Line 40: | Line 40: | ||
[http://www.redhat.com/mailman/listinfo/fedora-xen fedora-xen list]. | [http://www.redhat.com/mailman/listinfo/fedora-xen fedora-xen list]. | ||
==== | ==== Which Xen Configuration Files ==== | ||
Urs Golla was | |||
confused<ref>http://www.redhat.com/archives/fedora-xen/2009-March/msg00043.html</ref> "about the configuration files for XEN user domains in Fedora." | |||
Regarding to the Users’ Manual | |||
for Xen v3.3 from xensource the configuration files should still be in | |||
/etc/xen/ like they are on RHEL5. However, on F8 they are somewhere in | |||
/var/lib/xen and have a new format (not XML?)." | |||
[[MarkusArmbruster|Markus Armbruster]]<ref>http://www.redhat.com/archives/fedora-xen/2009-March/msg00053.html</ref> | |||
"Xen uses *two* native configuration file formats: S-expressions and a | |||
Python-like syntax. The .sxp files you found below /var/lib/xend/ use | |||
the former syntax, the guest configuration in /etc/xen the latter." | |||
and | |||
[[DanielBerrange|Daniel P. Berrange]]<ref>http://www.redhat.com/archives/fedora-xen/2009-March/msg00054.html</ref> | |||
explained Xen uses two different configuration formats. | |||
* "'<code>xend</code>' use <code>/var/lib/xend</code> for storing master config files in SXPR<ref>http://en.wikipedia.org/wiki/S-expression</ref> format." | |||
* '<code>xm</code>' abuses python as a config file format in <code>/etc/xen</code>. | |||
XenD itself has | |||
no knowledge of these files, so it can't manage them. They should not | |||
be used in Xen >= 3.0.4 If you have existing files in /etc/xen, then you | |||
can load them into XenD by doing 'xm new configname', at which point | |||
both Xend and libvirt will be able to manage them. For Xen < 3.0.4 | |||
libvirt has some limited support for reading /etc/xen files directly" | |||
Fedora 7 and 8 were based on Xen 3.1 | |||
F9 3.2, F10 3.3. | |||
<references /> | <references /> | ||
Revision as of 23:21, 22 March 2009
Virtualization
In this section, we cover discussion on the @et-mgmnt-tools-list, @fedora-xen-list, @libvirt-list and @ovirt-devel-list of Fedora virtualization technologies.
Contributing Writer: Dale Bewley
Enterprise Management Tools List
This section contains the discussion happening on the et-mgmt-tools list
Virt-p2v and RAID Controller Drivers
Based on Fedora 10, "virt-p2v
is an experimental live CD for migrating physical machines to virtual machine guests." [1]
Jonathan Pregler[2]
and
Nick Haunold asked about a lack of HP and Dell RAID drivers in virt-p2v
. No answer was found, but
Jonathan Pregler is now working[3] on creating a SUSE live CD with virt-p2v
and the RAID drivers embedded.
NetWare Support added to virtinst
John Levon
patched[1]
python-virtinst
to support NetWare PV installs.
Fedora Virtualization List
This section contains the discussion happening on the fedora-virt list.
Fedora Xen List
This section contains the discussion happening on the fedora-xen list.
Which Xen Configuration Files
Urs Golla was confused[1] "about the configuration files for XEN user domains in Fedora."
Regarding to the Users’ Manual
for Xen v3.3 from xensource the configuration files should still be in /etc/xen/ like they are on RHEL5. However, on F8 they are somewhere in /var/lib/xen and have a new format (not XML?)."
Markus Armbruster[2] "Xen uses *two* native configuration file formats: S-expressions and a Python-like syntax. The .sxp files you found below /var/lib/xend/ use the former syntax, the guest configuration in /etc/xen the latter."
and Daniel P. Berrange[3] explained Xen uses two different configuration formats.
- "'
xend
' use/var/lib/xend
for storing master config files in SXPR[4] format." - '
xm
' abuses python as a config file format in/etc/xen
.
XenD itself has
no knowledge of these files, so it can't manage them. They should not be used in Xen >= 3.0.4 If you have existing files in /etc/xen, then you can load them into XenD by doing 'xm new configname', at which point both Xend and libvirt will be able to manage them. For Xen < 3.0.4 libvirt has some limited support for reading /etc/xen files directly"
Fedora 7 and 8 were based on Xen 3.1 F9 3.2, F10 3.3.
Libvirt List
This section contains the discussion happening on the libvir-list.
Xen PCI Device Passthrough
A patch[1] from Daniel P. Berrange "provides initial support for PCI device passthrough in Xen, at time of boot. It does not (yet) implement device hotplug for PCI". "XenD only supports 'unmanaged' PCI devices - ie mgmt app is responsible for detaching/reattaching PCI devices from/to host device drivers. XenD itself won't automatically do this".
Secure Guest Migration Draft Patch
Chris Lalancette followed[1] the RFC[2] of last week with a "rough first draft of the secure migration code" and sought comments on the approach before putting the final polish on it.
Daniel Veillard wasn't enitrely satisfied[3] with the "costs related to the 64KB chunking imposed by the XML-RPC" and was "Trying to reopen a bit the discussion we had before on opening a separate encrypted connection". Daniel Veillard "would like to make sure we have room in the initial phase to add such a negociation where an optimal solution" on a dedicated TCP/IP connection "may be attempted, possibly falling back to a normal XML-RPC solution".
Daniel P. Berrange
pointed[4] out
"This isn't XML-RPC. This is our own binary protocol using XDR encoding,
which has very little metadata overhead - just a single 24 byte header
per 64kb of data.", and poposed a 'MIGRATION_INCOMING' message which could
cause libvirted
to "switch the TCP channel to 'data stream' mode."
Chris Lalancette tested the migration code and found the draft secure migration caused a "slowdown of between 1.5 and 3 times". "What I'm going to do early next week is do some additional work to try to get DanB's suggestion of the STREAM_DATA RPC working. Then I'll try benchmarking (both for duration, and CPU usage)".
More Flexible x86 Emulator Choice
Daniel P. Berrange
explained[1]
the current libvirt
restricts
"what emulator binary we allow for QEMU guests on x86 arches".
"This patch makes QEMU driver more flexible" ... "when setting up
its capabilities information."
"This should finally remove the confusion where a user in virt-manager
selectrs 'i686' and then wonders why we've disallowed choice of 'kvm'.
It also fixes 'virsh version' when only qemu-kvm is installed."
The path to each emulator binary is hardcoded in libvirt
.
Daniel Veillard
found[2] this approach "worrying".
The merge[3]
of qemu
and kvm
will make the reliance on a pathname to determine a binary's capabilities even less tenable.
Daniel P. Berrange agreed [4] "this approach we're currently using has pretty much reached the end of its practicality. In particular it is impossible to solve the problem of figuring out whether a plain 'qemu' binary supports kvm natively. To adress that, we'd actually need to run the binary and probe its output. This would require pretty much re-writing this entire capabilities setup logic from scratch. Similarly coping with varying path locations is another problem we can't easily solve with this current code."