From dd68643d07286f2688ff18262c42544db9b3e9d3 Mon Sep 17 00:00:00 2001 From: Glen Rundblom Date: Sun, 22 Feb 2015 18:56:38 -0600 Subject: added information about boxes in the products.xml file --- en-US/Products.xml | 22 ++++- en-US/Products.xml~ | 273 +++++++++++++++++++++++++++------------------------- 2 files changed, 160 insertions(+), 135 deletions(-) diff --git a/en-US/Products.xml b/en-US/Products.xml index 1d0178d..bbc299f 100644 --- a/en-US/Products.xml +++ b/en-US/Products.xml @@ -120,7 +120,7 @@ - The libvirt package is designed as a building block for higher level management tools and applications, for example, virt-manager and the virsh command-line management tools. With the exception of migration capabilities, libvirt focuses on managing single hosts and provides APIs to enumerate, monitor and use the resources available on the managed node, including CPUs, memory, storage, networking and Non-Uniform Memory Access (NUMA) partitions. The management tools can be located on separate physical machines from the host using secure protocols. + The libvirt package is designed as a building block for higher level management tools and applications, for example, virt-manager and the virsh command-line management tools. With the exception of migration capabilities, libvirt focuses on managing single hosts and provides APIs to enumerate, monitor and use the resources available on the managed node, including CPUs, memory, storage, networking and Non-Uniform Memory Access (NUMA) partitions. The management tools can be located on separate physical machines from the host using secure protocols. libvirt is the the foundation of the Gnome application: gnome-boxes is built apon. Fedora supports libvirt and included libvirt-based tools as its default method for virtualization management. @@ -561,8 +561,26 @@ - +
+Boxes + +Boxes A simple GNOME 3 application to access local and remote virtual systems. + + + Features: + + + View, access, and use: remote machines, remote and local virtual machines, and access for applications on virtual machines +View, access, and use: remote machines, remote and local virtual machines, and access for applications on virtual machines + View, access, and use virtual machines on removable media + View, access, and use shared connection / machines + Upload / publish virtual machines + Select favorites + Search for connections + +
+
Storage Storage for virtual machines is abstracted from the physical storage used by the virtual machine. It is attached to the virtual machine using the para-virtualized or emulated block device drivers. diff --git a/en-US/Products.xml~ b/en-US/Products.xml~ index 79aa32c..5927ecd 100644 --- a/en-US/Products.xml~ +++ b/en-US/Products.xml~ @@ -23,7 +23,7 @@ - Overcommitting involves possible risks to system stability. For more information on overcommitting with KVM, and the precautions that should be taken, refer to the Fedora Virtualization Administration Guide. + Overcommitting involves possible risks to system stability. For more information on overcommitting with KVM, and the precautions that should be taken, refer to the Fedora Virtualization Deployment and Administration Guide. @@ -36,7 +36,7 @@ - Thin provisioning involves possible risks to system stability. For more information on thin provisioning with KVM, and the precautions that should be taken, refer to the Fedora Virtualization Administration Guide. + Thin provisioning involves possible risks to system stability. @@ -47,18 +47,33 @@ Kernel SamePage Merging (KSM), used by the KVM hypervisor, allows KVM guests to share identical memory pages. These shared pages are usually common libraries or other identical, high-use data. KSM allows for greater guest density of identical or similar guest operating systems by avoiding memory duplication. + + + For more information on KSM, refer to the Fedora Virtualization Deployment and Administration Guide. + + + + + + QEMU guest agent + - For more information on KSM, refer to the Fedora Virtualization Administration Guide. + The QEMU guest agent runs on the guest operating system and allows the host machine to issue commands to the guest operating system. + + + For more information on the QEMU guest agent, refer to the Fedora Virtualization Deployment and Administration Guide. + + - KVM Guest VM Compatibility + KVM guest virtual machine compatibility - To verify whether your processor supports the virtualization extensions and for information on enabling the virtualization extensions if they are disabled, refer to the Fedora Virtualization Administration Guide. + To verify whether your processor supports the virtualization extensions and for information on enabling the virtualization extensions if they are disabled, refer to the Fedora Virtualization Deployment and Administration Guide. - . + Fedora supports libvirt and included libvirt-based tools as its default method for virtualization management. The libvirt package is available as free software under the GNU Lesser General Public License. The libvirt project aims to provide a long term stable C API to virtualization management tools, running on top of varying hypervisor technologies. @@ -133,7 +148,7 @@ - For more information on virt-manager, refer to the Fedora Virtualization Administration Guide. + For more information on virsh and virt-manager, refer to the Fedora Virtualization Deployment and Administration Guide.
@@ -141,11 +156,12 @@ Virtualized hardware devices Virtualization on Fedora presents three distinct types of system devices to virtual machines. The three types include: + - Virtualized and emulated software devices + Virtualized and emulated devices @@ -213,30 +229,30 @@ PS/2 mouse and keyboard - EvTouch USB Graphics Tablet + EvTouch USB graphics tablet PCI UHCI USB controller and a virtualized USB hub - Emulated serial ports EHCI controller, virtualized USB storage and a USB mouse + + USB 3.0 xHCI host controller + - - - Red Hat Enterprise Linux 6.1 and above provides an emulated (Intel) HDA sound device, intel-hda. This device is supported on the following guest operating systems: + + Fedora provides an emulated (Intel) HDA sound device, intel-hda. - + The following two emulated sound devices are also available, but are not recommended due to compatibility issues with certain guest operating systems: @@ -275,12 +291,13 @@ - --> - - Red Hat Enterprise Linux 6.0 and above provides two emulated watchdog devices. A watchdog can be used to automatically reboot a virtual machine when it becomes overloaded or unresponsive. + Fedora provides two emulated watchdog devices. A watchdog can be used to automatically reboot a virtual machine when it becomes overloaded or unresponsive. The watchdog package must be installed on the guest. @@ -291,20 +308,20 @@ - i6300esb, an emulated Intel 6300 ESB PCI watchdog device. It is supported in guest operating system Red Hat Enterprise Linux versions 6.0 and above, and is the recommended device to use. + i6300esb, an emulated Intel 6300 ESB PCI watchdog device. - ib700, an emulated iBase 700 ISA watchdog device. The ib700 watchdog device is only supported in guests using Red Hat Enterprise Linux 6.2 and above. + ib700, an emulated iBase 700 ISA watchdog device. - + - --> + Emulated network devices @@ -358,17 +375,19 @@ Para-virtualized devices are drivers for virtual devices that increase the I/O performance of virtual machines.
- Para-virtualized devices decrease I/O latency and increase I/O throughput to near bare-metal levels. It is recommended to use the para-virtualized drivers for virtual machines running I/O intensive applications. - - - The para-virtualized devices must be installed on the guest operating system. The para-virtualized drivers must be manually installed on Windows guests. + Para-virtualized devices decrease I/O latency and increase I/O throughput to near bare-metal levels. It is recommended to use the para-virtualized device drivers for virtual machines running I/O intensive applications. - For more information on using the para-virtualized drivers, refer to the Fedora Virtualization Deployment Guide. + The para-virtualized devices must be installed on the guest operating system. The para-virtualized device drivers must be manually installed on Windows guests. + + + For more information on using the para-virtualized drivers, refer to the Fedora Virtualization Deployment and Administration Guide. + + - Para-virtualized network driver (virtio-net) + The para-virtualized network driver (virtio-net) The para-virtualized network driver can be used as the driver for existing network devices or new network devices for virtual machines. @@ -376,7 +395,7 @@ - >Para-virtualized block driver (virtio-blk) + The para-virtualized block driver (virtio-blk) The para-virtualized block driver is a driver for all storage devices, is supported by the hypervisor, and is attached to the virtual machine (except for floppy disk drives, which must be emulated). @@ -384,7 +403,15 @@ - >The para-virtualized clock + The para-virtualized controller device (virtio-scsi) + + + The para-virtualized SCSI controller device provides a more flexible and scalable alternative to virtio-blk. A virtio-scsi guest is capable of inheriting the feature set of the target device, and can handle hundreds of devices compared to virtio-blk, which can only handle 28 devices. + + + + + The para-virtualized clock Guests using the Time Stamp Counter (TSC) as a clock source may suffer timing issues. KVM works around hosts that do not have a constant Time Stamp Counter by providing guests with a para-virtualized clock. @@ -392,7 +419,7 @@ - >The para-virtualized serial driver (virtio-serial) + The para-virtualized serial driver (virtio-serial) The para-virtualized serial driver is a bytestream-oriented, character stream driver, and provides a simple communication interface between the host's user space and the guest's user space. @@ -400,13 +427,21 @@ - >The balloon driver (virtio-balloon) + The balloon driver (virtio-balloon) The balloon driver can designate part of a virtual machine's RAM as not being used (a process known as balloon inflation), so that the memory can be freed for the host (or for other virtual machines on that host) to use. When the virtual machine needs the memory again, the balloon can be deflated and the host can distribute the RAM back to the virtual machine. + + The para-virtualized random number generator (virtio-rng) + + + The para-virtualized random number generator enables virtual machines to collect entropy, or randomness, directly from the host to use for encrypted data and security. Virtual machines can often be starved of entropy because typical inputs (such as hardware usage) are unavailable. Sourcing entropy can be time-consuming; virtio-rng makes this process faster by injecting entropy directly into guest virtual machines from the host. + + +
@@ -419,33 +454,33 @@ PCI device assignment - The KVM hypervisor supports attaching PCI devices on the host system to virtual machines. PCI device assignment allows guests to have exclusive access to PCI devices for a range of tasks. It allows PCI devices to appear and behave as if they were physically attached to the guest operating system. + The KVM hypervisor supports attaching PCI devices on the host system to virtual machines. PCI device assignment allows guests to have exclusive access to PCI devices for a range of tasks. It allows PCI devices to appear and behave as if they were physically attached to the guest virtual machine. Device assignment is supported on PCI Express devices, with the exception of graphics cards. Parallel PCI devices may be supported as assigned devices, but they have severe limitations due to security and system configuration conflicts. - For more information on device assignment, refer to the Fedora Virtualization Deployment Guide. + For more information on device assignment, refer to the Fedora Virtualization Deployment and Administration Guide. - >USB passthrough + USB passthrough The KVM hypervisor supports attaching USB devices on the host system to virtual machines. USB device assignment allows guests to have exclusive access to USB devices for a range of tasks. It allows USB devices to appear and behave as if they were physically attached to the virtual machine. - + - >SR-IOV + SR-IOV SR-IOV (Single Root I/O Virtualization) is a PCI Express standard that extends a single physical PCI function to share its PCI resources as separate, virtual functions (VFs). Each function is capable of being used by a different virtual machine via PCI device assignment. @@ -453,15 +488,15 @@ An SR-IOV capable PCI-e device, provides a Single Root Function (for example, a single Ethernet port) and presents multiple, separate virtual devices as unique PCI device functions. Each virtual device may have its own unique PCI configuration space, memory-mapped registers, and individual MSI-based interrupts. - + - For more information on SR-IOV, refer to the Fedora Virtualization Deployment Guide. + For more information on SR-IOV, refer to the Fedora Virtualization Deployment and Administration Guide. - >NPIV + NPIV N_Port ID Virtualization (NPIV) is a functionality available with some Fibre Channel devices. NPIV shares a single physical N_Port as multiple N_Port IDs. NPIV provides similar functionality for Fibre Channel Host Bus Adapters (HBAs) that SR-IOV provides for PCIe interfaces. With NPIV, virtual machines can be provided with a virtual Fibre Channel initiator to Storage Area Networks (SANs). @@ -469,19 +504,40 @@ NPIV can provide high density virtualized environments with enterprise-level storage solutions. - +
- Guest CPU models - t + CPU models + + CPU models define which host CPU features are available to + the guest operating system. qemu-kvm + and libvirt contain definitions for a + number of current processor models, allowing users to enable + features that are available only in newer CPU models. + The CPU feature set available to guests depends on + support in the host CPU kernel. The qemu-kvm + code must also allow the feature to be enabled. + + + To safely migrate virtual machines between hosts with different CPU + feature sets, qemu-kvm does not expose all CPU features + from the host CPU to guest operating systems by default. Instead, CPU features are + exposed to virtual machines based on the chosen CPU model. + + + It is also possible to enable or disable specific CPU features in a virtual machine's + XML configuration. However, it is safer to use predefined CPU models, as incorrect + configuration can cause compatibility issues with the guest operating system. + + - - - - Configuration details for all of these CPU models can be output with the - /usr/libexec/qemu-kvm -cpu ?dump command, but they are also stored in the - /usr/share/qemu-kvm/cpu-model/cpu-x86_64.conf file - by default. Each CPU model definition begins with [cpudef], as shown: - - [cpudef] - name = "Nehalem" - level = "2" - vendor = "GenuineIntel" - family = "6" - model = "26" - stepping = "3" - feature_edx = "sse2 sse fxsr mmx clflush pse36 pat cmov mca \ - pge mtrr sep apic cx8 mce pae msr tsc pse de fpu" - feature_ecx = "popcnt x2apic sse4.2 sse4.1 cx16 ssse3 sse3" - extfeature_edx = "i64 syscall xd" - extfeature_ecx = "lahf_lm" - xlevel = "0x8000000A" - model_id = "Intel Core i7 9xx (Nehalem Class Core i7)" - - - The four CPUID fields, feature_edx, feature_ecx, - extfeature_edx and extfeature_ecx, accept - named flag values from the corresponding feature sets listed by the - /usr/libexec/qemu-kvm -cpu ?cpuid command, as shown: - - # /usr/libexec/qemu-kvm -cpu ?cpuid -Recognized CPUID flags: - f_edx: pbe ia64 tm ht ss sse2 sse fxsr mmx acpi ds clflush pn \ - pse36 pat cmov mca pge mtrr sep apic cx8 mce pae msr tsc \ - pse de vme fpu - f_ecx: hypervisor avx osxsave xsave aes popcnt movbe x2apic \ - sse4.2|sse4_2 sse4.1|sse4_1 dca pdcm xtpr cx16 fma cid \ - ssse3 tm2 est smx vmx ds_cpl monitor dtes64 pclmuldq \ - pni|sse3 - extf_edx: 3dnow 3dnowext lm rdtscp pdpe1gb fxsr_opt fxsr mmx \ - mmxext nx pse36 pat cmov mca pge mtrr syscall apic cx8 \ - mce pae msr tsc pse de vme fpu - extf_ecx: nodeid_msr cvt16 fma4 wdt skinit xop ibs osvw \ - 3dnowprefetch misalignsse sse4a abm cr8legacy extapic svm \ - cmp_legacy lahf_lm - - These feature sets are described in greater detail in the appropriate Intel - and AMD specifications. - - - It is important to use the check flag to verify that all - configured features are available. - - # /usr/libexec/qemu-kvm -cpu Nehalem,check -warning: host cpuid 0000_0001 lacks requested flag 'sse4.2|sse4_2' [0x00100000] -warning: host cpuid 0000_0001 lacks requested flag 'popcnt' [0x00800000] - - If a defined feature is not available, those features will fail silently - by default. - - + --> + + + For more information on CPU model availability and configuration, refer + to the Fedora Virtualization Deployment and Administration Guide. + +
- +
+Boxes + +Boxes A simple GNOME 3 application to access remote or virtual systems. + + + Features: + + + View, access, and use: remote machines, remote and local virtual machines, and access for applications on virtual machines +View, access, and use: remote machines, remote and local virtual machines, and access for applications on virtual machines + View, access, and use virtual machines on removable media + View, access, and use shared connection / machines + Upload / publish virtual machines + Select favorites + Search for connections + +
+
Storage Storage for virtual machines is abstracted from the physical storage used by the virtual machine. It is attached to the virtual machine using the para-virtualized or emulated block device drivers. @@ -581,7 +588,7 @@ warning: host cpuid 0000_0001 lacks requested flag 'popcnt' [0x00800000]
Storage pools - A storage pool is a file, directory, or storage device managed by libvirt for the purpose of providing storage to virtual machines. Storage pools are divided into storage volumes that store virtual machine images or are attached to virtual machines as additional storage. Multiple guests can share the same storage pool, allowing for better allocation of storage resources. Refer to the Fedora Virtualization Administration Guide for more information. + A storage pool is a file, directory, or storage device managed by libvirt for the purpose of providing storage to virtual machines. Storage pools are divided into storage volumes that store virtual machine images or are attached to virtual machines as additional storage. Multiple guests can share the same storage pool, allowing for better allocation of storage resources. @@ -596,21 +603,21 @@ warning: host cpuid 0000_0001 lacks requested flag 'popcnt' [0x00800000] Networked (shared) storage pools - Networked storage pools include storage devices shared over a network using standard protocols. Networked storage is required for migrating virtual machines between hosts. Networked storage pools are managed by libvirt. + Networked storage pools include storage devices shared over a network using standard protocols. Networked storage is required when migrating virtual machines between hosts with virt-manager, but is optional when migrating with virsh. Networked storage pools are managed by libvirt. - +
- Storage Volumes + Storage volumes - Storage pools are further divided into storage volumes. Storage volumes are an abstraction of physical partitions, LVM logical volumes, file-based disk images and other storage types handled by libvirt. Storage volumes are presented to virtualized guests as local storage devices regardless of the underlying hardware. + Storage pools are further divided into storage volumes. Storage volumes are an abstraction of physical partitions, LVM logical volumes, file-based disk images and other storage types handled by libvirt. Storage volumes are presented to virtual machines as local storage devices regardless of the underlying hardware. - For more information on storage and virtualization, refer to the Fedora Virtualization Administration Guide. + For more information on storage and virtualization, refer to the Fedora Virtualization Deployment and Administration Guide.
-- cgit