Академический Документы
Профессиональный Документы
Культура Документы
in Virtualization
Study Guide
Matthew Pearson
matthewp@linuxacademy.com
Configure RHV-M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Connect to the Administration Portal for the Red Hat Virtualization Manager . . . . . . . . . 3
Configure Red Hat Virtualization Manager to authenticate against an external IPA service 4
Installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Add one or more Red Hat Virtualization Hypervisor instances to Red Hat Virtualization Manager 8
Create Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Manage Storage 9
1
Attach and Detach Storage Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Removing a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Cluster Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
IO Threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Edit IO Threads: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Virtual Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Prerequisites: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2
Optimize Live Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Create Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Create a Snapshot: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Delete a Snapshot: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Import Existing Virtual Machine Images Into Red Hat Virtualization Manager . . . . . . . . . 21
3
Delete Virtual Machine Templates: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Edit Gateway: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
# yum update
Configure RHV-M
1. Run the engine-setup command to begin configuration for the RHV-M:
# engine-setup
3. Configure I/O proxy to allow manager to upload virtual disks into storage domains:
4. Configure a websocket proxy server to allow users to connect to virtual machines via the noVNC or
HTML 5 consoles:
Please note: Data Warehouse is required for the engine. If you choose not to configure
it on this host, you have to configure it on a remote host, and then configure the
engine on this host so that it can access the database of the remote Data Warehouse
host.
Configure Data Warehouse on this host (Yes, No) [Yes]:
6. Allow access to the virtual machine serial console from the command line (manager used as proxy):
7. Accept the automatically detected hostname, or enter an alternative hostname and press Enter:
Host fully qualified DNS name of this server [autodetected host name]:
8. You can either let engine-setup automatically configure the ports used by the Manager for external
configuration, or you can do it manually.
1
Red Hat Certified Specialist in Virtualization Linux Academy
Note: Only automatically configure the firewall if that is specified on the exam, otherwise just
use the No option:
9. Choose local or remote PostgreSQL database for the Data Warehouse (choose Local and Automatic
unless otherwise specified):
10. Chose local or remote PostgreSQL database for the Manager database (choose Local and Automatic
unless otherwise specified):
11. Set a password for the automatically created administrative user for the Red Hat Virtualization Man-
ager:
12. Select the application mode as Gluster, Virt, or Both (the Both option offers the greatest flexibility
and will be your choice for most cases):
13. Set the default value for the wipe_after_delete flag. This will wipe the blocks of a virtual disk upon
deletion:
14. Provide an organization name for certificate (use default unless specified):
2
Red Hat Certified Specialist in Virtualization Linux Academy
15. Allow engine-setup to make the landing page for the Manager the default presented by the Apache
web server (optional):
Setup can configure the default page of the web server to present the application
home page. This may conflict with existing applications.
Do you wish to set the application as the default web page of the server?
(Yes, No) [Yes]:
16. Choose to use the default self-signed certificate for SSL (HTTPS). You may choose to configure a
separate SSL certificate:
Setup can configure apache to use SSL using a certificate issued from the internal CA.
Do you wish Setup to configure that, or prefer to perform that manually?
(Automatic, Manual) [Automatic]:
17. Configure the Manger to use a local ISO domain (select No unless specified otherwise):
Configure an NFS share on this server to be used as an ISO Domain? (Yes, No) [No]:
18. If you chose to set up the Data Warehouse locally, you can configure how long it will retain col-
lected data (Basic is recommended when housing the Data Warehouse and Manager on the same
machine):
2. Click on Administration Portal and you will be directed to an SSO login page.
3. Use the admin user, with the credentials that you provided during the installation/configuration of
the Manager, then click Log in (using the internal domain for the admin user).
4. To sign out of the Manager, click on your username in the header bar and click Sign Out.
3
Red Hat Certified Specialist in Virtualization Linux Academy
# ovirt-engine-extension-aaa-ldap-setup
1 - Single server
2 - DNS domain LDAP SRV record
3 - Round-robin between multiple hosts
4 - Failover between multiple hosts
Please select:
4
Red Hat Certified Specialist in Virtualization Linux Academy
• Option 1: The DNS servers listed in /etc/resolve.conf will be used to resolve the IP address.
• Option 2: Enter the fully qualified domain name (FQDN) or the IP address of the LDAP server.
• Option 3: Enter a space-separated list of LDAP servers using either IP address or the FQDN of
the servers. This policy provides load balancing between the LDAP servers using the round-
robin algorithm.
• Option 4: Enter a space-separated list of LDAP servers using either IP address or the FQDN
of the servers. This policy defines the first LDAP server listed as the primary LDAP server to
receive queries. If the primary LDAP server fails, the queries will start going to the next server
on the list.
6. Select the secure protocol that your LDAP server supports and specify the method to obtain the
PEM-encoded CA certificate:
Note:
It is highly recommended to use secure protocol to access the LDAP server.
Protocol startTLS is the standard recommended method to do so.
Only in cases in which the startTLS is not supported, fallback to non standard ldaps
protocol.
Use plain for test environments only.
Please select protocol to use (startTLS, ldaps, plain) [startTLS]:
Please select method to obtain PEM encoded CA certificate
(File, URL, Inline, System, Insecure):
Please enter the password:
7. Enter the search user distinguished name (DN) for a user that has permission to view all the users
and groups on the directory server. This must be done in LDAP annotation as specified in the
example:
9. Choose whether or not to use single sign-on (SSO) for virtual machines:
Are you going to use Single Sign-On for Virtual Machines (Yes, No) [Yes]:
5
Red Hat Certified Specialist in Virtualization Linux Academy
Note: Select the correct profile in the drop-down list when logging in to the Red Hat Virtualiza-
tion Manager.
Note:
It is highly recommended to test drive the configuration before applying it into engine.
Login sequence is executed automatically, but it is recommended to also execute Search
sequence manually after successful Login sequence.
Please provide credentials to test login flow:
Enter user name:
Enter user password:
[ INFO ] Executing login sequence...
[ INFO ] Login sequence executed successfully
12. Confirm that user details are correct. If not, choose Abort:
Please make sure that user details are correct and group membership meets expectations
(search for PrincipalRecord and GroupRecord titles).
Abort if output is incorrect.
Select test sequence to execute (Done, Abort, Login, Search) [Abort]:
Select test sequence to execute (Done, Abort, Login, Search) [Search]: Search
Select entity to search (Principal, Group) [Principal]:
Term to search, trailing '*' is allowed: testuser1
Resolve Groups (Yes, No) [No]:
Select test sequence to execute (Done, Abort, Login, Search) [Abort]: Done
[ INFO ] Stage: Transaction setup
[ INFO ] Stage: Misc configuration
[ INFO ] Stage: Package installation
[ INFO ] Stage: Misc configuration
[ INFO ] Stage: Transaction commit
[ INFO ] Stage: Closing up
CONFIGURATION SUMMARY
Profile name is: redhat.com
The following files were created:
/etc/ovirt-engine/aaa/redhat.com.properties
/etc/ovirt-engine/extensions.d/redhat.com.properties
6
Red Hat Certified Specialist in Virtualization Linux Academy
/etc/ovirt-engine/extensions.d/redhat.com-authn.properties
[ INFO ] Stage: Clean up
Log file is available at
/tmp/ovirt-engine-extension-aaa-ldap-setup-20171004101225-mmneib.log:
[ INFO ] Stage: Pre-termination
[ INFO ] Stage: Termination
15. Restart the ovirt-engine service to allow the newly created profile to be available:
# rm -f /etc/ovirt-engine/extensions.d/profile1-authn.properties
# rm -f /etc/ovirt-engine/extensions.d/profile1-authz.properties
# rm -f /etc/ovirt-engine/aaa/profile1.properties
3. Navigate to the Administration Portal, and in the Users tab, select the users of this provider and
click Remove.
7
Red Hat Certified Specialist in Virtualization Linux Academy
Installation steps
1. Start the machine you wish to perform the installation on, with the bootable media connected.
2. At the boot menu, choose the Install option and press Enter.
4. Select a timezone from the Date & Time screen. Click Done.
6. Select the device on which to install the RHVH from the Installation Destination screen (Use Auto-
matically configure unless your install needs specific partitioning). Click Done.
7. Select a network from the Network & Host Name screen and click Configure. Enter a hostname
name in the Hostname field. Click Done.
9. During the installation, set a root password and create an additional user (if desired).
Note: For automating RHVH deployments through a kickstart file, follow the documentation
provided by Red Hat.
2. Click New.
3. Use the drop-down list to select Data Center and the Host Cluster.
4. Enter the Name and Address for the new host (standard SSH port is auto-filled in the SSH Port
field).
• Enter the root password, or copy the SSH key displayed in the SSH PublicKey field onto the
host for public key authentication.
6. Click Advanced Parameters to disable automatic firewall configuration (optional) or add SSH fin-
gerprint (optional).
7. Configure power management if the host has a supported power management card (optional).
8
Red Hat Certified Specialist in Virtualization Linux Academy
8. Click OK.
The new host will display in the list of hosts. You can view the installation progress in the details pane.
Once the host has installed, it will display as Up.
Note: The default for --scope is all. You must specify a file name, --file, for the tar file that
is created by the engine-backup command as well as a name for the log file, --log.
2. When restoring over an existing install, shutdown the manager (systemctl stop ovirt-engine)
and run engine-cleanup to remove the configuration files and clean the database.
Note: You must specify the tar file created by the backup using --file=file_name. You will
also need to specify a log file, --log=log_file_name, for the restore.
4. Once the restore is complete, you need to run the engine-setup command to configure the restored
Manager.
Manage Storage
Configure Storage Domain
Storage Domain Types
• Data: Stores the virtual disk, OVFs, templates, and snapshots
9
Red Hat Certified Specialist in Virtualization Linux Academy
• ISO: Stores ISO files used for installing and booting operating systems (NFS ONLY)
• Export: Temporary storage used to copy and move images between data centers and Red Hat
Virtualization environments (NFS ONLY)
# groupadd kvm -g 36
# useradd vdsm -u 36 -g 36
# mkdir -p /exports/data
# mkdir -p /exports/ISO
# mkdir -p /exports/export
/exports/data hostname(rw)
/exports/ISO. ip(rw)
/exports/export *.example.com(rw)
8. Export directories:
# exportfs -a
10
Red Hat Certified Specialist in Virtualization Linux Academy
4. Accept the defaults for Data Center, Domain Function, Storage Type, Format, and Use Host lists.
6. Click OK.
• This can take a little while depending on the size of the image and the network bandwidth.
4. Select the Storage Type(Shared/Local), Compatibility Version(4.1), and Quota Mode(Disabled) from
the drop-down menus.
5. Click OK to create the data center and open the New Data Center - Guide Me window.
6. Configure entities through the Guide Me window in order to complete creation (cluster, host, and
storage domain must be configured to create data center).
11
Red Hat Certified Specialist in Virtualization Linux Academy
Note: The data center will remain Uninitialized until a cluster, host, and storage domain are
configured for it.
2. Click the Data Centers tab and select the data center you wish to remove.
3. Click Remove which will open the Remove Data Center(s) confirmation window.
4. Click OK.
3. For data domain, Click Attach Data and select the check box for the data domain(s) you want to
attach.
4. For ISO domain, Click Attach ISO and select the radio button for the ISO domain you wish to attach.
5. For Export domain, Click Attach Export and select the radio button for the Export domain you wish
to attach.
3. Select the storage domain to detach. If the storage domain is Active, click Maintenance, then click
OK to put the storage domain into maintenance mode.
4. Click OK to finish.
2. Click the Permissions tab in the details pane to list the assigned users, the user’s role, and the
inherited permissions for a particular resource.
12
Red Hat Certified Specialist in Virtualization Linux Academy
3. Click Add.
4. Enter the name or username of an existing user in the Search text block and click Go. Select a user
from the results.
2. Click New.
3. Choose the Data Center the cluster will belong to from the drop-down.
6. Select the CPU Architecture and CPU Type from the drop-down lists.
• Enable Gluster Service is only for Gluster-enabled hosts, and it not compatible with Red Hat
Virtualization Hosts.
• Set Enable to set VM maintenance reason to enable a reason field for when the virtual ma-
chine is shut down.
• Set Enable to set Host maintenance reason to enable a reason field for when the host is set
into maintenance mode.
• Select the random number generator to be /dev/hwrng source. The /dev/urandom source
is enabled by default.
10. Click the Optimization tab to select the memory page threshold for the cluster (optional). You can
enable the CPU thread handling and memory ballooning for the hosts on the cluster:
• Setting these options will allow VM to run at 200% of memory allocated and also utilize more
threads than specified for the VM.
• These resources are temporarily taken from other VMs in the cluster.
11. Click the Migration Policy tab to define the virtual machine migration policy.
13
Red Hat Certified Specialist in Virtualization Linux Academy
13. Click the Console tab to (optionally) override the global SPICE policy and set the address for a SPICE
proxy host for the cluster.
15. Click the MAC Address Pool specify a mac address pool other than the default.
16. Click OK to create the cluster. This will open the Guide Me window for configuring entities.
Removing a Cluster
Note: Move all hosts out of a cluster before removing it. Also, you cannot remove the Default cluster
because it holds the Blank template. However, you can rename the Default cluster, and add it to a
new data center.
1. Find the cluster by using the resource tab, tree mode, or search function. Then select it.
3. Click Remove.
Cluster Permissions
Please see section on Assign User or Administrator Role to a Resource, as the process for setting permis-
sions is the same.
3. Enter Name.
• Attach (existing)
• Create (new) virtual disk
14
Red Hat Certified Specialist in Virtualization Linux Academy
7. Choose the First Device that the virtual machine will boot from (under Boot Options).
9. click OK.
Note: Installing the Linux Guest agents and Drivers will allow for monitoring as well as graceful
shutdowns. To install on Linux:
1. Enable repo:
To shut down:
• Click the shut down button (looks like a red down arrow):
To suspend:
15
Red Hat Certified Specialist in Virtualization Linux Academy
To reboot:
• Click the reboot button (looks like a green circle with an arrow):
• Name
• Description
• Comment
• Delete Protection
• Network Interfaces
• Memory Size
• Virtual Sockets
• Highly Available
• Icon
16
Red Hat Certified Specialist in Virtualization Linux Academy
IO Threads
Edit IO Threads:
1. Select the IO Threads Enabled check box (default count is 1).
2. Click OK.
If you increase the number of IO threads, you must reactivate the disks so that they will be remapped
according to the the new number of controllers:
Network Interfaces
Add a network interface:
1. Click the Virtual Machines tab and select a virtual machine.
3. Click New.
6. Select the Custom MAC address check box and enter MAC address as needed.
7. Click OK.
3. Click Edit.
4. Change settings as required (Name, Profile, Type, and Custom MAC address).
5. Click OK.
17
Red Hat Certified Specialist in Virtualization Linux Academy
3. Click Remove.
4. Click OK.
Virtual Disks
Add a new virtual disk:
1. Click the Virtual Machines tab and select a virtual machine.
3. Click New.
3. Pick an interface:
5. Allocation policy:
• Preallocated allocates the entire size of the disk at the time of creation.
• Thin Provision allocates 1 GB at the point of disk creation and sets a maximum limit to which
the disk can grow.
6. Disk Profile: Define maximum throughput for a virtual disk. The profile is defined on the storage
domain based on the quality of service (QoS) that has been created.
8. Wipe after Delete: Enable enhanced security for deletion of sensitive material when virtual disk is
deleted.
10. Shareable: Attach the virtual disk to more than one VM at a time.
11. Read Only: Set the disk as read only. You can attach the disk as writable to another virtual machine.
12. Enable Discard: Shrink a thinly provisioned disk while the VM is up.
18
Red Hat Certified Specialist in Virtualization Linux Academy
3. Click Attach.
5. Click OK.
3. Click Edit and enter a value in the Extend size by(GB) field.
4. Click OK.
3. Click Deactivate.
4. Click OK.
5. Click Remove (select Remove Permanently to remove the disk from the environment).
6. Click OK.
Prerequisites:
1. Source/Destination hosts are members of same cluster.
3. Source/Destination hosts have access to the same virtual networks and VLANs.
4. Source/Destination hosts have access to the data storage domain on which the VM resides.
5. A destination host has enough CPU and RAM capacity to support the new VM.
6. The migrating virtual machine cannot have the cache!=none property set.
19
Red Hat Certified Specialist in Virtualization Linux Academy
# engine-config -s DefaultAutoConvergence=True
# engine-config -s DefaultMigrationCompression=True
2. Click Edit.
2. Click the Snapshots tab in the details pane and click Create.
5. Use the Save Memory check box if you want to include the virtual machines memory in the snap-
shot.
6. Click OK.
20
Red Hat Certified Specialist in Virtualization Linux Academy
Delete a Snapshot:
1. Click Virtual Machines and select a VM.
3. Select a snapshot.
4. Click the drop-down menu beside Preview to open the Custom Preview Snapshot window.
5. Use the check boxes to select the VM Configuration, Memory, and disk(s) to create and restore
from a customized snapshot using the configuration of multiple snapshots, then click OK.
6. Start the virtual machine (it runs using the disk image of the snapshot).
7. Click Commit to permanently restore the virtual machine to the condition of the snap shot (this will
erase any subsequent snapshots).
8. You can (alternatively) click Undo to return to the previous state of the virtual machine deactivating
the snapshot.
5. Click OK.
• V2V: Feature that allows you to import virtual machines from other providers like VMware or Zen.
21
Red Hat Certified Specialist in Virtualization Linux Academy
Note: The Export domain holds two directories for each VM or template - one holds OVF and one
holds the disk image(s)
2. Click Export.
3. Select Force Override (optionally) to override existing images of the VM or Collapse Snapshots
which creates a single export volume per disk. This option will remove snapshot restore points and
includes the template for template-based VMs (you can also choose to export the template if the
VM is dependent upon a template)
4. Click OK.
Note: The Virtual Machine must be shut down before it can be exported.
5. Select the Collapse Snapshots check box to remove snapshot restore points and include templates
(for template-based VMs).
6. Click the VM to be imported and click the Disks sub-tab. From there you can use the Allocation
Policy and Storage Domain to configure the disk(s).
7. Click OK.
Note: The Export domain must be attached before you can import the VM into a new data center.
Also Note: If the VM already exists, the Import Virtual Machine Conflict window will open allowing
you to address the conflict. You can choose Don’t import or Import as cloned.
2. Ensure that the qemu user and kvm group have read/write permissions on the file:
22
Red Hat Certified Specialist in Virtualization Linux Academy
4. Select VMware Virtual Appliance (OVA) from the Source list, the host with the OVA file, the path to
the file, then click Load and select one more virtual machines from the list.
5. Click Next.
6. Select the Target Cluster, CPU Profile, Allocation Policy, Attach VirtIO-Drivers (optionally), and
Operating System (per virtual machine). From the Network Interfaces sub-tab, select the Network
Name and Profile Name. From the Disks sub-tab, you can view the Alias, Virtual Size, and Actual
Size of the virtual machine.
2. Set user password (you must set --password-valid-to or the password expiry will default to the
current time):
4. Edit a user:
5. Remove a user:
23
Red Hat Certified Specialist in Virtualization Linux Academy
Note: You can use the –help option to get more information about a particular command such
as ovirt-aaa-jdbc-tool user add --help
6. Add a group:
1. In the Administration Portal on the header bar, click Configure to open the configure window. Click
System Permissions.
3. Select a profile under Search. This profile should be the name of the external LDAP domain. Enter
a name or part of a name and Click Go. Just clicking Go without putting in a name will show all of
the available users.
5. Under Role to Assign select an appropriate role. Assigning the UserRole gives permission to login to
the user portal.
6. Click OK.
2. Click New.
5. Use the Expand All or Collapse All buttons to view more or fewer permissions options.
6. For each object, select or clear the actions you wish to permit or deny.
24
Red Hat Certified Specialist in Virtualization Linux Academy
4. Select a profile under Search. This profile should be the name of the external LDAP domain. Enter
a name or part of a name and Click Go. Just clicking Go without putting in a name will show all of
the available users.
6. Under Role to Assign select an appropriate role. Assigning the UserRole gives permission to login to
the user portal.
7. Click OK.
5. Select the cluster to associate the template with from the Cluster drop-down.
6. Optional steps:
7. Under Disks Allocation enter an Alias for the disk, select a Format, select a storage domain from
the Target drop-down, and the Disk Profile (by default they are the same as the source VM).
25
Red Hat Certified Specialist in Virtualization Linux Academy
8. Select Allow all users to access this Template to make the template public.
9. Select the Copy VM permissions check box to copy the permissions of the source virtual machine
to the template.
10. Select Seal Template check box (for Linux only) to seal the template. This removes the system-
specific details from the VM.
2. Select a template.
3. Click Edit.
4. Click OK.
2. Select a template.
3. Click Remove.
4. Click OK.
Note: You cannot delete a template that has been used to create VMs using the thin provisioning
storage option.
5. Enter a Name, Description, and any Comments (accept defaults of template or change if required).
9. Click OK.
26
Red Hat Certified Specialist in Virtualization Linux Academy
5. Enter a Name, Description, and any Comments (accept defaults of template or change if required).
2. Click Edit.
3. Click the Initial Run tab and select the Use Cloud-Init/Sysprep check box.
27
Red Hat Certified Specialist in Virtualization Linux Academy
5. Select the Configure Time Zone check box and select a time zone from the Time Zone drop-down
list.
6. Expand the Authentication section and select Use already configured password to use the existing
credentials, or clear the check box and enter a root password in the Password and Verify Password
text fields to specify a new root password.
7. Enter any SSH keys to be added in the SSH Authorized Keys text area.
8. Select the Regenerate SSH Keys check box to regenerate SSH keys for the virtual machine.
11. Select the Network check box and use the + or - to add or remove network interfaces (specify correct
name and number for interface).
12. Expand the Custom Script section and enter any custom scripts.
3. Click the Initial Run section and select the Cloud-Init check box.
5. Select the Configure Time Zone check box and select a time zone from the Time Zone drop-down
list.
6. Select Use already configured password to use the existing credentials, or clear the check box
and enter a root password in the Password and Verify Password text fields to specify a new root
password.
7. Enter any SSH keys to be added in the SSH Authorized Keys text area.
8. Select the Regenerate SSH Keys check box to regenerate SSH keys for the virtual machine.
11. Select the Network check box and use the + or - to add or remove network interfaces (specify correct
name and number for interface).
28
Red Hat Certified Specialist in Virtualization Linux Academy
2. Click the Logical Networks tab of the details pane to list existing logical networks.
3. For Data Centers, click New to open the New Logical Networks window. For Clusters, click Add Net-
work to open the New Logical Networks window.
10. From the Cluster tab, select clusters to assign the logical network to.
11. If Create an external provider was selected, the Subnet tab will be visible. You can create a subnet
by entering the following: Name, CIDR, Gateway, and IP Version.
12. Add vNIC profiles as required through the vNIC Profiles tab.
1. Click the Data Centers tab and select the data center of the logical network.
3. Select the logical network and click Remove. You can select to remove any external network from
the provider as well.
4. Click OK.
29
Red Hat Certified Specialist in Virtualization Linux Academy
3. Click Edit.
Edit Gateway:
1. Click the Hosts tab and select a host.
• Hover over an assigned logical network and click the pencil icon.
• Assign: Assigns the logical network to all the hosts in the cluster.
• Required: Network must remain operational in order for hosts to function properly.
• VM Network: Carries traffic relevant to the virtual machine network.
• Display Network: Carries network traffic relevant to SPICE and to the virtual network controller.
• Migration Network: Carries virtual machine and storage migration traffic.
4. QoS: drop-down list of available QoS (quality of service) profiles that regulate inbound and outbound
network traffic to vNIC
30
Red Hat Certified Specialist in Virtualization Linux Academy
5. Network Filter: Drop-down list of available network filters to apply to vNIC profile:
• Improves security by filtering the types of packets that can be sent to and from virtual ma-
chines
• No Network Filter should be used for virtual machine VLANs and bonds:
• Not having a filter can also improve performance
• Enabling Passthrough will disable QoS, network filters, and port mirroring
8. Port Mirroring: Copies layer 3 network traffic on the logical network to a virtual interface on a virtual
machine:
9. Device Custom Properties: Drop-down menu to select available custom properties to apply to the
vNIC profile.
10. Allow all users to use this Profile: Makes profile available to all users.
Remove vNIC profile by navigating to Networks (select a logical network)> Profiles> select one or more
profiles and click Remove > OK.
Configure user permissions by navigating to Networks (select a logical network) > vNIC Profiles > Permis-
sions > click Add (or Remove) > in Add Permissions to User click My Groups.
3. Click the Setup Host Networks button to open the Setup Host Networks window.
4. Attach a logical network to a physical host network interface by selecting and dragging the log-
ical network into the Assigned Logical Networks area next to the physical host network interface.
Alternatively, right-click the logical network and select a network interface from the drop-down.
5. To configure the logical network, hover your cursor over an assigned logical network and click the
pencil icon.
6. Check network connectivity by selecting the Verify connectivity between Host and Engine:
31
Red Hat Certified Specialist in Virtualization Linux Academy
7. To make the changes persistent when the environment is rebooted, select the Save network con-
figuration check box.
8. Click OK.
32