Information Technology Reference
In-Depth Information
it does not support 64-bit virtual machines on 32-bit hosts. For more information,
Within the KVM architecture, a virtual machine is implemented as a Linux
process and, therefore, is scheduled by the Linux scheduler. Device emulation is
handled by a modified version of QEMU that provides an emulated BIOS, PCI
bus, USB bus, and a standard set of devices such as IDE and SCSI disk controllers
and network cards.
To provide the security and isolation for the virtual machine running as
a Linux process, the standard Linux security model is used. The Linux kernel
uses Security-Enhanced Linux (SELinux) to add mandatory access controls and
multilevel and multicategory security as well as provide policy enforcement. The
provide an infrastructure that allows an administrator to define policies for vir-
tual machine isolation. The default state of sVirt ensures that a virtual machine's
resources cannot be accessed by any other process or virtual machine. This default
state can be extended by the administrator to define fine-grained permissions—
for example, to group virtual machines together to share resources.
Red Hat Enterprise Virtualization key features include the following:
Windows, Solaris, and Linux guests
■
Live migration
■
High availability
■
Dynamic system scheduling
■
Power-saving features
■
Maintenance manager
■
Image and template manager
■
Thin provisioning for server and desktop guests
■
Shared SAN, iSCSI, and NAS storage
■
Centralized multiserver management with Red Hat Enterprise Virtualization
Manager
■
Search WWH ::
Custom Search