Running Xen: A Hands-On Guide to the Art of Virtualization

Paperback (Print)
Buy New
Buy New from BN.com
$39.83
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (20) from $1.99   
  • New (7) from $29.67   
  • Used (13) from $1.99   

Overview

“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

The Real–World, 100% Practical Guide to Xen Virtualization in Production Environments

Using free, open source Xen virtualization software, you can save money, gain new flexibility, improve utilization, and simplify everything from disaster recovery to software testing. Running Xen brings together all the knowledge you need to create and manage high–performance Xen virtual machines in any environment. Drawing on the unparalleled experience of a world–class Xen team, it covers everything from installation to administration—sharing field-tested insights, best practices, and case studies you can find nowhere else.

The authors begin with a primer on virtualization: its concepts, uses, and advantages. Next, they tour Xen’s capabilities, explore the Xen LiveCD, introduce the Xen hypervisor, and walk you through configuring your own hard–disk–based Xen installation. After you’re running, they guide you through each leading method for creating “guests” and migrating existing systems to run as Xen guests. Then they offer comprehensive coverage of managing and securing Xen guests, devices, networks, and distributed resources. Whether you’re an administrator, data center manager, developer, system integrator, or ISP, Running Xen will help you achieve your goals with Xen–reliably, efficiently, with outstanding performance, and at a surprisingly low cost.

•Understanding the Xen hypervisor: what it does, and how it works

•Using pre-built system images, including compressed file systems

•Managing domains with the xm console

•Populating and storing guest images

•Planning, designing, and configuring networks in Xen

•Utilizing Xen security: special purpose VMs, virtual network segments, remote access, firewalls, network monitors, sHype access control, Xen Security Modules (XSM), and more

•Managing guest resources: memory, CPU, and I/O

•Employing Xen in the enterprise: tools, products, and techniques

Read More Show Less

Product Details

  • ISBN-13: 9780132349666
  • Publisher: Prentice Hall
  • Publication date: 4/24/2008
  • Pages: 586
  • Product dimensions: 7.06 (w) x 9.25 (h) x 1.21 (d)

Meet the Author

Jeanna Matthews is an associate professor of Computer Science at Clarkson University (Potsdam, New York) where she leads several hands-on computing laboratories including the Clarkson Open Source Institute and Clarkson Internet Teaching Laboratory. Students in these labs and in her classes have been winners in a number of prestigious computing contests including the 2001, 2002, and 2004 IBM Linux Challenge, the 2005 IBM North American Grid Scholar’s Challenge, the 2005 Unisys Tuxmaster competition, and the 2006 VMware Ultimate Virtual Appliance Challenge. Her research interests include virtualization, operating systems, computer networks, and computer security. She is actively involved in the Association for Computing Machinery as treasurer of the Special Interest Group on Operating Systems, editor of Operating Systems Review, and is a member of the Executive Committee ACM’s U.S. Public Policy Committee, US-ACM. She is also the author of a computer networking textbook, Computer Networking: Internet Protocols in Action, that has been translated into several languages. Jeanna received her Ph.D. in Computer Science from the University of California at Berkeley in 1999.

Eli M. Dow is a software engineer in IBM’s Test and Integration Center for Linux in Poughkeepsie, NY. He holds a B.S. degree in Computer Science and Psychology as well as an M.S. in Computer Science from Clarkson University. He is passionate about open source software and is an alumnus and founding member of the Clarkson Open Source Institute. His interests include virtualization, Linux systems programming, the GNOME desktop, and human-computer interaction. He is the author of numerous IBM developerWorks articles focused on Linux and open source software. Additionally, he has coauthored two books on the mainframe hypervisor z/VM, entitled Introduction to the New Mainframe: z/VM Basics and Linux for IBM System z9 and IBM zSeries. His first published experience with Xen was coauthoring an early academic paper entitled “Xen and the Art of Repeated Research.” Recently he has focused on developing highly available, enterprise customer solutions deployed on virtualized Linux using the z/VM hypervisor.

Todd Deshane expects to obtain a Ph.D. in Engineering Science from Clarkson University in 2008. He also has a Master of Science in Computer Science and a Bachelor of Science in Software Engineering from Clarkson. While at Clarkson University, he has had a variety of research publications–many involving Xen. In 2005, a project that was based on Todd’s Master’s thesis–an open source collaborative, large database explorer–won first place in the Unisys TuxMaster competition. Todd’s primary academic and research interests are in the area of operating system technologies, such as virtual machine monitors, high availability, and file systems. His doctoral dissertation focuses on using these technologies to provide desktop users with an attack-resistant experience, with automatic and autonomic recovery from viruses, worms, and adverse system modifications. During his Ph.D. years, Todd has been a teaching assistant and an IBM Ph.D. Fellowship recipient. At IBM, Todd has worked on internship projects involving Xen and IBM technologies. Todd enjoys teaching, tutoring, and helping people.

Wenjin Hu graduated from Clarkson University in 2007 with a Master’s degree of Computer Science and is currently working on his Ph.D. His Masters thesis was “A Study of the Performance Isolation Properties of Virtualization Systems.” His research field is applying virtualization techniques to operating systems and security.

Jeremy Bongio is currently a Master’s student at Clarkson University. He won second place in the Unisys Tuxmaster competition in 2005 with a project called Xenophilia, an early effort to make Xen more user friendly. He is a current member and former student director of the Clarkson Open Source Institute, where he actively learns and experiments with different kinds of virtualization.

Patrick F. Wilbur is currently pursuing graduate studies in Computer Science at Clarkson University. His interests include operating systems, systems and application security, natural language processing, and home automation. In his spare time, Patrick enjoys composing music, experimenting with amateur radio, storm chasing, and working on various electronics, software, and carpentry projects around the house. He is currently a member of the Clarkson Open Source Institute, a volunteer at the Applied Computer Science Laboratories at Clarkson University, an emergency communications volunteer, and a member of the Association for Computing Machinery.

Brendan Johnson graduated from Clarkson University in 2002 with a Bachelor’s degree in Computer Science and a minor in Mathematics. Brendan continued his education at Clarkson University and obtained a Master’s of Science in Computer Science with a thesis in quantum computing. Brendan is currently a senior software architect at Mobile Armor, a world leading “Data At Rest” encryption software company.

Read More Show Less

Read an Excerpt

PrefacePreface

We began using Xen in the fall of 2003 soon after reading the paper "Xen and the Art of Virtualization" published in the Symposium on Operating Systems Principles (SOSP). After attending SOSP and talking to some of the authors, Jeanna Matthews returned excited about Xen. She and her graduate operating systems course at Clarkson University decided to repeat and extend the results reported in that paper. That class included two of the coauthors for this book, Eli Dow (currently at IBM) and Todd Deshane (currently completing his Ph.D.), who were both studying for their Master's degrees at the time. In the process of repeating the results from the 2003 Xen paper, we learned a lot about running Xen—much of it the hard way! Our goal for this book was to write exactly the material we wished was available when we first started using Xen.

In July 2004, we published the paper "Xen and the Art of Repeated Research," describing our experience with Xen and presenting the results we obtained repeating and extending the results. All the authors, in addition to being a part of the Fall 2003 graduate operating systems course, were also members of the Applied Computing Laboratories at Clarkson University, specifically the Clarkson Open Source Institute (COSI) and the Clarkson Internet Teaching Laboratory (ITL). These labs were founded to provide students with hands-on experience with cutting-edge computing technologies and to form a community in which everyone both learns and teaches. Other students in the labs—both graduate and undergraduate—began to use Xen as the basis for both production systems and for research projects. Through the years, we have used Xen as the basis for a number of academic papers as well as the basis of award-winning team projects. In the process, we have learned a lot about running Xen. It is our goal in this book to share this knowledge with you and to make your experience running Xen as smooth and simple as possible.

The book is targeted at individuals and organizations that are deploying Xen systems. It walks the reader through the basics, from installing Xen to using prebuilt guest images. It even tells readers how to experiment with Xen using only a Xen LiveCD. It covers the basics of virtualizations and important elements of all Xen systems like the hypervisor and Domain0. It explains the details of the xm commands for managing guest domains. It helps users deploy custom guest images based on operating systems from Linux to Windows. It covers more advanced topics such as device virtualization, network configuration, security, and live migration. We hope you will find it a good mix of introductory and advanced topics that will prove useful from your first Xen deployment experiment to running production Xen systems.

Chapter 1, "Xen—Background and Virtualization Basics," is a quick introduction to virtualization in general and to Xen in particular. Chapter 2, "A Quick Tour with the Xen LiveCD," provides an overview of Xen's functionalities by exploring the Xen LiveCD. Chapter 3, "The Xen Hypervisor," focuses on the hypervisor that is the core of any Xen system and some other trusted components such as Domain0 and xend. We build on that common understanding of the Xen hypervisor by concretely showing you how to install and configure your own hard-disk-based Xen installation in Chapter 4, "Hardware Requirements and Installation of Xen Domain0." After you have your own hypervisor installation up and running, this book eases you into using guest images by first showing you how to download and use images available from the Internet in Chapter 5, "Using Prebuilt Guest Images." Chapter 6, "Managing Unprivileged Domains," covers the basics of administering the running DomUs or unprivileged guest domains. You are then guided through the various methods of creating your own custom guest images in Chapter 7, "Populating Guest Images." Now that you have all these guests, Chapter 8, "Storing Guest Images," covers a variety of choices for storing guest images for online use as well as backup and sharing.

The second half of this book delves into more advanced system management topics including device management (Chapter 9, "Device Virtualization and Management"), networking (Chapter 10, "Network Configuration"), security ( Chapter 11, "Securing a Xen System"), resource distribution (Chapter 12, "Managing Guest Resources"), and migration (Chapter 13, "Guest Save, Restore and Live Migration"). We conclude with a survey of some of the popular administrative tools available for your Xen systems in Chapter 14, "An Overview of Xen Enterprise Management Tools."

Throughout the book, we include listings illustrating relevant commands and their output. We use the command prompt to indicate where the command should be run. For example, the following would indicate a command to be run as root on the privileged domain, Domain0:

root@dom0 #

The following would indicate a command to be run as any user in a regular guest domain:

user@domU$

Watching these command prompts will help you identify which of the many guests in your Xen system should be used for running any given command.

It is our intention to maintain a website with additional information and materials relevant to the book. We have registered the domain, runningxen.com, for this purpose and are working on assembling materials. We invite you to check on our progress and to send questions or suggestions.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Table of Contents

Foreword xxi

Preface xxiii

Chapter 1: Xen–Background and Virtualization Basics 1

Common Uses and Benefits of Virtualization 2

Types of Virtualization 5

Emulation 6

Full Virtualization 7

Paravirtualization 8

Operating System Level Virtualization 9

Other Types of Virtualization 11

Overview of Virtualization Types 12

Virtualization Heritage 13

The IBM Mainframe 14

Virtualization on Commodity Hardware 15

Virtualization Extensions for x86 15

Xen Origins and Time Line 15

Other Virtualization Systems for Commodity Hardware 18

Emulation 18

Full Virtualization 19

Paravirtualization 21

Operating System Virtualization 23

Popular Virtualization Products 24

Summary 25

References and Further Reading 26

Chapter 2: A Quick Tour with the Xen LiveCD 27

Running the LiveCD 28

Step 1: Downloading the LiveCD Image and Creating the CD 29

Step 2: Choosing a Domain0 Image from the GRUB Menu 30

Step 3: Logging In and the Desktop 31

Step 4: Creating Guests 33

Step 5: Deleting a Guest 38

Step 6: Interacting with Your Guests 38

Step 7: Testing Your Networking 41

Too Many Guests 44

Summary 44

References and Further Reading 45

Chapter 3: The Xen Hypervisor 47

Xen Hypervisor 48

A Privileged Position 50

Protection Rings 50

Domain0 51

Xen Boot Options 54

Choosing an OS for Domain0 59

xend 60

Controlling xend 60

xend Logs 62

xend Configuration 63

XenStore 67

Summary 73

References and Further Reading 73

Chapter 4: Hardware Requirements and Installation of Xen Domain0 75

Xen Domain0 Processor Requirements 76

Intel VT 77

AMD-V 77

HVM 78

Hardware Device Support and Recommendations 78

Disks and Controllers 78

Networking Devices 80

Graphics Devices 80

Power Management 81

Help for Unsupported Hardware 81

Memory Requirements 81

Choosing and Obtaining a Version of Xen 83

Open Source Distributions 83

Commercially Supported Options 84

Methods of Installing Domain0 Hosts 86

Common Prerequisite: The Grand Unified Boot Loader (GRUB) 87

Linux Distributions 87

OpenSUSE 88

CentOS 91

Ubuntu 98

Xen from Binary Packages 101

Gentoo 105

XenExpress 112

Non-Linux Domain0 Installations 114

Building from Source 116

Summary 118

References and Further Reading 118

Chapter 5: Using Prebuilt Guest Images 121

Introduction to DomU Guests 122

Guest Images 122

Operating System Kernels 123

Configuration Files 123

Working with Prebuilt Guest Images 128

Types of Guest Images 128

Downloading Prebuilt Guest Images 130

Mounting and Booting Prebuilt Images 131

Downloading Compressed File Guest Images 146

Converting Images from Other Virtualization Platforms 161

Summary 162

References and Further Reading 163

Chapter 6: Managing Unprivileged Domains 165

Introduction to the xm Utility 166

Prerequisites for Running the xm Utility 166

Generic Format of an xm Command 167

The xm list Subcommand 169

Basic List Information 169

Listing Information about a Specific Guest 171

long Option 172

Label Option 173

The xm create Subcommand 174

Prerequisites for xm create 174

Simple Examples of xm create 175

Guest Configuration Files 178

Python Format 178

Common Configuration Options 179

S-Expression (SXP) Format 180

Path to Configuration Files 181

Diagnosing Problems with Guest Creation 182

Dry Run 182

Console Output 183

Sample Problems 184

Automatically Starting DomUs 191

Shutting Down Guest Domains 193

xm shutdown 193

xm reboot 196

xm destroy 198

Pausing Domains 199

xm pause 200

xm unpause 200

Interacting with a Guest Nongraphically 201

xm console 202

SSH 204

Interacting with a Guest Graphically 204

X Forwarding with SSH 205

Configuration of SSH Server and Client 205

VNC 207

Virtual Frame Buffer and Integrated VNC/SDL Libraries 210

Freenx 212

Remote Desktop 213

Summary 215

References and Further Reading 216

Chapter 7: Populating Guest Images 217

Hardware Virtual Machine (HVM) Guest Population 218

Populating a Guest Image from a Disc or Disc Image (Windows XP Example) 218

Automated Population with virt-install 225

Paravirtualized (PV) Guest Population 228

OpenSUSE: YaST Virtual Machine Management 229

CentOS/Fedora: virt-manager 233

Debian/Ubuntu: debootstrap 242

Gentoo: quickpkg and domi Scripts 246

Xen Express 256

Guest Image Customization 266

Customizing Hostnames 266

Customizing Users 267

Customizing Packages and Services 268

Customizing the File System Table (/etc/fstab) 268

Converting Existing Installations 270

Summary 274

References and Further Reading 274

Chapter 8: Storing Guest Images 277

Logical Volumes 278

Basic LVM Usage 279

Resizing Images 282

Image Snapshots Using Copy on Write 286

Network Image Storage Options 287

iSCSI 288

ATA over Ethernet (AoE) 293

NFS 297

Comparing Network Storage Options 300

Guest Image Files 301

Preparing Compressed tar Image Files 301

Preparing Disk Image Files 302

Preparing Guest Partition Image Files 312

Mounting Disks and Partition Images 314

Summary 316

References and Further Reading 316

Chapter 9: Device Virtualization and Management 319

Device Virtualization 320

Paravirtualization of Devices 320

Full Virtualization of Devices 321

No Virtualization 321

Backends and Frontends 322

Backend Information in XenStore 323

Frontend Information in XenStore 325

Granting Control of a PCI Device 326

Identifying a PCI Device 326

Hiding a PCI Device from Domain0 at Boot 327

Manually Unbinding/Binding a PCI Device at Runtime 328

Granting a PCI Device to Another Domain 329

Exclusive Device Access Versus Trusted Driver Domains 331

Exclusive Device Access 331

Trusted Driver Domains 332

Problems Using Trusted Driver Domains 333

Device Emulation with QEMU-DM 334

Future Directions 335

More Devices 336

Smart Devices 336

Summary 336

References and Further Reading 337

Chapter 10: Network Configuration 339

Network Virtualization Overview 340

Designing a Virtual Network Topology 341

Bridging, Routing, and Network Address Translation 343

Frontend and Backend Network Drivers and Naming 347

Overview of Network Configuration in Xen 349

High-Level Steps 349

Xend Configuration File 350

Guest Domain’s Configuration File 352

Details of Bridging Mode 354

Bridging Configuration Example 355

Testing Results 361

Details of Routing Mode 364

Routing Configuration Example 365

Testing Results 371

Details of NAT Mode 373

NAT Configuration Example 373

Testing Results 379

Configuring Purely Virtual Network Segments 382

Configuring dummy0 383

Testing dummy0 385

Configuring Dummy Bridge 385

Testing Dummy Bridge 388

Assigning MAC Addresses to Virtual Network Interfaces 389

MAC Addresses 389

Specifying or Generating a MAC Address for a Guest Domain 390

Assigning IP Addresses 391

Using an External DHCP Server to Obtain an IP for a Guest Domain 392

Manually Assigning an IP to a Guest Domain 392

Using an Internal DHCP Server to Obtain an IP for a Guest Domain 393

Handling Multiple Network Interfaces in a Domain 394

Handling Multiple Network Interfaces in a driver domain 394

Handling Multiple Network Interfaces in a Guest Domain 396

vnet—Domain Virtual Network 399

Installing vnet 400

Running vnet 401

Summary 403

References and Further Reading 403

Chapter 11: Securing a Xen System 405

Structuring Your System for Security 406

Special Purpose Virtual Machines 406

Creating Virtual Network Segments 407

Securing the Privileged Domain 407

Removing Software and Services 407

Limiting Remote Access 408

Limiting the Local Users 412

Move Device Drivers into DriverDomains 412

Firewall and Network Monitors 413

Running a Firewall with iptables 413

Snort 419

Obtaining Snort 419

Snort and Network Intrusion Detection Mode 420

Mandatory Access Control with sHype and Xen Security Modules 422

sHype 423

Xen Security Modules (XSM) 432

DomU Security 433

Running VMs Only When Needed 434

Backing Up Virtual Machine Images 434

Summary 435

References and Further Reading 436

Chapter 12: Managing Guest Resources 437

Accessing Information about Guests and the Hypervisor 438

xm info 438

xm dmesg 443

xm log 444

xm top 446

xm uptime 449

Allocating Guest Memory 449

Shadow Page Tables 451

Balloon Driver 451

Improving Stability with Swap Space 454

Managing the Allocation of Guest Memory 454

Managing Guest Virtual CPUs 458

Comparing Virtual, Logical, and Physical Processors 458

HVM VCPU Management 459

VCPU Subcommands 460

When to Manually Administer VCPUs 462

Tuning the Hypervisor Scheduler 463

Weight and Cap 463

Protection from Misbehaving Guests 464

Using the Credit Scheduler Command 465

Choosing a Guest IO Scheduler 466

Noop Scheduler 466

Deadline Scheduler 466

Anticipatory Scheduler (as) 467

Complete Fair Queuing Scheduler (cfq) 467

Using IO Schedulers 467

Summary 469

References and Further Reading 469

Chapter 13: Guest Save, Restore, and Live Migration 471

Representing the State of a Virtual Machine 472

Basic Guest Domain Save and Restore 473

xm save 474

xm restore 476

Possible Save and Restore Errors 478

Types of Guest Relocation 479

Cold Static Relocation 480

Warm Static (Regular) Migration 481

Live Migration 482

Preparing for xm migrate 484

Configuring xend 485

Proximity of Sources and Destinations on the Network 488

Network-Accessible Storage 489

Guest Domain Configuration 489

Version and Physical Resource Requirements 491

Experience with xm migrate 491

xm migrate 491

Using xm migrate for Warm Static Migration 492

Using xm migrate for Live Migration 494

Possible Migration Errors 497

Summary 498

References and Further Reading 498

Chapter 14: An Overview of Xen Enterprise Management Tools 499

Programmatic Interfaces to the Xen Hypervisor 500

Libvirt 500

Xen–CIM 501

Xen API 501

Legacy Interfaces to Xend 502

Citrix XenServer Enterprise, Standard and XenExpress Editions 502

Virtual Iron 504

IBM Virtualization Manager 506

Enomalism 507

virt-manager 509

XenMan 513

Managing Multiple Systems 518

Summary 518

References and Further Reading 519

Appendix A: Resources 521

Xen Community 522

XenWiki 523

Xen Mailing Lists and Bug Reporting 524

Xen Summits 525

Xen Source Code 526

Academic Papers and Conferences 528

Distribution-Specific Resources 530

Appendix B: The xm Command 531

Appendix C: Xend Configuration Parameter 537

Appendix D: Guest Configuration Parameter 541

Appendix E: Xen Performance Evaluation 545

Xen Performance Measurements 546

Repeatability of the Xen Team’s Results 546

Xen and Virtual Web Hosting 548

Comparing XenoLinux to Native Linux on Older PC Hardware 550

Xen on x86 Versus IBM zServer 551

Performance Isolation in Xen 553

Performance of Xen Virtual Network and Real Network 556

Summary 558

Index 559

Read More Show Less

Preface

Preface

We began using Xen in the fall of 2003 soon after reading the paper "Xen and the Art of Virtualization" published in the Symposium on Operating Systems Principles (SOSP). After attending SOSP and talking to some of the authors, Jeanna Matthews returned excited about Xen. She and her graduate operating systems course at Clarkson University decided to repeat and extend the results reported in that paper. That class included two of the coauthors for this book, Eli Dow (currently at IBM) and Todd Deshane (currently completing his Ph.D.), who were both studying for their Master's degrees at the time. In the process of repeating the results from the 2003 Xen paper, we learned a lot about running Xen—much of it the hard way! Our goal for this book was to write exactly the material we wished was available when we first started using Xen.

In July 2004, we published the paper "Xen and the Art of Repeated Research," describing our experience with Xen and presenting the results we obtained repeating and extending the results. All the authors, in addition to being a part of the Fall 2003 graduate operating systems course, were also members of the Applied Computing Laboratories at Clarkson University, specifically the Clarkson Open Source Institute (COSI) and the Clarkson Internet Teaching Laboratory (ITL). These labs were founded to provide students with hands-on experience with cutting-edge computing technologies and to form a community in which everyone both learns and teaches. Other students in the labs—both graduate and undergraduate—began to use Xen as the basis for both production systems and for research projects. Through the years, we have used Xen as the basis for a number of academic papers as well as the basis of award-winning team projects. In the process, we have learned a lot about running Xen. It is our goal in this book to share this knowledge with you and to make your experience running Xen as smooth and simple as possible.

The book is targeted at individuals and organizations that are deploying Xen systems. It walks the reader through the basics, from installing Xen to using prebuilt guest images. It even tells readers how to experiment with Xen using only a Xen LiveCD. It covers the basics of virtualizations and important elements of all Xen systems like the hypervisor and Domain0. It explains the details of the xm commands for managing guest domains. It helps users deploy custom guest images based on operating systems from Linux to Windows. It covers more advanced topics such as device virtualization, network configuration, security, and live migration. We hope you will find it a good mix of introductory and advanced topics that will prove useful from your first Xen deployment experiment to running production Xen systems.

Chapter 1, "Xen—Background and Virtualization Basics," is a quick introduction to virtualization in general and to Xen in particular. Chapter 2, "A Quick Tour with the Xen LiveCD," provides an overview of Xen's functionalities by exploring the Xen LiveCD. Chapter 3, "The Xen Hypervisor," focuses on the hypervisor that is the core of any Xen system and some other trusted components such as Domain0 and xend. We build on that common understanding of the Xen hypervisor by concretely showing you how to install and configure your own hard-disk-based Xen installation in Chapter 4, "Hardware Requirements and Installation of Xen Domain0." After you have your own hypervisor installation up and running, this book eases you into using guest images by first showing you how to download and use images available from the Internet in Chapter 5, "Using Prebuilt Guest Images." Chapter 6, "Managing Unprivileged Domains," covers the basics of administering the running DomUs or unprivileged guest domains. You are then guided through the various methods of creating your own custom guest images in Chapter 7, "Populating Guest Images." Now that you have all these guests, Chapter 8, "Storing Guest Images," covers a variety of choices for storing guest images for online use as well as backup and sharing.

The second half of this book delves into more advanced system management topics including device management (Chapter 9, "Device Virtualization and Management"), networking (Chapter 10, "Network Configuration"), security ( Chapter 11, "Securing a Xen System"), resource distribution (Chapter 12, "Managing Guest Resources"), and migration (Chapter 13, "Guest Save, Restore and Live Migration"). We conclude with a survey of some of the popular administrative tools available for your Xen systems in Chapter 14, "An Overview of Xen Enterprise Management Tools."

Throughout the book, we include listings illustrating relevant commands and their output. We use the command prompt to indicate where the command should be run. For example, the following would indicate a command to be run as root on the privileged domain, Domain0:

root@dom0 #

The following would indicate a command to be run as any user in a regular guest domain:

user@domU$

Watching these command prompts will help you identify which of the many guests in your Xen system should be used for running any given command.

It is our intention to maintain a website with additional information and materials relevant to the book. We have registered the domain, runningxen.com, for this purpose and are working on assembling materials. We invite you to check on our progress and to send questions or suggestions.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted June 17, 2008

    A reviewer

    Running Xen takes a unique approach to introducing Xen to both the novice and expert virtualization user. The authors start off introducing just enough of the core concepts to give the reader an adequate basis on which the book later builds on to provide the required skills to effectively run a virtual environment. A brief explanation of Xen architecture follows with an overview of the management tools with real world examples showing actual output. I found this attention to often overlooked detail refreshing such as the use of ssh with keys and X Forwarding to securely communicate with guests impressive, instead of simply using an easier less secure method for example. The reader could choose to skip ahead if the topic was already understood but providing that level of detail is integral to the learning process in my opinion. Simply getting a Xen server up and running accomplishes nothing for the user needing to actually run and administer it after, which is where most technical books fail. The walk through with guest disk images and creating them correctly was well appreciated instead of leaving that to the reader to hopefully figure out. All popular methods for populating guests were covered which allowed distro specific tools to be utilized instead of requiring non native methods or leaving the reader unprepared. Device virtualization was covered, but I assume as Xen is constantly evolving the information at print time regarding hiding a PCI device from Dom0 was still accurate but is now slightly different. Fortunately, all the pointers to additional reading would lead the user to finding the current procedure. Networking was covered in detail which is an often misunderstood part of Xen and a working example of a purely virtual segment using a dummy interface was shown which I found fairly useful. Guest resource management provided an understanding for topics such as the IO Scheduler and gave examples on how to tune it. This was my second book on Xen and completely replaces the first as a much more competent reference. I highly recommend this book for anyone using Xen for its concrete basis and good reference it provides.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)