Information Technology Reference
In-Depth Information
it does not support 64-bit virtual machines on 32-bit hosts. For more information,
see http://www.linux-kvm.org .
Within the KVM architecture, a virtual machine is implemented as a Linux
process and, therefore, is scheduled by the Linux scheduler. Device emulation is
handled by a modified version of QEMU that provides an emulated BIOS, PCI
bus, USB bus, and a standard set of devices such as IDE and SCSI disk controllers
and network cards.
To provide the security and isolation for the virtual machine running as
a Linux process, the standard Linux security model is used. The Linux kernel
uses Security-Enhanced Linux (SELinux) to add mandatory access controls and
multilevel and multicategory security as well as provide policy enforcement. The
sVirt project ( http://selinuxproject.org/page/SVirt ) builds on SELinux to
provide an infrastructure that allows an administrator to define policies for vir-
tual machine isolation. The default state of sVirt ensures that a virtual machine's
resources cannot be accessed by any other process or virtual machine. This default
state can be extended by the administrator to define fine-grained permissions—
for example, to group virtual machines together to share resources.
4.7.1 Red Hat Enterprise Virtualization Key Features
Red Hat Enterprise Virtualization key features include the following:
Windows, Solaris, and Linux guests
Live migration
High availability
Dynamic system scheduling
Power-saving features
Maintenance manager
Image and template manager
Thin provisioning for server and desktop guests
Shared SAN, iSCSI, and NAS storage
Centralized multiserver management with Red Hat Enterprise Virtualization
Manager
 
 
Search WWH ::




Custom Search