSDCan 2015: How to Port BSD as a Xen on ARM Guest
BSDCan 2015: How to Port BSD as a Xen on ARM GuestBSDCan 2015: How to Port BSD as a Xen on ARM Guest
BSDCan 2015: How to Port BSD as a Xen on ARM GuestThe Linux Foundation
 
Brocade Administration & troubleshooting
Brocade Administration & troubleshootingBrocade Administration & troubleshooting
Brocade Administration & troubleshootingprakashjjaya
 
I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜Ryousei Takano
 
IBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM India Smarter Computing
 
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...The Linux Foundation
 
Realtime scheduling for virtual machines in SKT
Realtime scheduling for virtual machines in SKTRealtime scheduling for virtual machines in SKT
Realtime scheduling for virtual machines in SKTThe Linux Foundation
 
Fulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It FitFulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It FitSteve Meek
 
PV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream QemuPV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream QemuThe Linux Foundation
 
XPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, Intel
XPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, IntelXPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, Intel
XPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, IntelThe Linux Foundation
 

What's hot (20)

Presentation power vm editions and power systems virtualization - basic
Presentation   power vm editions and power systems virtualization - basicPresentation   power vm editions and power systems virtualization - basic
Presentation power vm editions and power systems virtualization - basic
 
IBM PowerVM Best Practices
IBM PowerVM Best PracticesIBM PowerVM Best Practices
IBM PowerVM Best Practices
 
Deploying vn fs with kubernetes pods and vms
Deploying vn fs with kubernetes pods and vmsDeploying vn fs with kubernetes pods and vms
Deploying vn fs with kubernetes pods and vms
 
Link Virtualization based on Xen
Link Virtualization based on XenLink Virtualization based on Xen
Link Virtualization based on Xen
 
LCA13: Xen on ARM
LCA13: Xen on ARMLCA13: Xen on ARM
LCA13: Xen on ARM
 
Flexing Network Muscle with IBM Flex System Fabric Technology
Flexing Network Muscle with IBM Flex System Fabric TechnologyFlexing Network Muscle with IBM Flex System Fabric Technology
Flexing Network Muscle with IBM Flex System Fabric Technology
 
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARMXPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
XPDS16: Porting Xen on ARM to a new SOC - Julien Grall, ARM
 
BSDCan 2015: How to Port BSD as a Xen on ARM Guest
BSDCan 2015: How to Port BSD as a Xen on ARM GuestBSDCan 2015: How to Port BSD as a Xen on ARM Guest
BSDCan 2015: How to Port BSD as a Xen on ARM Guest
 
Brocade Administration & troubleshooting
Brocade Administration & troubleshootingBrocade Administration & troubleshooting
Brocade Administration & troubleshooting
 
I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜
 
IBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and Configuration
 
Vmax architecture
Vmax architectureVmax architecture
Vmax architecture
 
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
 
Realtime scheduling for virtual machines in SKT
Realtime scheduling for virtual machines in SKTRealtime scheduling for virtual machines in SKT
Realtime scheduling for virtual machines in SKT
 
EMCSymmetrix vmax-10
EMCSymmetrix vmax-10EMCSymmetrix vmax-10
EMCSymmetrix vmax-10
 
Fulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It FitFulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It Fit
 
PV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream QemuPV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream Qemu
 
XS Boston 2008 Self IO Emulation
XS Boston 2008 Self IO EmulationXS Boston 2008 Self IO Emulation
XS Boston 2008 Self IO Emulation
 
XS Boston 2008 Project Status
XS Boston 2008 Project StatusXS Boston 2008 Project Status
XS Boston 2008 Project Status
 
XPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, Intel
XPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, IntelXPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, Intel
XPDS13: HVM Dom0 - Any unmodified OS as Dom0 - Will Auld, Intel
 

Viewers also liked

Аутизм
АутизмАутизм
АутизмTitenko1
 
Domestic violence 2014
Domestic violence 2014Domestic violence 2014
Domestic violence 2014Mdunnam
 
Bloodborne pathogens 2014
Bloodborne pathogens 2014Bloodborne pathogens 2014
Bloodborne pathogens 2014Mdunnam
 
Ethics and the role of cjstc 2014
Ethics and the role of cjstc 2014Ethics and the role of cjstc 2014
Ethics and the role of cjstc 2014Mdunnam
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power pointTitenko1
 
Bloodborne Pathogens Training
Bloodborne Pathogens TrainingBloodborne Pathogens Training
Bloodborne Pathogens TrainingMdunnam
 
NH Granite State Ambassadors Yearbook 2015
NH Granite State Ambassadors Yearbook 2015NH Granite State Ambassadors Yearbook 2015
NH Granite State Ambassadors Yearbook 2015GraniteStateAmbassadors
 
Presentation biggest loser
Presentation biggest loserPresentation biggest loser
Presentation biggest loserAnn Butler
 
Crowdfunding Framework In France Presentation 4 june 2014 Berlin
Crowdfunding Framework In France Presentation 4 june 2014 BerlinCrowdfunding Framework In France Presentation 4 june 2014 Berlin
Crowdfunding Framework In France Presentation 4 june 2014 BerlinFabien Risterucci
 
Bloodborne pathogens 2014
Bloodborne pathogens 2014Bloodborne pathogens 2014
Bloodborne pathogens 2014Mdunnam
 
Web design coibatore, Web design company budnet
Web design coibatore, Web design company   budnetWeb design coibatore, Web design company   budnet
Web design coibatore, Web design company budnetWebdesign Coimbatore
 
Беспризорность и безназдорность
Беспризорность и безназдорностьБеспризорность и безназдорность
Беспризорность и безназдорностьTitenko1
 
Уборка кровли и территории в зимний период
Уборка кровли и территории в зимний периодУборка кровли и территории в зимний период
Уборка кровли и территории в зимний периодTitenko1
 
Eirtight writing secure code
Eirtight writing secure codeEirtight writing secure code
Eirtight writing secure codeKieran Dundon
 
Презентация
ПрезентацияПрезентация
ПрезентацияTitenko1
 

Viewers also liked (20)

Аутизм
АутизмАутизм
Аутизм
 
Domestic violence 2014
Domestic violence 2014Domestic violence 2014
Domestic violence 2014
 
Bloodborne pathogens 2014
Bloodborne pathogens 2014Bloodborne pathogens 2014
Bloodborne pathogens 2014
 
Ethics and the role of cjstc 2014
Ethics and the role of cjstc 2014Ethics and the role of cjstc 2014
Ethics and the role of cjstc 2014
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power point
 
Bloodborne Pathogens Training
Bloodborne Pathogens TrainingBloodborne Pathogens Training
Bloodborne Pathogens Training
 
IT IN BUSINESS
IT IN BUSINESSIT IN BUSINESS
IT IN BUSINESS
 
NH Granite State Ambassadors Yearbook 2015
NH Granite State Ambassadors Yearbook 2015NH Granite State Ambassadors Yearbook 2015
NH Granite State Ambassadors Yearbook 2015
 
Presentation biggest loser
Presentation biggest loserPresentation biggest loser
Presentation biggest loser
 
Ramanan smart
Ramanan   smartRamanan   smart
Ramanan smart
 
Crowdfunding Framework In France Presentation 4 june 2014 Berlin
Crowdfunding Framework In France Presentation 4 june 2014 BerlinCrowdfunding Framework In France Presentation 4 june 2014 Berlin
Crowdfunding Framework In France Presentation 4 june 2014 Berlin
 
Bloodborne pathogens 2014
Bloodborne pathogens 2014Bloodborne pathogens 2014
Bloodborne pathogens 2014
 
Web design coibatore, Web design company budnet
Web design coibatore, Web design company   budnetWeb design coibatore, Web design company   budnet
Web design coibatore, Web design company budnet
 
Radios
RadiosRadios
Radios
 
Беспризорность и безназдорность
Беспризорность и безназдорностьБеспризорность и безназдорность
Беспризорность и безназдорность
 
собрание5
собрание5собрание5
собрание5
 
Уборка кровли и территории в зимний период
Уборка кровли и территории в зимний периодУборка кровли и территории в зимний период
Уборка кровли и территории в зимний период
 
Eirtight writing secure code
Eirtight writing secure codeEirtight writing secure code
Eirtight writing secure code
 
Презентация
ПрезентацияПрезентация
Презентация
 
Bahan bahan
Bahan bahanBahan bahan
Bahan bahan
 

Similar to Kvm简介

Virtualization aware Java VM
Virtualization aware Java VMVirtualization aware Java VM
Virtualization aware Java VMTim Ellison
 
Open mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricksOpen mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricksa8us
 
Open Mic on Sametime9 Install -Best Practices
Open Mic on Sametime9 Install  -Best PracticesOpen Mic on Sametime9 Install  -Best Practices
Open Mic on Sametime9 Install -Best PracticesVinayak Tavargeri
 
Vsc 71-se-presentation-training
Vsc 71-se-presentation-trainingVsc 71-se-presentation-training
Vsc 71-se-presentation-trainingnarit_ton
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docxmadlynplamondon
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docxgertrudebellgrove
 
Rmll Virtualization As Is Tool 20090707 V1.0
Rmll Virtualization As Is Tool 20090707 V1.0Rmll Virtualization As Is Tool 20090707 V1.0
Rmll Virtualization As Is Tool 20090707 V1.0guest72e8c1
 
Future of Power: PureFlex and IBM i - Erik Rex
Future of Power: PureFlex and IBM i - Erik RexFuture of Power: PureFlex and IBM i - Erik Rex
Future of Power: PureFlex and IBM i - Erik RexIBM Danmark
 
Lessons On Hyper V
Lessons On Hyper VLessons On Hyper V
Lessons On Hyper VAidan Finn
 
KVM tools and enterprise usage
KVM tools and enterprise usageKVM tools and enterprise usage
KVM tools and enterprise usagevincentvdk
 
A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...
A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...
A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...IBM India Smarter Computing
 
JavaOne 2014: Java Debugging
JavaOne 2014: Java DebuggingJavaOne 2014: Java Debugging
JavaOne 2014: Java DebuggingChris Bailey
 
Power vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricksPower vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & trickssolarisyougood
 
Oracle VM3: Virtuelle Maschinen per Script erstellen
Oracle VM3: Virtuelle Maschinen per Script erstellenOracle VM3: Virtuelle Maschinen per Script erstellen
Oracle VM3: Virtuelle Maschinen per Script erstellenTrivadis
 
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaafTechnical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaafSyed Shaaf
 

Similar to Kvm简介 (20)

Virtualization aware Java VM
Virtualization aware Java VMVirtualization aware Java VM
Virtualization aware Java VM
 
Open mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricksOpen mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricks
 
Open Mic on Sametime9 Install -Best Practices
Open Mic on Sametime9 Install  -Best PracticesOpen Mic on Sametime9 Install  -Best Practices
Open Mic on Sametime9 Install -Best Practices
 
Vsc 71-se-presentation-training
Vsc 71-se-presentation-trainingVsc 71-se-presentation-training
Vsc 71-se-presentation-training
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docx
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docx
 
RMLL / LSM 2009
RMLL / LSM 2009RMLL / LSM 2009
RMLL / LSM 2009
 
Rmll Virtualization As Is Tool 20090707 V1.0
Rmll Virtualization As Is Tool 20090707 V1.0Rmll Virtualization As Is Tool 20090707 V1.0
Rmll Virtualization As Is Tool 20090707 V1.0
 
Future of Power: PureFlex and IBM i - Erik Rex
Future of Power: PureFlex and IBM i - Erik RexFuture of Power: PureFlex and IBM i - Erik Rex
Future of Power: PureFlex and IBM i - Erik Rex
 
z/VM and OpenStack
z/VM and OpenStackz/VM and OpenStack
z/VM and OpenStack
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Lessons On Hyper V
Lessons On Hyper VLessons On Hyper V
Lessons On Hyper V
 
KVM tools and enterprise usage
KVM tools and enterprise usageKVM tools and enterprise usage
KVM tools and enterprise usage
 
ITE7_Chp9.pptx
ITE7_Chp9.pptxITE7_Chp9.pptx
ITE7_Chp9.pptx
 
A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...
A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...
A z/OS System Programmer’s Guide to Migrating to a New IBM System z9 EC or z9...
 
JavaOne 2014: Java Debugging
JavaOne 2014: Java DebuggingJavaOne 2014: Java Debugging
JavaOne 2014: Java Debugging
 
Power vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricksPower vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricks
 
VirtFS
VirtFSVirtFS
VirtFS
 
Oracle VM3: Virtuelle Maschinen per Script erstellen
Oracle VM3: Virtuelle Maschinen per Script erstellenOracle VM3: Virtuelle Maschinen per Script erstellen
Oracle VM3: Virtuelle Maschinen per Script erstellen
 
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaafTechnical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
Technical update KVM and Red Hat Enterprise Virtualization (RHEV) by syedmshaaf
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Kvm简介

  • 1. © 2013 IBM Corporation KVM简介 张军利 2014年5月16日
  • 2. © 2013 IBM Corporation KVM(Kernel-based Virtual Machine) 2 IBM Confidential apps Linuxkvm qemu qemu Linux apps apps VM Linux apps apps VM libvirt apps apps openstack, ovirt
  • 3. © 2013 IBM Corporation QEMU(Quick EMUlator) 3 IBM Confidential
  • 4. © 2013 IBM Corporation libvirt 4 IBM Confidential http://www.libvirt.org/
  • 5. © 2013 IBM Corporation KVM支持特征概览 5 IBM Confidential
  • 6. © 2013 IBM Corporation 采用cgroup控制实例资源配比 6 IBM Confidential
  • 7. © 2013 IBM Corporation KVM支持的网卡模式 7 IBM Confidential Direct Device Assignment SR-IOVEmulated Devices(Virtio) Vhost-net Devices
  • 8. © 2013 IBM Corporation KVM下的各种网卡模式性能表现 8 IBM Confidential Emulated Devices(Virtio) Vhost-net Devices SR-IOV Direct Device Assignment
  • 9. © 2013 IBM Corporation KVM中的存储池 9 IBM Confidential Ref: http://wiki.libvirt.org/page/NPIV_in_libvirt
  • 10. © 2013 IBM Corporation Virtual Reliability, Availability, Serviceability 10 IBM Confidential Virtual CPU/Mem Hot-Plug Live Snapshots Live Snapshots Merge and Delete Live Storage Migration vRAS R A S
  • 11. © 2013 IBM Corporation KVM中的安全和隔离 11 IBM Confidential Attacks on guests are isolated from the host kernel, any associated storage, as well as other virtual machines
  • 12. © 2013 IBM Corporation 基于libvirt库的KVM管理工具Virt-manager 12 IBM Confidential
  • 13. © 2013 IBM Corporation Power8服务器上的KVM管理架构概览 13 IBM Confidential
  • 14. © 2013 IBM Corporation Sapphire技术细节 14 IBM Confidential
  • 15. © 2013 IBM Corporation 切换Power8服务器至KVM模式 15 IBM Confidential  机器上电;  待服务器面板显示“01 N V=N”时, 连线服务器的HMC端口;  通过浏览器登录ASM界面,其中默认 情况下,端口1地址为169.254.2.147; 端口2地址为169.254.2.147。用户名 和密码均为admin。
  • 16. © 2013 IBM Corporation 切换Power8服务器至KVM模式(续) 16 IBM Confidential  成功登录之后,修改admin的密码。 本例admin密码依旧保持admin不变。
  • 17. © 2013 IBM Corporation 切换Power8服务器至KVM模式(续) 17 IBM Confidential  切换至开关机界面,确保机器处于关 机状态,以便后续修改固件中的 PowerVM和PowerKVM选项。
  • 18. © 2013 IBM Corporation 切换Power8服务器至KVM模式(续) 18 IBM Confidential  切换至系统信息中的虚拟化层配置, 在虚拟化模式中有PowerVM和KVM 两种选项,切换至KVM选项以便后续 安装PowerKVM介质。  配置admin用户的IPMI密码,本例密 码为admin。
  • 19. © 2013 IBM Corporation 切换Power8服务器至KVM模式(续) 19 IBM Confidential  切换至开关机界面,选择保存和开机。
  • 20. © 2013 IBM Corporation 切换Power8服务器至KVM模式(续) 20 IBM Confidential  切换至系统信息中的实时进度查询,弹出界面显示系统进度码,该码与前面板显示一致。待面板显示为CB010008时,可以通过显示器或 ipmitool连线服务器终端显示,终端中将显示出Petiboot界面。
  • 21. © 2013 IBM Corporation Sapphire中的Petiboot引导器 21 IBM Confidential ● Essentially the user interface for the OPAL firmware ● Looks like a menu based boot loader ● Has advanced function ● Menu items generated at boot time ● Automatically searches for bootable entities on local drives and network ● Menu items editable at boot time; new entries can be added ● System can drop to a Linux command prompt ● busybox ● System settings can be edited/updated, including network ● System information can be listed ● Local storage devices ● Network settings and MAC IDs ● Default 10 second timeout before default item is loaded
  • 22. © 2013 IBM Corporation 采用光驱模式安装PowerKVM 22 IBM Confidential 1 2 3 4 Kernel A Sapphire Kernel B Linux Host kexec
  • 23. © 2013 IBM Corporation 采用光驱模式安装PowerKVM(续) 23 IBM Confidential 5 6 7 8
  • 24. © 2013 IBM Corporation 采用光驱模式安装PowerKVM(续) 24 IBM Confidential 9 10 11 12
  • 25. © 2013 IBM Corporation 采用IPMI工具远程管理Power8服务器 25 IBM Confidential Command options Description ipmitool -I lanplus -H FSP_IP -P mypass chassis power on Power on server ipmitool -I lanplus -H FSP_IP -P mypass chassis power off Power off server ipmitool -I lanplus -H FSP_IP -P mypass chassis status Check server status ipmitool -I lanplus -H FSP_IP -P mypass chassis power soft Gracefully shut down the server ipmitool -I lanplus -H FSP_IP -P mypass chassis power reset Immediately shuts down the server ipmitool -I lanplus -H FSP_IP -P mypass sol activate Activate SOL system console ipmitool -I lanplus -H FSP_IP -P mypass sol deactivate Deactivate SOL system console ipmitool -I lanplus -H FSP_IP -P mypass sel list Get error log ipmitool -I lanplus -H FSP_IP -P mypass sdr list List status of all sensor IPMI命令中的密码为在ASM中设置的IPMI密码,通过IPMI可以远程对主机上下点、软重启、统计资产信息和连线控制台等操作。
  • 26. © 2013 IBM Corporation 大端和小端简介 26 IBM Confidential Definition: Endianness  Endianness refers to how a data element and its individual bytes are stored and addressed in memory.  When a word is placed in memory, starting from the lowest address, there are only two options: – Little endian: Place the least significant byte first – Big endian: Place the most significant byte first Examples for big endian systems:  IBM Power systems  most RISC-based computers – SUN Sparc systems – HP PA-RISC systems (HP-UX) – HP Itanium systems (HP-UX) – etc.  Internet protocol (IP) Examples for little endian systems:  Intel x86 and x86-64 systems  Intel Itanium with Linux  Compaq Alpha processors  some networking hardware Sources of endianness problems:  Nonuniform data referencing – It is often featured by data type mismatches resulting from either data element casting, use of a union data structure, or the use and manipulation of bit fields.  Sharing data across platforms – For example, a big-endian system retrieves database data stored by a little-endian system.  Exchanging of data between devices of different endianness and devices on a network – For example, AIX on Power systems uses the big-endian model, but the PCI bus uses the little-endian model. – TCP/IP protocols requires data to be sent in network byte order, which is the big-endian model.
  • 27. © 2013 IBM Corporation 采用virt-install命令安装虚拟机示例 27 IBM Confidential  通过网络安装RHEL7.0 (大端) [root@powerkvm ~]# virt-install --name rhel7BE01--os-type=linux --os-variant=rhel7 --virt-type=kvm --memballoon=virtio --vcpus 4 --ram 8196 --network bridge=brenp160s0f0,model=virtio --graphics none --location ftp://172.16.15.29/os/rhel/7.0/os --extra-args "console=ttyS0 ip=172.16.51.246::172.16.51.1:255.255.255.0:rhel7BE:eth0:none inst.text" --disk /var/lib/libvirt/images/rhel7BE01.img,bus=virtio,size=60,cache=none,format=qcow2  参数简介: --name:虚拟机名称; --os-type:系统类型,支持持Linux,Windows,BSD和Soloris等, PowerKVM只支持Linux选项; --os-variant:系统具体版本; --virt-type:虚拟化层,支持KVM全虚拟化、Xen半虚拟化和LXC容器,PowerKVM只支持KVM模式; --memballoon:开启虚拟机内存随宿主机负载自动调节内存; --vcpus:虚拟处理器个数; --ram:虚拟内存容量(MB); --network:网卡配置及网卡配置参数; --graphics:显示配置,是否采用VNC,spice还是禁用; --location:安装介质存放位置,支持FTP、NFS和HTTP协议; --extra-args:仅当与--location配合使用,传递给内核的参数; --disk:虚拟机硬盘存放路径及硬盘配置参数,其中--size指定磁盘容量(GB)。
  • 28. © 2013 IBM Corporation 采用virt-install命令安装虚拟机示例(续) 28 IBM Confidential  通过本地ISO镜像安装Ubuntu14.04(小端) [root@powerkvm ~]# virt-install --name u1404LE --vcpus 4 --ram 8196 --virt-type=kvm --memballoon=virtio --disk /var/lib/libvirt/images/u1404LE.img,bus=virtio,size=60,cache=none,format=qcow2 --network bridge=brenp160s0f0,model=e1000 --graphics vnc,listen=0.0.0.0 --video vga --cdrom /var/lib/libvirt/images/iso/trusty-server-ppc64el.iso [root@powerkvm ~]# virsh vncdisplay u1404LE #查询监听端口  参数简介: --name:虚拟机名称; --vcpus:虚拟处理器个数; --ram:虚拟内存容量(MB); --virt-type:虚拟化层,支持KVM全虚拟化、Xen半虚拟化和LXC容器,PowerKVM只支持KVM模式; --memballoon:开启虚拟机内存随宿主机负载自动调节内存; --disk:虚拟机硬盘存放路径及硬盘配置参数,其中--size指定磁盘容量(GB); --network:网卡配置及网卡配置参数; --graphics:采用VNC显示,且在宿主机所有网络接口上启动监听(默认仅监听127.0.0.1); --video:显卡类型,PowerKVM仅支持vga模式; --cdrom:安装介质存放位置,支持FTP、NFS和HTTP协议。
  • 29. © 2013 IBM Corporation 采用virsh管理虚拟机 29 IBM Confidential Command option Description virsh list --all List guests virsh start guest_name Start virsh shutdown guest_name Graceful shutdown virsh destroy guest_name Force shutdown virsh reboot guest_name Reboot virsh suspend guest_name Pauses the gues virsh resume guest_name Resumes a guest that was paused virsh save guest_name fileName Save the state of the guest to a file virsh restore fileName Restores a guest from a saved file Command option Description virsh autostart guest_name Turn on autostart virsh autostart --disable guest_name Turn off autostart virsh console guest_name Log into the guest's console virsh dominfo guest_name Displays information about a guest virsh dumpxml guest_name Dump guest's configuration in XML format virsh undefine guest_name Deletes the guest, but not the image file virsh define xmlfile.xml Creates a guest from an XML configuration file virsh undefine guest_name --remove-all- storage Deletes the guest and all the associated storage virsh nodeinfo Displays information about the host 关于virsh针对虚拟机的管理可以参见man手册
  • 30. © 2013 IBM Corporation 采用virt-clone克隆虚拟机 30 IBM Confidential 挂起虚拟机 • virsh suspend guest_name 克隆虚拟机 • virt-clone --original=guest_name --name=new_guest_name --file=/var/lib/libvirt/images/new_guest_name.img 继续虚拟机 • virsh resume guest_name
  • 31. © 2013 IBM Corporation 在线迁移KVM虚拟机:共享存储类型 31 IBM Confidential Requirements ● Storage must be remote and accessible on both hosts (NFS, iSCSI, FCoE) ● Virtio busses must be used for storage volumes ● Firewalls on hosts must allow remote connections ● Within same subnet so target guest network can stay up ● No guests with same name on target host ● No virtFS use ● URL of target host must be resolvable (or in /etc/hosts) from the source host # virsh migrate --live -–persistent –-undefinesource GUEST DestinationURL Parameters: --live: Does a live migration (--suspend for offline) --persistent: assign the target host as this guest new “home”. --transient is default, which means the migrated guest will disappear on target host reboot. --undefinesource: delete the guest from the source Host GUEST: Name of the guest to migrate DestinationURL: Location of the destination host Ex: qemu+ssh://host2.example.com/system
  • 32. © 2013 IBM Corporation 在线迁移KVM虚拟机:独立存储类型 32 IBM Confidential Requirements ● Storage sparse file must be existed on the destination host ● Virtio busses must be used for storage volumes ● Firewalls on hosts must allow remote connections ● Within same subnet so target guest network can stay up ● No guests with same name on target host ● No virtFS use ● URL of target host must be resolvable (or in /etc/hosts) from the source host # virsh migrate --live --persistent --undefinesource --copy-storage-all --verbose --desturi DestinationUR GUEST Parameters: --live: Does a live migration (--suspend for offline) --persistent: assign the target host as this guest new “home”. --transient is default, which means the migrated guest will disappear on target host reboot. --undefinesource: delete the guest from the source Host GUEST: Name of the guest to migrate DestinationURL: Location of the destination host Ex: qemu+ssh://host2.example.com/system
  • 33. © 2013 IBM Corporation33 IBM Confidential