Skip to main content

RHEL5 Virtualization: First impressions



I'll soon do mine as well. (If I ever get time, that is!) but this detailed review from a blogger - who copied all of the content from Linux.com!- says a few things:

Interestingly, the interface between the operating system and Xen is “virtualized” as well: all connections to the virtualization system are done via a special library called libvirt. If Red Hat wants to replace Xen in the future with another virtualization technology, the only component to change is libvirt. Any software that depends on libvirt should continue to run unchanged.

Xen does place some demands on the system, ranging from almost no overhead for machines running paravirtualization, to about 5 percent of CPU for machines running full virtualization.

Given the novelty of virtualization and its possibilities, the technology comes with something of a learning curve. To help end-users ramp up, Red Hat has established a Web site, to educate users. The site is chock full of training videos, case studies, and documentation.


I hav always held Redhat as the best linux open source company. They really live up to it. I want to get my hands on this baby asap!

Also check out the VM creation: (Although it is the same as what I have on my FC6, I just choose not to install the Xen kernel as I wanted more flexibility and wanted to run VMware Server, WKs on it. but I have another box which I can use for RHEL5 (given the specs are still bare minimum).

Creating a Virtual Machine

Next, let’s try to create a virtual machine on two different computers. The first is the Xeon- based IBM x3950 rackmount server[ that was reviewed recently in Linux Magazine]; the second is a generic, Pentium III computer.


See the Original article and OpenVirtualization site of Redhat.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op