Veritas InfoScale™ 7.4.2 Virtualization Guide - Linux

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.2)
Platform: Linux
  1. Section I. Overview of Veritas InfoScale Solutions used in Linux virtualization
    1. Overview of supported products and technologies
      1.  
        Overview of the Veritas InfoScale Products Virtualization Guide
      2. About Veritas InfoScale Solutions support for Linux virtualization environments
        1.  
          About SmartIO in the Linux virtualized environment
        2.  
          About the SmartPool feature
      3. About Kernel-based Virtual Machine (KVM) technology
        1.  
          Kernel-based Virtual Machine Terminology
        2.  
          VirtIO disk drives
      4. About the RHEV environment
        1.  
          RHEV terminology
      5.  
        Virtualization use cases addressed by Veritas InfoScale products
      6.  
        About virtual-to-virtual (in-guest) clustering and failover
  2. Section II. Implementing a basic KVM environment
    1. Getting started with basic KVM
      1.  
        Creating and launching a kernel-based virtual machine (KVM) host
      2.  
        RHEL-based KVM installation and usage
      3.  
        Setting up a kernel-based virtual machine (KVM) guest
      4.  
        About setting up KVM with Veritas InfoScale Solutions
      5. Veritas InfoScale Solutions configuration options for the kernel-based virtual machines environment
        1.  
          Dynamic Multi-Pathing in the KVM guest virtualized machine
        2.  
          Dynamic Multi-Pathing in the KVM host
        3.  
          Storage Foundation in the virtualized guest machine
        4.  
          Enabling I/O fencing in KVM guests
        5.  
          Storage Foundation Cluster File System High Availability in the KVM host
        6.  
          Dynamic Multi-Pathing in the KVM host and guest virtual machine
        7.  
          Dynamic Multi-Pathing in the KVM host and Storage Foundation HA in the KVM guest virtual machine
        8.  
          Cluster Server in the KVM host
        9.  
          Cluster Server in the guest
        10.  
          Cluster Server in a cluster across virtual machine guests and physical machines
      6.  
        Installing Veritas InfoScale Solutions in the kernel-based virtual machine environment
      7. Installing and configuring Cluster Server in a kernel-based virtual machine (KVM) environment
        1.  
          How Cluster Server (VCS) manages Virtual Machine (VM) guests
    2. Configuring KVM resources
      1.  
        About kernel-based virtual machine resources
      2. Configuring storage
        1.  
          Consistent storage mapping in the KVM environment
        2. Mapping devices to the guest
          1.  
            Mapping DMP meta-devices
          2.  
            Consistent naming across KVM Hosts
          3.  
            Mapping devices using paths
          4.  
            Mapping devices using volumes
          5.  
            Mapping devices using the virtio-scsi interface
        3.  
          Resizing devices
      3. Configuring networking
        1. Bridge network configuration
          1.  
            Host network configuration
          2.  
            Configuring guest network
        2.  
          Network configuration for VCS cluster across physical machines (PM-PM)
        3.  
          Standard bridge configuration
        4.  
          Network configuration for VM-VM cluster
  3. Section III. Implementing a RedHat Enterprise Virtualization environment
    1. Getting started with Red Hat Enterprise Virtualization (RHEV)
      1.  
        Creating and launching a RHEV host
      2.  
        Setting up a virtual machine in the Red Hat Enterprise Virtualization (RHEV) environment
      3. Veritas InfoScale Solutions configuration options for the RHEV environment
        1.  
          Dynamic Multi-Pathing in a RHEV guest virtual machine
        2.  
          Dynamic Multi-Pathing in the RHEV host
        3.  
          Storage Foundation in the RHEV guest virtual machine
        4.  
          Storage Foundation Cluster File System High Availability in the RHEV host
        5.  
          Dynamic Multi-Pathing in the RHEV host and guest virtual machine
        6.  
          Dynamic Multi-Pathing in the RHEV host and Storage Foundation HA in the RHEV guest virtual machine
        7.  
          Cluster Server for the RHEV environment
      4.  
        About setting up RHEV with Veritas InfoScale Solutions
      5.  
        Installing Veritas InfoScale Solutions in the RHEV environment
    2. Configuring VCS to manage virtual machines
      1. Installing and configuring Cluster Server for virtual machine and application availability
        1.  
          How Cluster Server (VCS) manages virtual machines
      2.  
        About the KVMGuest agent
      3.  
        Validating the virtualization environment
      4.  
        Configuring a resource in a RHEV environment
      5.  
        Configuring multiple KVMGuest resources
    3. Configuring Storage Foundation as backend storage for virtual machines
      1.  
        About configuring virtual machines to attach Storage Foundation as backend storage in an RHEV environment
      2.  
        Use cases for virtual machines using Storage Foundation storage
      3.  
        Workflow to configure storage for virtual machines in an RHEV environment
      4.  
        Prerequisites in an RHEV environment
      5.  
        Installing the SF administration utility for RHEV
      6.  
        Installing and configuring SFCFSHA or SFHA cluster on RHEL-H nodes
      7. Configuring Storage Foundation as backend storage for virtual machines
        1.  
          Attaching or detaching Storage Foundation components in guest virtual machines
        2.  
          Listing configuration details of virtual machines in an RHEV environment
        3.  
          Configuring permissions for exported storage devices
        4.  
          Starting and stopping virtual machines
      8.  
        Usage examples from the RHEV administration utility
      9.  
        Mapping DMP meta-devices
      10.  
        Resizing devices
  4. Section IV. Implementing Linux virtualization use cases
    1. Application visibility and device discovery
      1.  
        About storage to application visibility using Veritas InfoScale Operations Manager
      2.  
        About Kernel-based Virtual Machine (KVM) virtualization discovery in Veritas InfoScale Operations Manager
      3.  
        About Red Hat Enterprise Virtualization (RHEV) virtualization discovery in Veritas InfoScale Operations Manager
      4.  
        About Microsoft Hyper-V virtualization discovery
      5.  
        Virtual machine discovery in Microsoft Hyper-V
      6.  
        Storage mapping discovery in Microsoft Hyper-V
    2. Server consolidation
      1.  
        Server consolidation
      2.  
        Implementing server consolidation for a simple workload
    3. Physical to virtual migration
      1.  
        Physical to virtual migration
      2.  
        How to implement physical to virtual migration (P2V)
    4. Simplified management
      1.  
        Simplified management
      2. Provisioning storage for a guest virtual machine
        1.  
          Provisioning Veritas Volume Manager volumes as data disks for VM guests
        2.  
          Provisioning Veritas Volume Manager volumes as boot disks for guest virtual machines
      3. Boot image management
        1.  
          Creating the boot disk group
        2.  
          Creating and configuring the golden image
        3.  
          Rapid Provisioning of virtual machines using the golden image
        4.  
          Storage Savings from space-optimized snapshots
    5. Application availability using Cluster Server
      1.  
        About application availability options
      2.  
        Cluster Server In a KVM Environment Architecture Summary
      3.  
        VCS in host to provide the Virtual Machine high availability and ApplicationHA in guest to provide application high availability
      4.  
        Virtual to Virtual clustering and failover
      5.  
        I/O fencing support for Virtual to Virtual clustering
      6.  
        Virtual to Physical clustering and failover
    6. Virtual machine availability
      1.  
        About virtual machine availability options
      2.  
        VCS in host monitoring the Virtual Machine as a resource
      3.  
        Validating the virtualization environment for virtual machine availability
    7. Virtual machine availability for live migration
      1.  
        About live migration
      2.  
        Live migration requirements
      3.  
        Reduce SAN investment with Flexible Shared Storage in the RHEV environment
      4. About Flexible Storage Sharing
        1.  
          Flexible Storage Sharing use cases
        2.  
          Limitations of Flexible Storage Sharing
      5.  
        Configure Storage Foundation components as backend storage for virtual machines
      6.  
        Implementing live migration for virtual machine availability
    8. Virtual to virtual clustering in a Red Hat Enterprise Virtualization environment
      1.  
        Installing and configuring Cluster Server for Red Hat Enterprise Virtualization (RHEV) virtual-to-virtual clustering
      2.  
        Storage configuration for VCS in a RHEV environment
    9. Virtual to virtual clustering in a Microsoft Hyper-V environment
      1.  
        Installing and configuring Cluster Server with Microsoft Hyper-V virtual-to-virtual clustering
    10. Virtual to virtual clustering in a Oracle Virtual Machine (OVM) environment
      1.  
        Installing and configuring Cluster Server for Oracle Virtual Machine (OVM) virtual-to-virtual clustering
      2.  
        Storage configuration for VCS support in Oracle Virtual Machine (OVM)
    11. Disaster recovery for virtual machines in the Red Hat Enterprise Virtualization environment
      1.  
        About disaster recovery for Red Hat Enterprise Virtualization virtual machines
      2.  
        DR requirements in an RHEV environment
      3. Disaster recovery of volumes and file systems using Volume Replicator (VVR) and Veritas File Replicator (VFR)
        1.  
          Why select VVR over array-based replication solutions
      4.  
        Configure Storage Foundation components as backend storage
      5.  
        Configure VVR and VFR in VCS GCO option for replication between DR sites
      6.  
        Configuring Red Hat Enterprise Virtualization (RHEV) virtual machines for disaster recovery using Cluster Server (VCS)
    12. Multi-tier business service support
      1.  
        About Virtual Business Services
      2.  
        Sample virtual business service configuration
      3. Recovery of Multi-tier Applications managed with Virtual Business Services in Veritas Operations Manager
        1.  
          Service Group Management in Virtual Business Services
    13. Managing Docker containers with InfoScale Enterprise
      1.  
        About managing Docker containers with InfoScale Enterprise product
      2. About the Cluster Server agents for Docker, Docker Daemon, and Docker Container
        1.  
          Supported software
        2.  
          How the agents makes Veritas highly available
        3.  
          Documentation reference
      3. Managing storage capacity for Docker containers
        1.  
          Provisioning storage for Docker infrastructure from the Veritas File System
        2. Provisioning data volumes for Docker containers
          1.  
            Provisioning storage on Veritas File System as data volumes for containers
          2.  
            Provisioning VxVM volumes as data volumes for containers
          3.  
            Creating a data volume container
        3. Automatically provision storage for Docker Containers
          1.  
            Installing the Veritas InfoScale Docker volume plugin
          2.  
            Configuring a disk group
          3.  
            Creating Docker Containers with storage attached automatically
          4.  
            Avoid noisy neighbor problem by using Quality of Service support
          5.  
            Provision to create snapshots
          6.  
            Configuring Veritas volume plugin with Docker 1.12 Swarm mode
        4.  
          About using InfoScale Enterprise features to manage storage for containers
      4. Offline migration of Docker containers
        1.  
          Migrating Docker containers
        2.  
          Migrating Docker Daemons and Docker Containers
      5. Disaster recovery of volumes and file systems in Docker environments
        1.  
          Configuring Docker containers for disaster recovery
      6.  
        Limitations while managing Docker containers
  5. Section V. Reference
    1. Appendix A. Troubleshooting
      1.  
        Troubleshooting virtual machine live migration
      2.  
        Live migration storage connectivity in a Red Hat Enterprise Virtualization (RHEV) environment
      3.  
        Troubleshooting Red Hat Enterprise Virtualization (RHEV) virtual machine disaster recovery (DR)
      4.  
        The KVMGuest resource may remain in the online state even if storage connectivity to the host is lost
      5.  
        VCS initiates a virtual machine failover if a host on which a virtual machine is running loses network connectivity
      6.  
        Virtual machine start fails due to having the wrong boot order in RHEV environments
      7.  
        Virtual machine hangs in the wait_for_launch state and fails to start in RHEV environments
      8.  
        VCS fails to start a virtual machine on a host in another RHEV cluster if the DROpts attribute is not set
      9.  
        Virtual machine fails to detect attached network cards in RHEV environments
      10.  
        The KVMGuest agent behavior is undefined if any key of the RHEVMInfo attribute is updated using the -add or -delete options of the hares -modify command
      11.  
        RHEV environment: If a node on which the VM is running panics or is forcefully shutdown, VCS is unable to start the VM on another node
    2. Appendix B. Sample configurations
      1. Sample configuration in a KVM environment
        1.  
          Sample configuration 1: Native LVM volumes are used to store the guest image
        2.  
          Sample configuration 2: VxVM volumes are used to store the guest image
        3.  
          Sample configuration 3: CVM-CFS is used to store the guest image
      2.  
        Sample configurations for a Red Hat Enterprise Virtualization (RHEV) environment
    3. Appendix C. Where to find more information
      1.  
        Veritas InfoScale documentation
      2.  
        Linux virtualization documentation
      3.  
        Service and support
      4.  
        About Veritas Services and Operations Readiness Tools (SORT)

About the KVMGuest agent

The KVMGuest agent enables Cluster Server (VCS) to monitor a KVM guest - that is, a virtual machine in the KVM environment or the Red Hat Enterprise Virtualization (RHEV) environment. The agent performs tasks such as bringing virtual machines online and taking them offline. The KVMGuest agent operates in both KVM and RHEV environments. This topic describes its behavior in the RHEV environment.

For details on the KVMGuest agent behavior in open source KVM environment or RHEV environment, see the Cluster Server Bundled Agents Reference Guide.

The KVMGuest agent uses virsh commands to manage virtual machines in the KVM environment and Representational State Transfer (REST) APIs to manage virtual machines in RHEV environment by using the REST APIs to determine the state of the virtual machine. The agent determines the resource state, on the basis of the virtual machine state. REST design architecture focuses on resources and their representations for some specific service. REST APIs help software developers and administrators integrate the functionality of the RHEV environment with custom scripts or with external applications which access the API by means of HTTP.

Prerequisites for administering virtual machines in a RHEV environment by using REST APIs:

  • A networked installation of Red Hat Enterprise Virtualization Manager, which includes the REST API

  • A client or programming library that initiates and receives HTTP requests from the REST API

The following table lists various states of a virtual machine in RHEV environment and the corresponding VCS resource state:

Table:

Virtual machine state

VCS resource state

Resource confidence level

wait_for_launch

ONLINE

10

powering_up

ONLINE

60

up

ONLINE

100

powering_down

ONLINE

40

paused

ONLINE

20

down

OFFLINE

-

saving_state

INTENTIONAL OFFLINE

-

suspended

INTENTIONAL OFFLINE

-

restoring_state

ONLINE

50

migrating

INTENTIONAL OFFLINE

-

reboot_in_progress

INTENTIONAL OFFLINE

-

image_locked

UNKNOWN

-

unknown

UNKNOWN

-

Table: KVMGuest agent functions

Function

Tasks

Online

KVM environment: Agent uses the virsh start command to start the guest virtual machine. When the resource is configured to define the guest configuration, agent uses the virsh define command to define the virtual machine while bringing it online.

RHEV environment: Agent uses the REST APIs to start the virtual machine. If the DROpts attribute is set to configure the guest network, the agent also sets the payload as a cdrom. This payload contains networking parameters to be set within the guest after a DR failover.

The agent waits for a certain time period after initiating the virtual machine start. You can specify this wait period by using the "DelayAfterGuestOnline" attribute.

The agent also checks whether the virtual machine is configured for disaster recovery by checking the DROpts attribute. If this attribute is set correctly, the agent inserts a virtual CDROM into the virtual machine's configuration. This CDROM contains a file that contains the site-specific network parameters to be applied at this site for the virtual machine. When the virtual machine boots, the vcs-net-reconfig service installed inside the guest checks for the CDROM and the disaster recovery information. If the vcs-net-reconfig service finds the disaster recovery information, the service applies the networking parameters to the virtual machine.

Offline

The Offline function initiates a graceful shutdown of the virtual machine.

KVM environment: Agent uses the virsh shutdown command to shutdown the guest virtual machine. If the SyncDir attribute is configured to synchronize the guest virtual machine configuration file, then the configuration file is copied to the location configured as a SyncDir attribute.

RHEV environment: Agent uses the REST APIs to shutdown the virtual machine.

The agents wait for a certain time period after initiating the shutdown for the virtual machine to shut down completely. You can specify this wait period by using the DelayAfterGuestOffline attribute.

Monitor

KVM environment: Agent uses the virsh domstate command to determine the status of the guest virtual machine.

RHEV environment: Agent uses the REST APIs to get the status of the virtual machine.

Clean

KVM environment: Agent uses the virsh destroy command to forcefully shutdown the guest virtual machine. If the SyncDir attribute is configured to synchronize the guest virtual machine configuration file, then the configuration file is copied to the location configured as a SyncDir attribute.

RHEV environment: Agent uses REST APIs to stop the virtual machine.

Migrate

KVM environment: The agent uses the virsh migrate command to start virtual machine migration.

RHEV environment: The agent uses REST APIs to start virtual machine migration. Additionally, it checks whether the virtual machine migration is allowed or not.

Note:

When a virtual machine is configured for disaster recovery, the virtual machine cannot be migrated across sites.

The KVMGuest agent recognizes the following resource states:

Table:

Resource state

Description

ONLINE

Indicates that the guest virtual machine is running.

OFFLINE

Indicates that the guest virtual machine has stopped.

FAULTED

Indicates that the guest virtual machine has failed to start or has unexpectedly stopped.

UNKNOWN

Indicates that a problem exists with the configuration or with the ability to monitor the resource.

INTENTIONAL OFFLINE

Indicates that the virtual machine has either migrated to another physical host or the administrator intentionally suspended it.

The Cluster Server agent for managing virtual machines in a KVM or RHEV environment, is represented by the KVMGuest resource type definition:

type KVMGuest (
        static int IntentionalOffline = 1
        static boolean AEPTimeout = 1
        static int MigrateTimeout = 300
        static int MigrateWaitLimit = 2
        static keylist SupportedActions = { "guestmigrated", "vmconfigsync", "DevScan" }
        static keylist SupportedOperations = { "migrate"}
        static keylist RegList = { "GuestName", "DelayAfterGuestOnline", "DelayAfterGuestOffline", "RHEVMInfo", "DROpts" }
        static str ArgList[] = { GuestName, DelayAfterGuestOnline, DelayAfterGuestOffline, SyncDir, GuestConfigFilePath, CEInfo, RHEVMInfo, ResyncVMCfg, DROpts }
        str CEInfo{} = { Enabled=0, CESystem=NONE, FaultOnHBLoss=1 }
        str RHEVMInfo{} = { Enabled=0, URL=NONE, User=NONE, Password=NONE, Cluster=NONE, UseManualRHEVMFencing=0 }
        str GuestName
        int DelayAfterGuestOnline = 5
        int DelayAfterGuestOffline = 30
        str SyncDir
        str GuestConfigFilePath
        boolean ResyncVMCfg = 0
        str DROpts{} = { ConfigureNetwork=0, IPAddress=NONE, Netmask=NONE, Gateway=NONE, DNSServers=NONE, DNSSearchPath=NONE, Device=NONE }
)

The RHEVMInfo attribute enables the KVMGuest attribute configuration to support the Red Hat Enterprise Virtualization environment. RHEVMInfo specifies the following information about the RHEV environment:

Attribute value

Description

Enabled

Specifies whether the virtualization environment is a KVM environment or a Red Hat Enterprise Virtualization (RHEV) environment.

0 indicates the KVM environment.

1 indicates the RHEV environment.

The default value is 0.

URL

Specifies the RHEV-M URL, that the KVMGuest agent can use for REST API communication. The API can only communicate with the secure port (SSL). For example:

https://rhevm-server.example.com:443

User

Specifies the RHEV-M user name that the agent must use for REST API communication. For example:

admin@internal
rhevadmin@example.com

Password

Specifies the encrypted password associated with the RHEVM user profile. Use the vcsencrypt utility to encrypt the password.

For details, see the Cluster Server Administrator's Guide.

Cluster

Specifies the name of the RHEV-M cluster of which the VCS host is a member.

UseManualRHEVMFencing

Specifies if the use of manual RHEV-M fencing is enabled in the event that the physical host on which virtual machine is running crashes.

0 indicates that manual RHEV-M fencing is disabled.

1 indicates that manual RHEV-M fencing is enabled.

The default value is 0.

The DROpts attribute enables the virtual machine for disaster recovery. The attribute contains site-specific network parameters for the virtual machine. The value of this attribute consists of the following keys that define the disaster recovery options for the virtual machine:

Attribute keys

Description

DNSSearchPath

The domain search path used by the virtual machine in this site. The value of this key must contain a list of DNS domain names that are used for the DNS lookup of a hostname in case the domain name of the hostname is not specified. Use spaces to separate the domain names.

DNSServers

The list of DNS servers used by the virtual machine in this site. The value of this key must contain a list of IP addresses of DNS servers that are used for the DNS lookup of a hostname. Use spaces to separate the IP addresses.

Gateway

The default gateway used by the virtual machine in this site.

Device

The Network Interface Card (NIC) that is dedicated to the exclusive IP address of the virtual machine in this site. If this key is not specified, the agent automatically selects the first dedicated NIC for the assignment of the IP address, if specified. Example: eth0.

IPAddress

The IP address to be assigned to the virtual machine in this site after a cross-site failover.

Netmask

The netmask to be used by the virtual machine in this site after a cross-site failover.

ConfigureNetwork

The DROpts attribute value is applied to the virtual machine only if this key is set to 1. Type and dimension: string-association.

Note:

For information on other attributes associated with the KVMGuest agent, see the Cluster Server Bundled Agents Reference Guide.