Running Xen
Home > Computing and Information Technology > Computer networking and communications > Virtualization > Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization

Running Xen: A Hands-On Guide to the Art of Virtualization


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.” —Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems   The Real–World, 100% Practical Guide to Xen Virtualization in Production Environments   Using free, open source Xen virtualization software, you can save money, gain new flexibility, improve utilization, and simplify everything from disaster recovery to software testing. Running Xen brings together all the knowledge you need to create and manage high–performance Xen virtual machines in any environment. Drawing on the unparalleled experience of a world–class Xen team, it covers everything from installation to administration—sharing field-tested insights, best practices, and case studies you can find nowhere else. The authors begin with a primer on virtualization: its concepts, uses, and advantages. Next, they tour Xen’s capabilities, explore the Xen LiveCD, introduce the Xen hypervisor, and walk you through configuring your own hard–disk–based Xen installation. After you’re running, they guide you through each leading method for creating “guests” and migrating existing systems to run as Xen guests. Then they offer comprehensive coverage of managing and securing Xen guests, devices, networks, and distributed resources. Whether you’re an administrator, data center manager, developer, system integrator, or ISP, Running Xen will help you achieve your goals with Xen–reliably, efficiently, with outstanding performance, and at a surprisingly low cost.   •Understanding the Xen hypervisor: what it does, and how it works •Using pre-built system images, including compressed file systems •Managing domains with the xm console •Populating and storing guest images •Planning, designing, and configuring networks in Xen •Utilizing Xen security: special purpose VMs, virtual network segments, remote access, firewalls, network monitors, sHype access control, Xen Security Modules (XSM), and more •Managing guest resources: memory, CPU, and I/O •Employing Xen in the enterprise: tools, products, and techniques

Table of Contents:
Foreword xxi Preface xxiii Chapter 1: Xen–Background and Virtualization Basics 1 Common Uses and Benefits of Virtualization 2 Types of Virtualization 5 Emulation 6 Full Virtualization 7 Paravirtualization 8 Operating System Level Virtualization 9 Other Types of Virtualization 11 Overview of Virtualization Types 12 Virtualization Heritage 13 The IBM Mainframe 14 Virtualization on Commodity Hardware 15 Virtualization Extensions for x86 15 Xen Origins and Time Line 15 Other Virtualization Systems for Commodity Hardware 18 Emulation 18 Full Virtualization 19 Paravirtualization 21 Operating System Virtualization 23 Popular Virtualization Products 24 Summary 25 References and Further Reading 26 Chapter 2: A Quick Tour with the Xen LiveCD 27 Running the LiveCD 28 Step 1: Downloading the LiveCD Image and Creating the CD 29 Step 2: Choosing a Domain0 Image from the GRUB Menu 30 Step 3: Logging In and the Desktop 31 Step 4: Creating Guests 33 Step 5: Deleting a Guest 38 Step 6: Interacting with Your Guests 38 Step 7: Testing Your Networking 41 Too Many Guests 44 Summary 44 References and Further Reading 45 Chapter 3: The Xen Hypervisor 47 Xen Hypervisor 48 A Privileged Position 50 Protection Rings 50 Domain0 51 Xen Boot Options 54 Choosing an OS for Domain0 59 xend 60 Controlling xend 60 xend Logs 62 xend Configuration 63 XenStore 67 Summary 73 References and Further Reading 73 Chapter 4: Hardware Requirements and Installation of Xen Domain0 75 Xen Domain0 Processor Requirements 76 Intel VT 77 AMD-V 77 HVM 78 Hardware Device Support and Recommendations 78 Disks and Controllers 78 Networking Devices 80 Graphics Devices 80 Power Management 81 Help for Unsupported Hardware 81 Memory Requirements 81 Choosing and Obtaining a Version of Xen 83 Open Source Distributions 83 Commercially Supported Options 84 Methods of Installing Domain0 Hosts 86 Common Prerequisite: The Grand Unified Boot Loader (GRUB) 87 Linux Distributions 87 OpenSUSE 88 CentOS 91 Ubuntu 98 Xen from Binary Packages 101 Gentoo 105 XenExpress 112 Non-Linux Domain0 Installations 114 Building from Source 116 Summary 118 References and Further Reading 118 Chapter 5: Using Prebuilt Guest Images 121 Introduction to DomU Guests 122 Guest Images 122 Operating System Kernels 123 Configuration Files 123 Working with Prebuilt Guest Images 128 Types of Guest Images 128 Downloading Prebuilt Guest Images 130 Mounting and Booting Prebuilt Images 131 Downloading Compressed File Guest Images 146 Converting Images from Other Virtualization Platforms 161 Summary 162 References and Further Reading 163 Chapter 6: Managing Unprivileged Domains 165 Introduction to the xm Utility 166 Prerequisites for Running the xm Utility 166 Generic Format of an xm Command 167 The xm list Subcommand 169 Basic List Information 169 Listing Information about a Specific Guest 171 long Option 172 Label Option 173 The xm create Subcommand 174 Prerequisites for xm create 174 Simple Examples of xm create 175 Guest Configuration Files 178 Python Format 178 Common Configuration Options 179 S-Expression (SXP) Format 180 Path to Configuration Files 181 Diagnosing Problems with Guest Creation 182 Dry Run 182 Console Output 183 Sample Problems 184 Automatically Starting DomUs 191 Shutting Down Guest Domains 193 xm shutdown 193 xm reboot 196 xm destroy 198 Pausing Domains 199 xm pause 200 xm unpause 200 Interacting with a Guest Nongraphically 201 xm console 202 SSH 204 Interacting with a Guest Graphically 204 X Forwarding with SSH 205 Configuration of SSH Server and Client 205 VNC 207 Virtual Frame Buffer and Integrated VNC/SDL Libraries 210 Freenx 212 Remote Desktop 213 Summary 215 References and Further Reading 216 Chapter 7: Populating Guest Images 217 Hardware Virtual Machine (HVM) Guest Population 218 Populating a Guest Image from a Disc or Disc Image (Windows XP Example) 218 Automated Population with virt-install 225 Paravirtualized (PV) Guest Population 228 OpenSUSE: YaST Virtual Machine Management 229 CentOS/Fedora: virt-manager 233 Debian/Ubuntu: debootstrap 242 Gentoo: quickpkg and domi Scripts 246 Xen Express 256 Guest Image Customization 266 Customizing Hostnames 266 Customizing Users 267 Customizing Packages and Services 268 Customizing the File System Table (/etc/fstab) 268 Converting Existing Installations 270 Summary 274 References and Further Reading 274 Chapter 8: Storing Guest Images 277 Logical Volumes 278 Basic LVM Usage 279 Resizing Images 282 Image Snapshots Using Copy on Write 286 Network Image Storage Options 287 iSCSI 288 ATA over Ethernet (AoE) 293 NFS 297 Comparing Network Storage Options 300 Guest Image Files 301 Preparing Compressed tar Image Files 301 Preparing Disk Image Files 302 Preparing Guest Partition Image Files 312 Mounting Disks and Partition Images 314 Summary 316 References and Further Reading 316 Chapter 9: Device Virtualization and Management 319 Device Virtualization 320 Paravirtualization of Devices 320 Full Virtualization of Devices 321 No Virtualization 321 Backends and Frontends 322 Backend Information in XenStore 323 Frontend Information in XenStore 325 Granting Control of a PCI Device 326 Identifying a PCI Device 326 Hiding a PCI Device from Domain0 at Boot 327 Manually Unbinding/Binding a PCI Device at Runtime 328 Granting a PCI Device to Another Domain 329 Exclusive Device Access Versus Trusted Driver Domains 331 Exclusive Device Access 331 Trusted Driver Domains 332 Problems Using Trusted Driver Domains 333 Device Emulation with QEMU-DM 334 Future Directions 335 More Devices 336 Smart Devices 336 Summary 336 References and Further Reading 337 Chapter 10: Network Configuration 339 Network Virtualization Overview 340 Designing a Virtual Network Topology 341 Bridging, Routing, and Network Address Translation 343 Frontend and Backend Network Drivers and Naming 347 Overview of Network Configuration in Xen 349 High-Level Steps 349 Xend Configuration File 350 Guest Domain’s Configuration File 352 Details of Bridging Mode 354 Bridging Configuration Example 355 Testing Results 361 Details of Routing Mode 364 Routing Configuration Example 365 Testing Results 371 Details of NAT Mode 373 NAT Configuration Example 373 Testing Results 379 Configuring Purely Virtual Network Segments 382 Configuring dummy0 383 Testing dummy0 385 Configuring Dummy Bridge 385 Testing Dummy Bridge 388 Assigning MAC Addresses to Virtual Network Interfaces 389 MAC Addresses 389 Specifying or Generating a MAC Address for a Guest Domain 390 Assigning IP Addresses 391 Using an External DHCP Server to Obtain an IP for a Guest Domain 392 Manually Assigning an IP to a Guest Domain 392 Using an Internal DHCP Server to Obtain an IP for a Guest Domain 393 Handling Multiple Network Interfaces in a Domain 394 Handling Multiple Network Interfaces in a driver domain 394 Handling Multiple Network Interfaces in a Guest Domain 396 vnet—Domain Virtual Network 399 Installing vnet 400 Running vnet 401 Summary 403 References and Further Reading 403 Chapter 11: Securing a Xen System 405 Structuring Your System for Security 406 Special Purpose Virtual Machines 406 Creating Virtual Network Segments 407 Securing the Privileged Domain 407 Removing Software and Services 407 Limiting Remote Access 408 Limiting the Local Users 412 Move Device Drivers into DriverDomains 412 Firewall and Network Monitors 413 Running a Firewall with iptables 413 Snort 419 Obtaining Snort 419 Snort and Network Intrusion Detection Mode 420 Mandatory Access Control with sHype and Xen Security Modules 422 sHype 423 Xen Security Modules (XSM) 432 DomU Security 433 Running VMs Only When Needed 434 Backing Up Virtual Machine Images 434 Summary 435 References and Further Reading 436 Chapter 12: Managing Guest Resources 437 Accessing Information about Guests and the Hypervisor 438 xm info 438 xm dmesg 443 xm log 444 xm top 446 xm uptime 449 Allocating Guest Memory 449 Shadow Page Tables 451 Balloon Driver 451 Improving Stability with Swap Space 454 Managing the Allocation of Guest Memory 454 Managing Guest Virtual CPUs 458 Comparing Virtual, Logical, and Physical Processors 458 HVM VCPU Management 459 VCPU Subcommands 460 When to Manually Administer VCPUs 462 Tuning the Hypervisor Scheduler 463 Weight and Cap 463 Protection from Misbehaving Guests 464 Using the Credit Scheduler Command 465 Choosing a Guest IO Scheduler 466 Noop Scheduler 466 Deadline Scheduler 466 Anticipatory Scheduler (as) 467 Complete Fair Queuing Scheduler (cfq) 467 Using IO Schedulers 467 Summary 469 References and Further Reading 469 Chapter 13: Guest Save, Restore, and Live Migration 471 Representing the State of a Virtual Machine 472 Basic Guest Domain Save and Restore 473 xm save 474 xm restore 476 Possible Save and Restore Errors 478 Types of Guest Relocation 479 Cold Static Relocation 480 Warm Static (Regular) Migration 481 Live Migration 482 Preparing for xm migrate 484 Configuring xend 485 Proximity of Sources and Destinations on the Network 488 Network-Accessible Storage 489 Guest Domain Configuration 489 Version and Physical Resource Requirements 491 Experience with xm migrate 491 xm migrate 491 Using xm migrate for Warm Static Migration 492 Using xm migrate for Live Migration 494 Possible Migration Errors 497 Summary 498 References and Further Reading 498 Chapter 14: An Overview of Xen Enterprise Management Tools 499 Programmatic Interfaces to the Xen Hypervisor 500 Libvirt 500 Xen–CIM 501 Xen API 501 Legacy Interfaces to Xend 502 Citrix XenServer Enterprise, Standard and XenExpress Editions 502 Virtual Iron 504 IBM Virtualization Manager 506 Enomalism 507 virt-manager 509 XenMan 513 Managing Multiple Systems 518 Summary 518 References and Further Reading 519 Appendix A: Resources 521 Xen Community 522 XenWiki 523 Xen Mailing Lists and Bug Reporting 524 Xen Summits 525 Xen Source Code 526 Academic Papers and Conferences 528 Distribution-Specific Resources 530 Appendix B: The xm Command 531 Appendix C: Xend Configuration Parameter 537 Appendix D: Guest Configuration Parameter 541 Appendix E: Xen Performance Evaluation 545 Xen Performance Measurements 546 Repeatability of the Xen Team’s Results 546 Xen and Virtual Web Hosting 548 Comparing XenoLinux to Native Linux on Older PC Hardware 550 Xen on x86 Versus IBM zServer 551 Performance Isolation in Xen 553 Performance of Xen Virtual Network and Real Network 556 Summary 558 Index 559

About the Author :
Jeanna Matthews is an associate professor of Computer Science at Clarkson University (Potsdam, New York) where she leads several hands-on computing laboratories including the Clarkson Open Source Institute and Clarkson Internet Teaching Laboratory. Students in these labs and in her classes have been winners in a number of prestigious computing contests including the 2001, 2002, and 2004 IBM Linux Challenge, the 2005 IBM North American Grid Scholar's Challenge, the 2005 Unisys Tuxmaster competition, and the 2006 VMware Ultimate Virtual Appliance Challenge. Her research interests include virtualization, operating systems, computer networks, and computer security. She is actively involved in the Association for Computing Machinery as treasurer of the Special Interest Group on Operating Systems, editor of Operating Systems Review, and is a member of the Executive Committee ACM's U.S. Public Policy Committee, US-ACM. She is also the author of a computer networking textbook, Computer Networking: Internet Protocols in Action, that has been translated into several languages. Jeanna received her Ph.D. in Computer Science from the University of California at Berkeley in 1999. Eli M. Dow is a software engineer in IBM's Test and Integration Center for Linux in Poughkeepsie, NY. He holds a B.S. degree in Computer Science and Psychology as well as an M.S. in Computer Science from Clarkson University. He is passionate about open source software and is an alumnus and founding member of the Clarkson Open Source Institute. His interests include virtualization, Linux systems programming, the GNOME desktop, and human-computer interaction. He is the author of numerous IBM developerWorks articles focused on Linux and open source software. Additionally, he has coauthored two books on the mainframe hypervisor z/VM, entitled Introduction to the New Mainframe: z/VM Basics and Linux for IBM System z9 and IBM zSeries. His first published experience with Xen was coauthoring an early academic paper entitled "Xen and the Art of Repeated Research." Recently he has focused on developing highly available, enterprise customer solutions deployed on virtualized Linux using the z/VM hypervisor. Todd Deshane expects to obtain a Ph.D. in Engineering Science from Clarkson University in 2008. He also has a Master of Science in Computer Science and a Bachelor of Science in Software Engineering from Clarkson. While at Clarkson University, he has had a variety of research publications--many involving Xen. In 2005, a project that was based on Todd's Master's thesis--an open source collaborative, large database explorer--won first place in the Unisys TuxMaster competition. Todd's primary academic and research interests are in the area of operating system technologies, such as virtual machine monitors, high availability, and file systems. His doctoral dissertation focuses on using these technologies to provide desktop users with an attack-resistant experience, with automatic and autonomic recovery from viruses, worms, and adverse system modifications. During his Ph.D. years, Todd has been a teaching assistant and an IBM Ph.D. Fellowship recipient. At IBM, Todd has worked on internship projects involving Xen and IBM technologies. Todd enjoys teaching, tutoring, and helping people. Wenjin Hu graduated from Clarkson University in 2007 with a Master's degree of Computer Science and is currently working on his Ph.D. His Masters thesis was "A Study of the Performance Isolation Properties of Virtualization Systems." His research field is applying virtualization techniques to operating systems and security. Jeremy Bongio is currently a Master's student at Clarkson University. He won second place in the Unisys Tuxmaster competition in 2005 with a project called Xenophilia, an early effort to make Xen more user friendly. He is a current member and former student director of the Clarkson Open Source Institute, where he actively learns and experiments with different kinds of virtualization. Patrick F. Wilbur is currently pursuing graduate studies in Computer Science at Clarkson University. His interests include operating systems, systems and application security, natural language processing, and home automation. In his spare time, Patrick enjoys composing music, experimenting with amateur radio, storm chasing, and working on various electronics, software, and carpentry projects around the house. He is currently a member of the Clarkson Open Source Institute, a volunteer at the Applied Computer Science Laboratories at Clarkson University, an emergency communications volunteer, and a member of the Association for Computing Machinery. Brendan Johnson graduated from Clarkson University in 2002 with a Bachelor's degree in Computer Science and a minor in Mathematics. Brendan continued his education at Clarkson University and obtained a Master's of Science in Computer Science with a thesis in quantum computing. Brendan is currently a senior software architect at Mobile Armor, a world leading "Data At Rest" encryption software company.


Best Sellers


Product Details
  • ISBN-13: 9780132349666
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Prentice Hall
  • Height: 235 mm
  • No of Pages: 624
  • Sub Title: A Hands-On Guide to the Art of Virtualization
  • Width: 183 mm
  • ISBN-10: 0132349663
  • Publisher Date: 17 Apr 2008
  • Binding: Paperback
  • Language: English
  • Spine Width: 33 mm
  • Weight: 1020 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Running Xen: A Hands-On Guide to the Art of Virtualization
Pearson Education (US) -
Running Xen: A Hands-On Guide to the Art of Virtualization
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Running Xen: A Hands-On Guide to the Art of Virtualization

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!