|
|||
Solaris Virtualization Product Overview 1. Introduction to Solaris Resource Management 2. Projects and Tasks (Overview) 3. Administering Projects and Tasks 4. Extended Accounting (Overview) 5. Administering Extended Accounting (Tasks) 6. Resource Controls (Overview) 7. Administering Resource Controls (Tasks) 8. Fair Share Scheduler (Overview) 9. Administering the Fair Share Scheduler (Tasks) 10. Physical Memory Control Using the Resource Capping Daemon (Overview) 11. Administering the Resource Capping Daemon (Tasks) 13. Creating and Administering Resource Pools (Tasks) 14. Resource Management Configuration Example 15. Resource Control Functionality in the Solaris Management Console 16. Introduction to Solaris Zones 17. Non-Global Zone Configuration (Overview) 18. Planning and Configuring Non-Global Zones (Tasks) 19. About Installing, Halting, Cloning, and Uninstalling Non-Global Zones (Overview) 20. Installing, Booting, Halting, Uninstalling, and Cloning Non-Global Zones (Tasks) 21. Non-Global Zone Login (Overview) 22. Logging In to Non-Global Zones (Tasks) 23. Moving and Migrating Non-Global Zones (Tasks) 24. About Packages and Patches on a Solaris System With Zones Installed (Overview) 25. Adding and Removing Packages and Patches on a Solaris System With Zones Installed (Tasks) 26. Solaris Zones Administration (Overview) 27. Administering Solaris Zones (Tasks) 28. Troubleshooting Miscellaneous Solaris Zones Problems 29. About Branded Zones and the Linux Branded Zone 30. Planning the lx Branded Zone Configuration (Overview) 31. Configuring the lx Branded Zone (Tasks) 32. About Installing, Booting, Halting, Cloning, and Uninstalling lx Branded Zones (Overview) 33. Installing, Booting, Halting, Uninstalling and Cloning lx Branded Zones (Tasks) 34. Logging In to lx Branded Zones (Tasks) 35. Moving and Migrating lx Branded Zones (Tasks) 36. Administering and Running Applications in lx Branded Zones (Tasks) 37. Sun xVM Hypervisor System Requirements Introduction to the Sun xVM Hypervisor The Sun xVM Hypervisor and the Control Domain Resource Virtualization to Enable Interoperability The Solaris System and Intel Platforms 38. Booting and Running the Sun xVM Hypervisor 40. Using virt-install to Install a Domain |
Supported Virtualization ModesThere are two basic types of virtualization, full virtualization and paravirtualization. The hypervisor supports both modes. Full virtualization allows any x86 operating system, including Solaris, Linux, or Windows systems, to run in a guest domain. Paravirtualization requires changes to the operating system. Only specific operating systems can be hosted in a paravirtualized guest domain. Currently these systems are limited to Solaris, Linux, and FreeBSD. A system can have both paravirtualized and fully virtualized domains running simultaneously. For paravirtualized mode and for all types of operating systems, the only requirement is that the operating system be modified to support the virtual device interfaces. Overview of ParavirtualizationIn the more lightweight paravirtualization, the operating system is both aware of the virtualization layer and modified to support it, which results in higher performance. The paravirtualized guest domain operating system is ported to run on top of the hypervisor, and uses virtual network, disk, and console devices. Since the control domain must work closely with the hypervisor layer, control domain is always paravirtualized. Guest domains can be either paravirtualized or fully virtualized, and a system can have both types running simultaneously. Devices and Drivers in the Paravirtualization ModeSince paravirtualization requires changes to the OS, only specific operating systems can be hosted in a paravirtualized guest domain. Currently those are limited to Solaris, Linux, and FreeBSD. With paravirtualization, each device, such as a networking interface, is presented as a fully virtual interface, and specific drivers are required for it. Each virtual device is associated with a physical device and the driver is split into two drivers. A frontend driver runs in the guest domain and communicates over a virtual data interface to a backend driver. The backend driver currently runs in domain 0 and communicates with both the frontend driver and the physical device the driver controls. This enables a guest domain to make use of a network card on the host, store data on a host disk drive, and other such tasks. xVM in Solaris currently supports two main split drivers used for I/O. Networking is done by using the xVM networking backend (xnb) drivers. Solaris or other operating system guest domains use xnb to transmit and receive networking traffic. Typically, a physical NIC, either shared or dedicated, is used for communicating with the guest domains. Solaris xVM provides networking access to guest domains by means of MAC-based virtual network switching. Block I/O is provided by the xVM disk backend (xdb) driver, which provides virtual disk access to guest domains. In the control domain, the disk storage can be in a file, a ZFS volume, or a physical device. Virtual NICsA single physical NIC can be carved into multiple VNICs, which can be assigned to different zones or Solaris xVM instances running on the same system. VNICs are managed using the dladm command line utility described in the dladm(1M) man page. Drivers for Solaris Running as a GuestWhen running as a guest domain, Solaris xVM uses the xVM networking frontend (xnf ) and xVM disk frontend (xdf) drivers to talk to the relevant backend drivers. In addition to these drivers, the Solaris console is virtualized when the Solaris system is running as a guest domain. The console driver interacts with the xenconsoled(1M) daemon running in domain 0 to provide console access. Overview of Full VirtualizationIn a full virtualization, the operating system is not aware that it is running in a virtualized environment under xVM. A fully virtualized guest domain is referred to as a hardware-assisted virtual machine (HVM). An HVM guest domain runs an unmodified operating system. Fully-virtualized guest domains are supported under xVM with virtualization extensions available on Intel-VT or AMD Secure Virtual Machine (SVM) processors. These extensions must be present and enabled. Some BIOS versions disable the extensions by default. Note - Full virtualization requires that the hypervisor transparently intercept many operations that an operating system typically performs directly on the hardware. This interception allows the hypervisor to ensure that a domain cannot read or modify another domain's memory, cannot interfere with its device access, and cannot shut down the CPUs it is using. |
||
|