Citrix Systems Server 5.6 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie do zarządzania systemami Citrix Systems Server 5.6. Citrix Systems Server 5.6 User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - 1.1 Edition

Citrix XenServer ® 5.6 Administrator's GuidePublished June 20101.1 Edition

Strona 2

xConfiguring Workload Balancing Settings ... 98To display the Wo

Strona 3 - Table of Contents

80• changing the hostname• adding or removing DNS servers• changing IP addresses• changing which NIC is used as the management interface• adding a new

Strona 4

812. Use the host-list CLI command to confirm that the member host has successfully reconnected to themaster host by checking that all the other XenSe

Strona 5

82Warning:Once the management interface is disabled, you will have to log in on the physical host console to performmanagement tasks and external inte

Strona 6

831. Use XenCenter or the vm-shutdown command to shut down all VMs in the pool to force existing VIFsto be unplugged from their networks.xe vm-shutdow

Strona 7

84Finally, re-plug the PIF or reboot the host for the change to take effect.Recovering from a bad network configurationIn some cases it is possible to

Strona 8

85Workload BalancingWhat's New?This topic describes new features and changes from the previous release of Workload Balancing.New FeaturesWorkload

Strona 9

86• Improved Error Messages. Improved error messages make issues easier to understand. Also, errormessages are now documented with suggested actions.I

Strona 10

87Workload Balancing works by evaluating the utilization of workloads across a pool and, when a host exceedsits threshold, relocating it to a less-ta

Strona 11

88• Command Line. If you install Workload Balancing from the command line, the prerequisites are notchecked. For Msiexec properties, see

Strona 12

89• Memory: 2GB recommended (1GB of RAM required)• Disk Space:• SQL Server Express: 4GB• SQL Server: 20GB (approximate amount consumed)Citrix recommen

Strona 13

xiModifying the Aggressiveness Setting ... 107Receiving Reports by Email Automaticall

Strona 14

90• SQL Server and Windows Authentication mode (Mixed Mode authentication)If you create an account on the database for use during Setup, the account

Strona 15

91WLB Access Control PermissionsWhen Role Based Access Control (RBAC) is implemented in your environment, all user roles can displaythe WLB tab. Howev

Strona 16

92To install Workload Balancing serverThe following procedure installs Workload Balancing on one computer:1. Launch the Workload Balancing Setup wizar

Strona 17

93• SQL Server Authentication. To select this option, you must have configured SQL Server to supportMixed Mode authentication.Note:Citrix recommends c

Strona 18

94• If you used the Setup wizard, the log is at C:\Documents and Settings\username\Local Settings\Temp\msibootstrapper2CSM_MSI_Install.log (by default

Strona 19

95The time it takes to upgrade the server may be affected by the distribution of the database file group.Additional time may be requir

Strona 20

96After Workload Balancing is running for a period of time, if you do not receive optimal placementrecommendations, Citrix strongly re

Strona 21 - Document Overview

97This must be the account or group that was configured during the installation of the Workload BalancingServer. For information, see the section call

Strona 22 - Managing users

98Configuring Antivirus SoftwareBy default, most antivirus programs are configured to scan all files on the hard disk. If an antivirus programscans th

Strona 23 - Upgrading from XenServer 5.5

99Before you edit your thresholds, you might find it handy to generate a the section called “Host Health History”report for each physical host in the

Strona 24

xiiDisplaying Workload Balancing Reports ... 117Report Generation Featu

Strona 25 - User authentication

100weekdays or weekends as a group when specifying days. For the hour, you can choose any hour and youcan specify minutes in 15-minute intervals.To se

Strona 26 - Leaving an AD domain

101Accepting Optimization Recommendations AutomaticallyWorkload Balancing lets you configure for it to accept optimization recommendations on your beh

Strona 27 - Role Based Access Control

102If Workload Balancing detects a performance issue while the pool is in Maximum Density mode, it attemptsto address the issue by recommending

Strona 28 - RBAC process

103better with certain types of hardware), consider if you need to locate the virtual machines hosting theseworkloads in different pools.Because power

Strona 29

104Workload Balancing determines whether to recommend relocating a workload and whether a physical hostis suitable for a virtual-machine workload by e

Strona 30 - Definitions of permissions

105The effect of the weighting varies according to the placement strategy you selected. For example, ifyou selected Maximum Performa

Strona 31

1062. In the Properties pane, click the WLB tab.3. In the WLB tab, click Configure WLB.4. In the left pane, select Excluded Hosts.5. In Excluded Hos

Strona 32

107balancing from generating "artificial" recommendations for this period by setting the Relocation intervalto more than an hour.• If server

Strona 33

108Example recommendation: [1] Move VM07 to host18 [2] Move VM07 to host20 [3] Move VM07 to host18.If 3 was specified for x, this is an example where

Strona 34

109If you want to use the default report delivery mechanism, no additional component installations orconfigurations are required.To conf

Strona 35

xiiiRestoring a VM to its previous state ... 129Deleting a snapshot

Strona 36 - To add a subject to RBAC

110its historical records of performance metrics and your placement strategy. The optimal server is theserver with the most stars.• One of the servers

Strona 37 - Auditing

111• Uninstalling Workload BalancingDisabling Workload BalancingYou can disable Workload Balancing for a resource pool, either temporarily or permanen

Strona 38

112You must enter all the information that you would normally enter when you initially configure a resource poolfor use with Workload Balancing. For i

Strona 39

113c. In the WLB Server Credentials section, enter the user name (for example,workloadbalancing_user) and password the computers running Xe

Strona 40 - Creating a resource pool

114If an optimal server is not available, the words Click here to suspend the VM appear in the EnterMaintenance Mode dialog box.

Strona 41 - Adding shared storage

115at which you want to generate the report, the days on which you want to generate it, and when you wantto start and stop automatic report delivery.U

Strona 42

116• Deliver On. The day of the week you want Workload Balancing to generate and deliver the report. Theschedule you are creating does not become acti

Strona 43 - High Availability

117Export. Lets you export the report as an Acrobat(.PDF) file or as an Excel file with a .XLSextension.Find. Lets you search for a word in a report,

Strona 44 - Restart priorities

118Table 4. Report Toolbar ButtonsDocument Map. Lets you display a documentmap that helps you navigate through long reports.Page Forward/Back. Lets yo

Strona 45 - Enabling HA using the CLI

119Workload Balancing displays the average for each hour for the time period you set. The data point is basedon a utilization average for that hour fo

Strona 46

xivCommand types ... 144Parameter

Strona 47 - Host Power On

120• Event Action. The action that occurred. For definitions of these actions, see the section called “AuditLog Event Names”.• Succeeded. This provide

Strona 48 - Key/Value Pairs

121Note:The High, Medium, and Low threshold ranges are based on the Critical threshold value you set when youinitialized Workload Balancing.Pool Healt

Strona 49 - Sample Script

122• To Host. The physical server where the virtual machine was moved.• Time. The time when the optimization occurred.Virtual Machine Motion HistoryTh

Strona 50 - Storage Overview

123Backup and recoveryThis chapter presents the functionality designed to give you the best chance to recover your XenServerfrom a catastrophic failur

Strona 51 - Virtual Disk Data Formats

124xe vm-export vm=<vm_uuid> filename=<backup> --metadataFull metadata backup and disaster recovery (DR)This section introduces the concep

Strona 52 - VHD-based VDIs

125On the XenServer host menu-driven text console, under the Backup, Update and Restore menu thereare options which provide a more user-friendly inter

Strona 53 - Storage configuration

1267. Every time a new SR is created the storage is checked to see if it contains an existing SR. If so, an optionis presented allowing re-attachment

Strona 54 - VDI types

127storage types the storage repository must have been upgraded if it was created on a previous version ofXenServer and the volume must be in the defa

Strona 55 - Probing an SR

128Creating a snapshot with memoryRun the vm-checkpoint command, giving a descriptive name for the snapshot with memory, so that youcan identify it la

Strona 56

129For example, specifying power-state=halted will select all VMs whose power-state field is equal to 'halted'.Where multiple VMs are matchi

Strona 57

xvlicense-server-address ... 158license-server-port ...

Strona 58 - Storage Multipathing

1301. Run the snapshot-list command to find the UUID of the snapshot or checkpoint that you want to revert to:xe snapshot-list2. Note the UUID of the

Strona 59 - Storage Repository Types

131This will list all of the templates on the XenServer host.Exporting a snapshot to a templateWhen you export a VM snapshot, a complete copy of the V

Strona 60 - Local EXT3 VHD

132The more VBDs attached to a VM, the more likely it is that this timeout may be reached. Citrix recommendsattaching no more that 2 VBDs to a VM to a

Strona 61 - EqualLogic

133VSS snap of volumes hosted on dynamic disks in the Windows Guest : The vm-snapshot-with-quiesce CLIand the XenServer VSS hardware provider do not s

Strona 62

134If you repair or replace the server that was the original master, you can simply bring it up, install theXenServer host software

Strona 63 - Creating a VDI using the CLI

135 xe pool-emergency-transition-to-master xe pool-recover-slaves 2. If the commands succeed, restart the VMs.To restor

Strona 64 - Aggregates

136Monitoring and managing XenServerXenServer and XenCenter provide access to alerts that are generated when noteworthy things happen.XenCenter provi

Strona 65 - Further information

137• license_does_not_support_pooling• pbd_plug_failed_on_server_start• pool_master_transitionThe following alerts appear on the performance graphs in

Strona 66

138alarm_trigger_sensehigh if alarm_trigger_level is a maximum value otherwise low if the alarm_trigger_levelis a minimum value. (default high)alarm_t

Strona 67 - Software iSCSI Support

139Alerts generated from XenServer can also be automatically e-mailed to the resource pool administrator, inaddition to being visible from the XenCent

Strona 68 - Sample QLogic iSCSI HBA setup

xvipatch-precheck ... 165patch-upload ...

Strona 69 - LVM over iSCSI

140TroubleshootingIf you experience odd behavior, application crashes, or have other issues with a XenServer host, this chapteris meant to help you so

Strona 70

141xe host-param-set uuid=<xenserver_host_uuid> logging:syslog_destination=<hostname>2. Issue the command:xe host-syslog-reconfigure uuid=

Strona 71

142Appendix A. Command line interfaceThis chapter describes the XenServer command line interface (CLI). The xe CLI enables the writing

Strona 72

143Example: On the local XenServer host:xe vm-listExample: On the remote XenServer host:xe vm-list -user <username> -password <password> -

Strona 73 - LVM over hardware HBA

144l, pressing TAB a second time will list the possibilities. This is particularly useful when specifying objectUUIDs in commands.Note:When executing

Strona 74

145• vmNote that not every value of <class> has the full set of <class>-param- commands; some have just a subset.Parameter typesThe object

Strona 75

146<class>-param-get uuid=<uuid> param-name=<parameter> [param-key=<key>]Returns the value of a particular parameter. If the p

Strona 76 - To create a CSLG SR

147For scripting, a useful technique is passing --minimal on the command line, causing xe to print only thefirst field in a comma-separated list. For

Strona 77

148CD commandsCommands for working with physical CD/DVD drives on XenServer hosts.CD parametersCDs have the following parameters:Parameter Name Descri

Strona 78 - Managing Storage Repositories

149Parameter Name Description Typemissing true if SR scan operation reported thisCD as not present on diskread onlyother-config A list of key/value pa

Strona 79 - Introducing an SR

xviisr-create ... 175sr-destroy ...

Strona 80 - Resizing an SR

150Parameter Name Description Typeuuid The unique identifier/object reference forthe consoleread onlyvm-uuid The unique identifier/object reference of

Strona 81 - Virtual disk QoS settings

151Blocks other commands from executing until an object exists that satisfies the conditions given on thecommand line. x=y means "

Strona 82

152Parameter Name Description Typeenabled false if disabled whichprevents any new VMs fromstarting on them, whichprepares the XenServer hoststo be shu

Strona 83 - Configuring VM memory

153Parameter Name Description Typehost-metrics-live true if the host is operational read onlylogging The syslog_destinationkey can be set to thehostna

Strona 84 - How does DMC Work?

154Parameter Name Description Typeuuid The unique identifier/object reference forthe CPUread onlynumber the number of the physical CPU corewithin the

Strona 85 - Supported operating systems

155backup file. The command should only be used from a remote off-host machine where you have space tohold the backup file.host-bugreport-uploadhost-b

Strona 86

156Reconfigure the management interface of this XenServer host. Use this command only if the XenServerhost is in emergency mode, meaning that it is a

Strona 87 - Updating memory properties

157details. If not specified, all system status information is saved in the file. The parameter output may betar.bz2 (the default) or zip; if this par

Strona 88 - Upgrade issues

158The host(s) on which this operation should be performed are selected using the standard selectionmechanism (see host selectors above)

Strona 89 - Networking

159host-license-viewhost-license-view [host-uuid=<XenServer_host_UUID>]For XenServer (free edition), displays the contents of the XenServer host

Strona 90 - Networks

xviiivdi-introduce ... 191vdi-resize ...

Strona 91 - NIC bonds

160Be careful when using this CLI command off-host and ensure that you have network connectivity on thenew interface. Use xe pif-reconfigure to set on

Strona 92

161Change the hostname of the XenServer host specified by host-uuid. This command persistently setsboth the hostname in the control domain database

Strona 93 - Creating VLANs

162Set the output of the specified logger. Log messages are filtered by the subsystem in which they originatedand the log level of the message. For ex

Strona 94 - Bonding two NICs together

163Network commandsCommands for working with networks.The network objects can be listed with the standard object listing command (xe netw

Strona 95 - Reverting NIC bonds

164Parameter Name Description Typeother-config:ethtool-sg set to on to enable scatter gather, off todisableread writeother-config:ethtool-tso set to o

Strona 96

165Parameter Name Description Typeapplied Whether or not the patch has beenapplied; true or falseread onlysize Whether or not the patch has beenapplie

Strona 97

166Parameter Name Description Typesr-uuid the storage repository that the PBDpoints toread onlydevice-config additional configuration information that

Strona 98

167The PIF objects can be listed with the standard object listing command (xe pif-list), and the parametersmanipulated with the standard parameter com

Strona 99

168Parameter Name Description Typehost-name-label the name of the XenServer host to whichthis PIF is connectedread onlyIP-configuration-mode type of n

Strona 100 - DNS servers

169Parameter Name Description Typeother-config:ethtool-rx set to on to enable receive checksum,off to disableread writeother-config:ethtool-tx set to

Strona 101 - Disabling management access

xixvm-disk-add ... 205vm-disk-list ...

Strona 102 - Re-ordering NICs

170pif-plugpif-plug uuid=<uuid_of_pif>Attempt to bring up the specified physical interface.pif-reconfigure-ippif-reconfigure-ip uuid=<uuid_of

Strona 103 - Networking Troubleshooting

171Parameter Name Description Typemaster the unique identifier/objectreference of XenServer hostdesignated as the pool'smasterread onlydefault-SR

Strona 104

172Parameter Name Description Typeblobs binary data store read onlywlb-url Path to the WLB server read onlywlb-username Name of the user of the WLBser

Strona 105 - Workload Balancing

173pool-ha-disablepool-ha-disableDisables the High Availability functionality on the resource pool.pool-joinpool-join master-address=<address> m

Strona 106 - Workload Balancing Overview

174Parameter Name Description Typevendor name of the vendor who created thispluginread onlycopyright copyright statement for this SM plugin read onlyr

Strona 107

175Parameter Name Description Typephysical-size total physical size of the SR, in bytes read onlytype type of the SR, used to specify the SRbackend dr

Strona 108 - Recommended Hardware

176sr-introducesr-introduce name-label=<name>physical-size=<physical_size>type=<type>content-type=<content_type>uuid=<sr_uu

Strona 109

177Parameter Name Description Typename-description the description string of the Task read onlyresident-on the unique identifier/object reference ofth

Strona 110

178Templates are essentially VMs with the is-a-template parameter set to true. A template is a "goldimage" that contains all the

Strona 111 - Installing Workload Balancing

179Parameter Name Description Typememory-dynamic-min dynamic minimum memory inbytes. Currently unused, but ifchanged the same constraintsfor memory-dy

Strona 112

Citrix XenServer ® 5.6 Administrator's GuideCopyright © 2009 Citrix All Rights Reserved.Version: 5.6Citrix, Inc.851 West Cypress Creek RoadFort L

Strona 113

xxpool-retrieve-wlb-recommendations ... 212pool-retrieve-wlb-report ...

Strona 114 - Upgrading Workload Balancing

180Parameter Name Description TypeVCPUs-params configuration parameters forthe selected VCPU policy.You can tune a VCPU'spinning withxe vm-param-

Strona 115 - Upgrading SQL Server

181Parameter Name Description Typeactions-after-crash action to take if a VM basedon this template crashesread/writeconsole-uuids virtual console devi

Strona 116

182Parameter Name Description TypePV-bootloader name of or path to bootloader read/writePV-bootloader-args string of miscellaneousarguments for the bo

Strona 117

183Parameter Name Description Typememory-actual the actual memory beingused by a VM based on thistemplate; 0 for a templateread onlyVCPUs-number the n

Strona 118

184Parameter Name Description Typeguest-metrics-last-updated timestamp when the last writeto these fields was performedby the in-guest agent, in thefo

Strona 119 - Scheduled

185Parameter Name Description Typeblocked-operations lists the operations thatcannot be performed on thistemplateread/write map parameterlast-boot-rec

Strona 120

186VBD commandsCommands for working with VBDs (Virtual Block Devices).A VBD is a software object that connects a VM to the VDI, which represents the c

Strona 121

187Parameter Name Description Typestorage-lock True if a storage-level lockwas acquiredread onlystatus-code error/success codeassociated with the last

Strona 122

188Create a new VBD on a VM.Appropriate values for the device field are listed in the parameter allowed-VBD-devices on thespecified VM. B

Strona 123

189VDI parametersVDIs have the following parameters:Parameter Name Description Typeuuid the unique identifier/object reference forthe VDIread onlyname

Strona 124 - Tuning Metric Weightings

1Document OverviewThis document is a system administrator's guide to XenServer™, the platform virtualization solution fromCitrix®. It describes t

Strona 125

190Parameter Name Description Typemanaged true if the VDI is managed read onlyxenstore-data data to be inserted into the xenstoretree (/local/domain/0

Strona 126 - VM Optimization Criteria

191allocated SR does become full, disk space must be made available either on the SR target substrate or bydeleting unused VDIs in the SR.Note:Some SR

Strona 127

192Produces a read-write version of a VDI that can be used as a reference for backup and/or template creationpurposes. You can perform a backup from a

Strona 128

193Parameter Name Description TypeMTU Maximum TransmissionUnit of the VIF in bytes. Thisparameter is read-only, butyou can override the MTUsetting wit

Strona 129

194Parameter Name Description Typeother-config:promiscuous true to a VIF to bepromiscuous on the bridge,so that it sees all traffic overthe bridge. Us

Strona 130

195Attempts to detach the VIF from the VM while it is running.VLAN commandsCommands for working with VLANs (virtual networks). To list and edit virtua

Strona 131 - Disabling Workload Balancing

196Note:All writable VM parameter values can be changed while the VM is running, but the new parameters are notapplied dynamically and will not be app

Strona 132

197Parameter Name Description TypeVCPUs-params configuration parameters forthe selected VCPU policy.You can tune a VCPU'spinning withxe vm-param-

Strona 133

198Parameter Name Description Typeactions-after-crash action to take if the VMcrashes. For PV guests,valid parameters are:preserve (for analysis only)

Strona 134 - Introduction

199Parameter Name Description TypeHVM-shadow-multiplier Floating point value whichcontrols the amount ofshadow memory overheadto grant the VM. Default

Strona 135

2Managing usersWhen you first install XenServer, a user account is added to XenServer automatically. This account is thelocal super user (LSU), or roo

Strona 136

200Parameter Name Description Typestart-time timestamp of the date andtime that the metrics for theVM were read, in the formyyyymmddThh:mm:ss z,where

Strona 137 - Toolbar Buttons

201Parameter Name Description TypePV-drivers-up-to-date flag for latest version of theparavirtualized drivers for theVMread onlymemory memory metrics

Strona 138 - Host Health History

202Parameter Name Description Typesnapshot_time the timestamp of thesnapshot operation thatcreated this VM snapshotread onlymemory-target the target a

Strona 139 - Pool Audit Log History

203vm-cd-insertvm-cd-insert cd-name=<name_of_cd> [<vm-selector>=<vm_selector_value>...]Insert a CD into the virtual CD drive. This c

Strona 140 - Pool Health

204For example:xe vm-compute-maximum-memory vm=testvm total=`xe host-list params=memory-free --minimal`This command uses the value of the memory-free

Strona 141 - Pool Optimization History

205List the data sources that can be recorded for a VM.The VM or VMs on which this operation should be performed are selected using the standard selec

Strona 142

206The disk-size parameter can be specified in bytes or using the IEC standard suffixes KiB (210 bytes),MiB (220 bytes), GiB (230 bytes), and TiB (240

Strona 143 - Backup and recovery

207The filename parameter can also point to an XVA-format VM, which is the legacy export format fromXenServer 3.2 and is used by some third-party ven

Strona 144

208Migrate the specified VMs between physical hosts. The host parameter can be either the name or theUUID of the XenServer host.By default, the V

Strona 145

209Shut down the specified VM.The VM or VMs on which this operation should be performed are selected using the standard selectionmechanism (see VM sel

Strona 146 - VM Snapshots

3XenCenter Term XenServer CLI TermUsers SubjectsAdd users Add subjectsUnderstanding Active Directory authentication in the XenServer environmentEven t

Strona 147 - Creating a VM Snapshot

210vm-vif-listvm-vif-list [<vm-selector>=<vm_selector_value>...]Lists the VIFs from the specified VMs.The VM or VMs on which this operatio

Strona 148

211pool-certificate-listXenServer’s Workload Balancing component lets you use certificates to secure communication betweenXenServer pools and the Work

Strona 149 - Deleting a snapshot

212pool-param-setpool-param-set wlb-verify-cert=<true> uuid=<uuid_of_pool>Run this command on the pool, after running the pool-certificate

Strona 150 - Snapshot Templates

213xe pool-retrieve-wlb-report report=optimization_performance_history \poolid=<51e411f1-62f4-e462-f1ed-97c626703cae> \utcoffset=<-5> \sta

Strona 151

214IndexAAMD-V (AMD hardware virtualization), 19CCD commands, xe CLI, 148CLI (see command line interface)Command line interface (CLI)basic xe syntax,

Strona 152

215member, 133, 133removing XenServer host from, 22requirements for creating, 19SSAN (see Storage Area Network)Shared network attached storage (NFS),

Strona 153 - Coping with machine failures

4configurations, the active directory server may provide the DNS itself. This can be achieved either usingDHCP to provide the IP address and a list of

Strona 154 - Physical Machine failure

51. Configure the DNS server to use on your XenServer hosts:xe pif-reconfigure-ip mode=static dns=<dnshost>2. Manually set the management interf

Strona 155

6xe subject-listYou may wish to apply a filter to the list, for example to get the subject identifier for a user named user1in the testad domain, you

Strona 156

7When you leave the domain (that is, disable Active Directory authentication and disconnect a pool or serverfrom its domain), any users who authentica

Strona 157 - Customizing Alerts

8The local super user (LSU), or root, is a special user account used for system administration and has allrights or permissions. In XenServer, the l

Strona 158 - Configuring Email Alerts

9A user's role can be changed in two ways:1. Modify the subject -> role mapping (this requires the assign/modify role permission, only availab

Strona 159 - Custom Searches

iiiTable of ContentsDocument Overview ... 1How this Guide relates to

Strona 160 - Troubleshooting

10RolepermissionsPool Admin PoolOperatorVM PowerAdminVM Admin VMOperatorRead OnlyVM changeCD mediaX X X X X View VMconsolesX X X X X XenCenterview m

Strona 161 - XenCenter logs

11Table 2. Definitions of permissionsPermission Allows Assignee To Rationale/CommentsAssign/modify roles • Add/remove users• Add/remove roles from use

Strona 162 - Basic xe syntax

12Permission Allows Assignee To Rationale/CommentsPool management • Set pool properties (naming,default SRs)• Enable, disable, and configureHA• Set pe

Strona 163 - Special characters and syntax

13Permission Allows Assignee To Rationale/CommentsVM advanced operations • Adjust VM memory (throughDynamic Memory Control)• Create a VM snapshot with

Strona 164 - Command types

14Permission Allows Assignee To Rationale/CommentsAccept WLB PlacementRecommendations• Select one of the serversWorkload Balancingrecommends for place

Strona 165 - Low-level param commands

15uuid( RO): 0165f154-ba3e-034e-6b27-5d271af109baname ( RO): pool-admindescription ( RO): The Pool Administrator role can do anything uu

Strona 166 - Low-level list commands

16uuid ( RO): bb6dd239-1fa9-a06b-a497-3be28b8dca44subject-identifier ( RO): S-1-5-21-1539997073-1618981536-2562117463-2244other-config (MRO): subject-

Strona 167 - Bonding commands

17To change a subject's RBAC role:To change a user's role it is necessary to remove them from their existing role, and add them to a new rol

Strona 168 - CD commands

18How does XenServer compute the roles for the session?1. The subject is authenticated via the Active Directory server to verify which containing grou

Strona 169 - Console commands

19XenServer hosts and resource poolsThis chapter describes how resource pools can be created through a series of examples using the xe

Strona 170 - Event commands

ivCreating a resource pool ... 20Creating h

Strona 171 - Host parameters

20Note:The requirement for a XenServer host to have a static IP address to be part of a resource pool also appliesto servers providing shared NFS or i

Strona 172

21xe pool-param-set name-label=<"New Pool"> uuid=<pool_uuid>Creating heterogeneous resource poolsNote:Heterogeneous resource poo

Strona 173

22Adding NFS shared storage to a resource pool using the CLI1. Open a console on any XenServer host in the pool.2. Create the storage repository on &l

Strona 174

23High AvailabilityThis section explains the XenServer implementation of virtual machine high availability (HA), and how toconfigure it using the xe C

Strona 175

24running on it to be stopped. The other servers will detect that the VMs are no longer running and the VMswill be restarted according to the restar

Strona 176

251 | 2 | 3when a pool is overcommited the HA mechanism will attempt to restart protected VMs with the lowestrestart priority firstbest-effortVMs with

Strona 177

264. Run the pool-ha-compute-max-host-failures-to-tolerate command. This command returns themaximum number of hosts that can fail before there

Strona 178

27XenCenter offers you a dialog box to automate disabling the protection if you click on the Shutdown buttonof a protected VM.Note:If you shut down a

Strona 179

28Balancing's Host Power Management feature, use the pool-send-wlb-configuration command with theParticipatesInPowerManagement=<true> \ con

Strona 180

29• Possible values:• An empty string, representing power-control disabled• "iLO". Lets you specify HP iLO.• "DRAC". Lets you s

Strona 181 - Log commands

vStorage Overview ... 30Storage Re

Strona 182 - Message commands

30StorageThis chapter discusses the framework for storage abstractions. It describes the way physical storagehardware of various kinds

Strona 183 - Network commands

31configuration fields that are used to connect to and interact with a given storage target. For example, NFSdevice configuration includes the IP addr

Strona 184 - Patch (update) commands

32VHD-based VDIsVHD files may be chained, allowing two VDIs to share common data. In cases where a VHD-backed VM iscloned, the resulting VMs share the

Strona 185 - PBD commands

33reported for the SR will depend on the number of snapshots, and the amount of difference data written toa disk between each snapshot.LVM-based space

Strona 186 - PIF commands

34SRs can also be destroyed when no longer in use to free up the physical device, or forgotten to detachthe SR from one XenServer host and attach it t

Strona 187 - PIF parameters

35xe vdi-create sr-uuid=<sr-uuid> type=user virtual-size=<virtual-size> \ name-label=<VDI name> sm-config:type=raw2. Attach the n

Strona 188

36xe sr-probe type=lvmoiscsi device-config:target=192.168.1.10 \ device-config:targetIQN=iqn.192.168.1.10:filer1Error code: SR_BACKEND_FAILURE_107Err

Strona 189

37SR type device-config parameter, in order ofdependencyCan beprobed?Required for sr-create?netapp target No Yes username No Yes password No Yes ch

Strona 190 - Pool commands

38SR type device-config parameter, in order ofdependencyCan beprobed?Required for sr-create?provision-type Yes Noprotocol Yes Noprovision-options Yes

Strona 191

39dm-multipath tools in linux, device mapper nodes are not automatically created for all LUNs on thesystem, and it is only when LUN

Strona 192

viCreating a shared EqualLogic SR ... 41EqualLogic VDI Snapshot space

Strona 193 - Storage Manager commands

40The maximum supported VDI sizes are:Storage type Maximum VDI sizeEXT3 2TBLVM 2TBNetapp 2TBEqualLogic 15TBONTAP(NetApp) 12TBLocal LVMThe Local LVM ty

Strona 194 - SR commands

41Parameter Name Description Required?Device device name on the local host touse for the SRYesTo create a local ext SR on /dev/sdb use the following c

Strona 195

42Parameter Name Description Optional?target the IP address or hostname of the EqualLogicarray that hosts the SRnousername the login username used to

Strona 196 - Task commands

43then the plug-in will use all of the space on the SAN for creating VDIs. When the SR is created, a smallamount of meta data is created, called the S

Strona 197 - Template commands

44The easiest way to create NetApp SRs is to use XenCenter. See the XenCenter help for details. See thesection called “Creating a shared NetApp SR ove

Strona 198 - Template parameters

45Thick or thin provisioningWhen creating NetApp storage, you can also choose the type of space management used. By default,allocated spac

Strona 199

46• General information on NetApp products• Data ONTAP• FlexVol• FlexClone• RAID-DP• Snapshot• FilerViewCreating a shared NetApp SR over iSCSIDevice-c

Strona 200

47Note:This works on new VDI creation in the selected FlexVol, or on all FlexVols during an SR scan and overridesany manual size adjustments made by t

Strona 201

48HBAs are identical to those for Fibre Channel HBAs, both of which are described in the section called“Creating a shared LVM over Fi

Strona 202

49Once the HBA is physically installed into the XenServer host, use the following steps to configure the HBA:1. Set the IP networking configuration fo

Strona 203

viiAdjusting the disk IO scheduler ... 61Virtual disk QoS se

Strona 204

50Parameter Name Description Optional?chapuser the username to be used for CHAP authentication nochappassword the password to be used for CHAP authent

Strona 205 - User commands

51xe sr-probe type=lvmohba \host-uuid=1212c7b3-f333-4a8d-a6fb-80c5b79b5b31Error code: SR_BACKEND_FAILURE_90Error parameters: , The request is missing

Strona 206 - VBD commands

52Note:You can use the BRAND_CONSOLE; Repair Storage Repository function to retry the PBD creation andplugging portions of the sr-cr

Strona 207

53mode export. Asynchronous exports acknowledge writes that are not actually on disk, and so administratorsshould consider the risks of failure carefu

Strona 208 - VDI commands

54XenServer support for Fibre Channel does not support direct mapping of a LUN to a VM. HBA-based LUNsmust be mapped to the host and specified for use

Strona 209 - VDI parameters

55Parameter name Description Optional?storagePoolId The storage pool ID within thespecified storage system to usefor allocating storageNousername The

Strona 210

56Parameter name Description Optional?physical-size The total size of the SR in MB.Each pool will be created witha size equal to physical-sizedivided

Strona 211

57xe sr-probe type=cslg device-config:target=192.168.128.10<csl__storageSystemInfoList> <csl__storageSystemInfo> <friendlyNam

Strona 212 - VIF commands

58You can use grep to filter the sr-probe output to just the storage pool IDsxe sr-probe type=cslg device-config:target=192.168.128.10 | grep storageS

Strona 213 -

59Destroying or forgetting a SRYou can destroy an SR, which actually deletes the contents of the SR from the physical media. Alternativelyyou can forg

Strona 214

viiiInitial networking configuration ... 72Managing networ

Strona 215 - VM commands

60Resizing an SRIf you have resized the LUN on which a iSCSI or HBA SR is based, use the following procedures to reflectthe size change in XenServer:1

Strona 216

611. Shutdown the VM.2. Use the xe CLI to identify the UUIDs of the VDIs to be moved. If the VM has a DVD drive its vdi-uuidwill be listed as <not

Strona 217

62Remember to set the scheduler to cfq on the SR, and to ensure that the PBD has been re-plugged in orderfor the scheduler change to take effect.The f

Strona 218

63Configuring VM memoryWhen a VM is first created, it is allocated a fixed amount of memory. To improve the utilization ofphysical m

Strona 219

64• Dynamic Minimum Memory: A lower memory limit that you assign to the VM.• Dynamic Higher Limit: An upper memory limit that you assign to the VM.For

Strona 220

651. Target Mode: The administrator specifies a memory target for the guest.XenServer adjusts the guest'smemory allocation to meet the targe

Strona 221

66Operating System Supported Memory Limitsx64≥ 2 GB ≤ 32 GB4.5 - 4.8 x86≥ 256 MB ≤ 16 GBCent0S Linux5.0 - 5.4 x86 x64≥ 512 MB ≤ 16 GB4.5 - 4.8 x86≥ 25

Strona 222

671. Find the uuid of the required VM:xe vm-list2. Note the uuid, and then run the command param-name=memory-dynamic:xe vm-param-get uuid=<uuid>

Strona 223

68Update individual memory propertiesWarning:Citrix advises not to change the static minimum level as this is set at the supported level per operating

Strona 224

69NetworkingThis chapter discusses how physical network interface cards (NICs) in XenServer hosts are used to enablenetworking within Virtual Machines

Strona 225

ixWorkload Balancing ... 85What’s New? ...

Strona 226

70Network objectsThere are three types of server-side software objects which represent networking entities. These objects are:• A PIF, which represent

Strona 227

71Using VLANs with dedicated storage NICsDedicated storage NICs can be configured to use native VLAN / access mode ports as described above formanagem

Strona 228

72Note:Bonding is set up with an Up Delay of 31000ms and a Down Delay of 200ms. The seemingly long Up Delayis purposeful because of the time taken by

Strona 229

73• use an internal network• support advanced operations such as VLANs or NIC bondingTo add or remove networks using XenCenter, refer to the XenCenter

Strona 230 - Workload Balancing commands

74xe vlan-create network-uuid=<network_uuid> pif-uuid=<pif_uuid> vlan=55. Attach VM VIFs to the new network. See the section called “Creat

Strona 231

758. Use the pif-reconfigure-ip command to remove the IP address configuration from the non-bonded PIFpreviously used for the management interface. Th

Strona 232 - <-5> \

76Warning:Do not attempt to create network bonds while HA is enabled. The process of bond creation will disturb thein-progress HA heartbeating and cau

Strona 233

77a. Use the host-list command to find the UUID of the host being configured:xe host-listb. Use the pif-list command to determine the UUID of bond PIF

Strona 234

78To add NIC bonds to the pool master and other hosts1. Use the network-create command to create a new pool-wide network for use with the bonded NICs.

Strona 235

79Configuring a dedicated storage NICXenServer allows use of either XenCenter or the xe CLI to configure and dedicate a NIC to specific functions,such

Komentarze do niniejszej Instrukcji

Brak uwag