United States-English |
|
|
HP Integrity Virtual Machines Version 4.0 Installation, Configuration, and Administration > Chapter 9 Managing GuestsManaging the Device Database |
|
Integrity VM cannot detect all potential backing store conflicts, and does not always prevent misconfigured guests from booting. Conflicts can arise from the following:
You can use the ioscan and sam commands to detect these conflicts. If you force guests configured with these conflicts to start, data corruption might occur. Integrity VM device management stored Integrity VM device mapping information in the device database file (/var/opt/hpvm/common/hpvm_mgmtdb). This file is divided into three sections:
Do not edit the hpvm_mgmtdb file directly unless you are specifically advised to do so. Always use a supported Integrity VM commands (such as hpvmmodify or hpvmdevmgmt) to modify virtual devices. To list and modify the devices used by the VM Host and the virtual machines, use the hpvmdevmgmt command. Table 9-6 describes the options to the hpvmdevmgmt command. Table 9-6 Options to the hpvmdevmgmt Command
For example, to to display a list of the restricted devices, enter the following command:
To make a device shareable among guests, enter the following command:
With Integrity VM, you can allow devices to be specified as either shared or not shared. By default, vswitches are configured to be shared. Storage devices are configured to not be shared. As administrator, you can configure a storage device to be shared by multiple guests. The SHARE attribute is checked only when booting a guest. If one guest is running with a nonshared device and another guest attempts to boot using that same device, the latter guest is blocked. If multiple guests need to share devices, then the SHARE attribute for those devices must be changed to SHARE=YES using the modify option (-m) with the hpvmdevmgmt command. For example, to make the HP-UX iso.* images shareable so that two virtual machines (compass1 and compass2) can use them to install at the same time, enter the following commands:
Only read-only devices can be shared among guests. Virtual DVDs and virtual network devices can be shared. DVDs are not shareable unless you specify otherwise. Sharing of virtual devices or hardware backing stores must be carefully planned in order to prevent data corruption. To restrict the vswitch named myswitch so that it is no longer shareable, enter the following command:
This command restricts the vswitch called myswitch to use by one guest only. If a backing storage device malfunctions, replace it by using the hpvmdevmgmt -n option. The -n option works for only guest devices. It replaces the existing device entry with the new device entry while keeping all the current guest dependents. Thus, each guest dependent is modified to replace the old device with the new one. If the device being replaced is a pNIC, use the hpvmnet command to halt and remove the current vswitches using that pNIC and recreate the same named vswitches using the new pNIC. This method allows guests to use the new pNIC through the old vswitch names without modifying the guests. A device entry can be deleted only if it has no dependents. If a device has dependents, those dependents must be removed before you delete the device. The hpvmmodify command that removes a device removes that guest as a dependent on that device. If the guest cannot be modified, you can use the hpvmdevmgmt -d command to delete a dependent from a device. However, this command does not modify the guest that is dependent on the device. Use this method only if you can use the hpvmmodify command on the guests that are dependent on the device. The following example shows how to remove a guest as a dependent:
You must set up restricted devices to ensure that no guest uses devices that are reserved for use by the VM Host, including the storage devices that the VM Host uses to boot and run. This can also include a network LAN device to which the host requires exclusive access. If a volume manager is used for host-specific file systems, then the restricted devices should include both the volume devices and the underlying special device files to protect both from guest access. For more information, see Chapter 7. You can also allow guests to access certain files while restricting them from accessing the device files that contain those files. You can add or delete restricted device entries to the Integrity VM device database. For example, to add /dev/rdisk/disk0 as a restricted device, enter the following command:
To delete the restricted device /dev/rdisk/disk0, enter the following command:
To add network lan0 as a restricted device, enter the following command:
If a guest's configuration file contains restricted devices, the guest does not start. |
Printable version | ||
|