Virtualization with KVM: Difference between revisions

From Yocto Project
Jump to navigationJump to search
No edit summary
 
(35 intermediate revisions by 2 users not shown)
Line 1: Line 1:
__NOTOC__
__NOTOC__


Virtualization is a hot topic in the operating systems world these days. The use cases vary from server consolidation, virtual test environments to Linux enthusiasms who can’t decide which distribution is best. The Kernel-based Virtual Machine, [http://www.linux-kvm.org kvm] is a popular full-virtualization solution for Linux based systems. It can be used to run guests systems on systems with hardware virtualization extensions (AMD-V or Intel VT-x).
Virtualization is a hot topic in the operating systems world these days. The use cases vary from server consolidation, virtual test environments to Linux enthusiasts who can’t decide which distribution is best. The Kernel-based Virtual Machine, [http://www.linux-kvm.org kvm] is a popular full-virtualization solution for Linux based systems. It can be used to run guests systems on hosts with hardware virtualization extensions (AMD-V or Intel VT-x).
The goal of this project was creating a minimal solution that would allow a user to run virtual machines (VM) over yocto. KVM was choosen as the virtualization solution because of the strong community support it enjoys and for the easy integration.
The goal of this project was creating a minimal solution that would allow a user to run virtual machines (VM) using Poky from the Yocto Project. KVM was choosen as the virtualization solution because of the strong community support it enjoys and for the easy integration.
[[File:Yocto-KVM running multiple guests.png|thumb|upright=1.8|Multiple guest running over the yocto KVM host]]
[[File:Yocto-KVM running multiple guests.png|thumb|upright=1.8|Multiple guest running in the Yocto Project KVM host layer]]


== Packages ==
== Packages ==
The project is based on the meta-xen layer from [http://www.openembedded.org/wiki/LayerIndex oe-core]. This layer creates a target image that can act as a host for running multiple guest operating systems using the Xen hypervisor. It also features recipes for the libvirt package and for most of its dependencies. There are a number of other dependencies that come from the meta-oe layer of oe-core.
The project is part of the [http://git.yoctoproject.org/cgit/cgit.cgi/meta-virtualization/ meta-virtualization] layer. This layer contains all the necessary recipes for creating VM controllers using the Xen, LXC and KVM hypervisors. It also features recipes for the libvirt package and other tools that can be used for the virtual machine management. There are a number of other dependencies that come from the meta-oe layer of oe-core.


=== KVM ===
=== KVM ===
KVM can be used to run multiple virtual machines that contain unmodified Windows or Linux images. The kvm component is included in the mainline Linux kernel starting from version 2.6.20. Since yocto uses 3.4.11 or a newer version of the Linux kernel, no extra packages are required only a proper kernel configuration.
KVM can be used to run multiple virtual machines that contain unmodified Windows or Linux images. The kvm component is included in the mainline Linux kernel starting from version 2.6.20. Since yocto uses 3.4.20 or a newer version of the Linux kernel, no extra packages are required only a proper kernel configuration.


=== QEMU ===
=== QEMU ===
Line 17: Line 17:
[http://libvirt.org/ Libvirt] is a toolkit for interacting with virtual machine hypervisors( Xen, KVM, VMWare ESX etc.). The set of tools include an C API library that comes with bindings for common languages, a daemon (libvirtd), and a command line utility (virsh). The functionality is exposed through the virsh command. The library is also used by a number of modern VM management systems to handle typical tasks when dealing with VMs.<br/>
[http://libvirt.org/ Libvirt] is a toolkit for interacting with virtual machine hypervisors( Xen, KVM, VMWare ESX etc.). The set of tools include an C API library that comes with bindings for common languages, a daemon (libvirtd), and a command line utility (virsh). The functionality is exposed through the virsh command. The library is also used by a number of modern VM management systems to handle typical tasks when dealing with VMs.<br/>
Our layer builds libvirt only for qemu support to keep the image as minimal as possible. To configure libvirt for other hypervisors you just have to make some minor modifications to the recipe provided by the meta-xen layer. An example of how to remotely connect using [http://virt-manager.org/ Virt-manager] to control the VMs can be found in the next section.
Our layer builds libvirt only for qemu support to keep the image as minimal as possible. To configure libvirt for other hypervisors you just have to make some minor modifications to the recipe provided by the meta-xen layer. An example of how to remotely connect using [http://virt-manager.org/ Virt-manager] to control the VMs can be found in the next section.
== How to integrate with Poky ==
The meta-virtualization layer can be found on the official yocto source repositories page at [http://git.yoctoproject.org/cgit/cgit.cgi/meta-virtualization/ meta-virtualization]. This layer contains a README that presents all the layer dependencies and the necessary steps to build the target image.
To obtain an KVM controller you have to build the '''kvm-image-minimal''' target.


== Virtual Machine Management ==
== Virtual Machine Management ==
=== CLI ===
=== CLI ===
If you already have an existing KVM image(the disk image and optionally the kernel image), it can run it from the CLI using the various qemu-system-* commands depending on the desired guest architecture. To connect to the console of the VM, the user has to configure a vncserver to start on the guest. The '''vnc''' option can be used for this.<br/>  
If you already have an existing KVM image(the disk image and optionally the kernel image), you can run it from the CLI using the various qemu-system-* commands depending on the desired guest architecture. To connect to the console of the VM, the user has to configure a vncserver to start on the guest. The '''vnc''' option can be used for this.<br/>  
Virsh is a powerful tool that can be used to create and manage VMs. It has a quite complicated syntax and it's not used directly in general.
Virsh is a powerful tool that can be used to create and manage VMs. It has a quite complicated syntax and it's not used directly in general.
The target image does not contain any additional tools for the creation and the management of the virtual machines, but the libvirtd daemon is configured to listen for new connections. This allows other tools like virt-install to remotely connect to the hypervisor running on the system and run all the commands on the host.  
The target image does not contain any additional tools for the creation and the management of the virtual machines, but the libvirtd daemon is configured to listen for new connections. This allows other tools like virt-install to remotely connect to the hypervisor running on the system and run all the commands on the host.  
Line 26: Line 30:


=== GUI ===
=== GUI ===
[[File:Add new connection in virt-manager.png|250px|thumb|upright=1.8|Adding a new connection in virt-manager]]
Virt-manager is a popular desktop interface for managing VMs. It offers an interactive wizard for the creation of new virtual machines and it presents statistics on the resource utilization of the running domains. To communicate with the hypervisors it requires the libvirt toolkit installed on the host systems. It can also be used to manage VMs that run on remote hosts. For this, the libvirt daemon running on the host system. In our target image the libvirtd daemon is configured to listen for new TCP connections. Authentication is disabled by default so no special credentials are required for the connection.<br/>
Virt-manager is a popular desktop interface for managing VMs. It offers an interactive wizard for the creation of new virtual machines and it presents statistics on the resource utilization of the running domains. To communicate with the hypervisors it requires the libvirt toolkit installed on the host systems. It can also be used to manage VMs that run on remote hosts. For this, the libvirt daemon running on the host system. In our target image the libvirtd daemon is configured to listen for new TCP connections. Authentication is disabled by default so no special credentials are required for the connection.<br/>


==== How to connect to the target ====
==== How to connect to the target ====
[[File:Add new connection in virt-manager.png|thumb|upright=1.8|virt-manager:Add new connection]]
# Install virt-manager on the system.  
# Install virt-manager on the system.  
# Start a new virt-manager instance by running virt-manager from the command line.
# Start a new virt-manager instance by running virt-manager from the command line.
# Create a new connection :  Select '''File''' -> '''Add Connection'''
# Create a new connection :  Select '''File''' -> '''Add Connection'''
## Check Connect to remote host
## Check '''Connect to remote host'''
## Method : TCP
## Method : TCP
## Username: name of the user on the remote host. For the kvm image use root.
## Username: user on the remote host. For the kvm-image-minimal use '''root'''.
## Hostname: the IP address of the kvm image.
## Hostname: IP address of the remote host.
At this moment, you should have a new active connection in the main window.  A practical tutorial with all the available options can be found  [http://virt-tools.org/learning/start-install-with-virt-manager/ here].
At this moment, you should have a new active connection in the main window.  A practical tutorial with all the available options can be found  [http://virt-tools.org/learning/start-install-with-virt-manager/ here].
==== How to run a Yocto image using virt-manager ====
This tutorial presents the necessary steps to start an Yocto image using virt-manager. This allows you to add new hardware devices or make custom configurations. It can be used as an alternative for the standard runqemu script which lacks support for advanced configurations.
# Install virt-manager on the system.
# Start a new virt-manager instance by running virt-manager from the command line.
# Select the connection you want to use and click on the '''Create a new virtual machine''' icon from the menu.
# Step 1
#* If kvm is not enabled on your host system an error message will appear.
#* Set the name for the new VM.
#* Select '''Import existing disk image''' on the how to install the OS.
[[File:Yocto image configuration.png|thumb|upright=1.8|400px|Yocto image configuration]]
# Step 2
#* Browse for the disk image. Click '''Browse local''' and look for the disk image that was generated after running bitbake. This should be located in <tt>tmp/deploy/images</tt> in your local poky build directory.
#* Live the OS type and Version to generic.
# Step 3 - choose the amount of RAM and number of CPU allocated to the new VM.
# Step 4
#* Check '''Customize configuration before install'''
#* Click '''Finish'''
# A new screen will appear with the detailed configuration of the new VM. Additional configuration are required to make the image boot:
#* '''Boot options'''
#** Direct kernel boot
#** Kernel path: Browse the disk for the kernel image. This is located in the same place as the disk image and starts with '''bzImage'''.
#** Kernel arguments: root=/dev/hda ip=dhcp
#* '''NIC'''
#** Device model: e1000
# Click '''Begin Installation''' and click on the '''Show the graphical console''' button from the main toolbar to connect to the console of the VM.
These are the standard steps. There are some additional steps depending on the type of image and the location of the image.
# Graphical User Interface
#* '''Video'''
#** Model : vmvga
#* '''Controller USB'''
#** Model USB 2
#* '''Add hardware'''
#** Input -> Type: EvTouch USB Graphics Tablet
# Remote connection
#* If virt-manager has connected to a remote host there are some extra configurations for the image
#* The host comes with the openssh-server package built-in, so scp can be used to copy the images on the disk. Other services like Samba can be added to the host to access folders over the network.
#* At step 2, the '''Browse local''' button is disabled for security reasons. You have to copy the required imaged to <tt>/var/lib/libvirt/images</tt> on the target image or just create the necessary links.
#* In the final configuration screen you have to modify the VNCServer to listen on public ports. For this:
#** '''Display VNC'''
#*** Click '''Remove''' and then click '''Add hardware'''
#*** Graphics
#**** Check '''Listen on all public network intefaces''' and click '''Finish'''.
----
'''Create image from configuration file'''<br/>
The images created with virt-manager are saved as xml files in <tt>/etc/libvirt/qemu</tt>. You can find some example configuration files here:
* [[File:YoctoGUI.xml]] : virtual appliance with graphical interface;
* [[File:YoctoCLI.xml]] : virtual appliance with no graphical interface;
To use these files follow these steps:
* download the file;
* change the paths for the kernel and disk image that are marked with '''TODO''' with the actual locations of the images on the host filesystem.
* run
virsh [--conect REMOTE_URI] create config_file.xml

Latest revision as of 13:57, 11 December 2012


Virtualization is a hot topic in the operating systems world these days. The use cases vary from server consolidation, virtual test environments to Linux enthusiasts who can’t decide which distribution is best. The Kernel-based Virtual Machine, kvm is a popular full-virtualization solution for Linux based systems. It can be used to run guests systems on hosts with hardware virtualization extensions (AMD-V or Intel VT-x). The goal of this project was creating a minimal solution that would allow a user to run virtual machines (VM) using Poky from the Yocto Project. KVM was choosen as the virtualization solution because of the strong community support it enjoys and for the easy integration.

Multiple guest running in the Yocto Project KVM host layer

Packages

The project is part of the meta-virtualization layer. This layer contains all the necessary recipes for creating VM controllers using the Xen, LXC and KVM hypervisors. It also features recipes for the libvirt package and other tools that can be used for the virtual machine management. There are a number of other dependencies that come from the meta-oe layer of oe-core.

KVM

KVM can be used to run multiple virtual machines that contain unmodified Windows or Linux images. The kvm component is included in the mainline Linux kernel starting from version 2.6.20. Since yocto uses 3.4.20 or a newer version of the Linux kernel, no extra packages are required only a proper kernel configuration.

QEMU

QEMU is a popular process emulator that uses dynamic binary translation to achieve a reasonable speed while being easy to port to new architectures. The recipe for the qemu package is included in the standard poky distribution and it comes with built-in support for KVM and for all the new advanced features like virtio, which is the main platform for IO virtualization. If the underlying hardware does not provide support for KVM or if it has been disabled, qemu can be used to run the VMs using software emulation, but with a performance loss.

Libvirt

Libvirt is a toolkit for interacting with virtual machine hypervisors( Xen, KVM, VMWare ESX etc.). The set of tools include an C API library that comes with bindings for common languages, a daemon (libvirtd), and a command line utility (virsh). The functionality is exposed through the virsh command. The library is also used by a number of modern VM management systems to handle typical tasks when dealing with VMs.
Our layer builds libvirt only for qemu support to keep the image as minimal as possible. To configure libvirt for other hypervisors you just have to make some minor modifications to the recipe provided by the meta-xen layer. An example of how to remotely connect using Virt-manager to control the VMs can be found in the next section.

How to integrate with Poky

The meta-virtualization layer can be found on the official yocto source repositories page at meta-virtualization. This layer contains a README that presents all the layer dependencies and the necessary steps to build the target image. To obtain an KVM controller you have to build the kvm-image-minimal target.

Virtual Machine Management

CLI

If you already have an existing KVM image(the disk image and optionally the kernel image), you can run it from the CLI using the various qemu-system-* commands depending on the desired guest architecture. To connect to the console of the VM, the user has to configure a vncserver to start on the guest. The vnc option can be used for this.
Virsh is a powerful tool that can be used to create and manage VMs. It has a quite complicated syntax and it's not used directly in general. The target image does not contain any additional tools for the creation and the management of the virtual machines, but the libvirtd daemon is configured to listen for new connections. This allows other tools like virt-install to remotely connect to the hypervisor running on the system and run all the commands on the host. Virt-install utility is a CLI tool for the creation of new VMs. A tutorial on how to use virt-install for the creation of VMs can be found here.

GUI

Adding a new connection in virt-manager

Virt-manager is a popular desktop interface for managing VMs. It offers an interactive wizard for the creation of new virtual machines and it presents statistics on the resource utilization of the running domains. To communicate with the hypervisors it requires the libvirt toolkit installed on the host systems. It can also be used to manage VMs that run on remote hosts. For this, the libvirt daemon running on the host system. In our target image the libvirtd daemon is configured to listen for new TCP connections. Authentication is disabled by default so no special credentials are required for the connection.

How to connect to the target

  1. Install virt-manager on the system.
  2. Start a new virt-manager instance by running virt-manager from the command line.
  3. Create a new connection : Select File -> Add Connection
    1. Check Connect to remote host
    2. Method : TCP
    3. Username: user on the remote host. For the kvm-image-minimal use root.
    4. Hostname: IP address of the remote host.

At this moment, you should have a new active connection in the main window. A practical tutorial with all the available options can be found here.

How to run a Yocto image using virt-manager

This tutorial presents the necessary steps to start an Yocto image using virt-manager. This allows you to add new hardware devices or make custom configurations. It can be used as an alternative for the standard runqemu script which lacks support for advanced configurations.

  1. Install virt-manager on the system.
  2. Start a new virt-manager instance by running virt-manager from the command line.
  3. Select the connection you want to use and click on the Create a new virtual machine icon from the menu.
  4. Step 1
    • If kvm is not enabled on your host system an error message will appear.
    • Set the name for the new VM.
    • Select Import existing disk image on the how to install the OS.
Yocto image configuration
  1. Step 2
    • Browse for the disk image. Click Browse local and look for the disk image that was generated after running bitbake. This should be located in tmp/deploy/images in your local poky build directory.
    • Live the OS type and Version to generic.
  2. Step 3 - choose the amount of RAM and number of CPU allocated to the new VM.
  3. Step 4
    • Check Customize configuration before install
    • Click Finish
  4. A new screen will appear with the detailed configuration of the new VM. Additional configuration are required to make the image boot:
    • Boot options
      • Direct kernel boot
      • Kernel path: Browse the disk for the kernel image. This is located in the same place as the disk image and starts with bzImage.
      • Kernel arguments: root=/dev/hda ip=dhcp
    • NIC
      • Device model: e1000
  5. Click Begin Installation and click on the Show the graphical console button from the main toolbar to connect to the console of the VM.

These are the standard steps. There are some additional steps depending on the type of image and the location of the image.

  1. Graphical User Interface
    • Video
      • Model : vmvga
    • Controller USB
      • Model USB 2
    • Add hardware
      • Input -> Type: EvTouch USB Graphics Tablet
  2. Remote connection
    • If virt-manager has connected to a remote host there are some extra configurations for the image
    • The host comes with the openssh-server package built-in, so scp can be used to copy the images on the disk. Other services like Samba can be added to the host to access folders over the network.
    • At step 2, the Browse local button is disabled for security reasons. You have to copy the required imaged to /var/lib/libvirt/images on the target image or just create the necessary links.
    • In the final configuration screen you have to modify the VNCServer to listen on public ports. For this:
      • Display VNC
        • Click Remove and then click Add hardware
        • Graphics
          • Check Listen on all public network intefaces and click Finish.

Create image from configuration file
The images created with virt-manager are saved as xml files in /etc/libvirt/qemu. You can find some example configuration files here:

To use these files follow these steps:

  • download the file;
  • change the paths for the kernel and disk image that are marked with TODO with the actual locations of the images on the host filesystem.
  • run
virsh [--conect REMOTE_URI] create config_file.xml