Skip to main content

Packt Publishing releases Xen Virtualization handbook

This concise handbook which hosts Fedora Core as its host operating System is ideal for professionals who want a user-friendly reference beside them while they get working with Xen and virtualization. Its easy-to-navigate content offers bite-sized walkthroughs for a wide variety of common virtualization tasks using Xen.

Each chapter is a collection of practical tasks that demonstrate how to achieve common virtualization tasks. Users then learn how it works so that they can apply this knowledge to their Xen installation and environment. This book is for Linux administrators who want to use Xen Virtualisation for development, testing, virtual hosting, or operating systems training.


What you may learn from this book? From Packt:


  • Getting started with virtualization and Xen
  • Installing Xen from pre-built packages using yum
  • Installing and compile Xen from source
  • Running guest domains under Xen:
  • Create Ubuntu guest domain using debootstrap
  • Create NetBSD domain using install image
  • Create a Centos image using Qemu
  • Create Slackware domain using domU image from jailtime
  • Managing remote Xen instances using:
  • Xen manager (xm)
  • XenMan
  • Virt-manager
  • Configuring Xen for networking
  • Connecting domains using:
  • Bridged networking—uses network bridge and hardware MAC addresses
  • Routed networking—uses Dom0 for all traffic
  • Implementing storage solutions for guest domains:
  • Using Files—file based; perfect for testing
  • Using Network File Systems (NFS)—works with remote NFS server
  • Using Logical Volume Management (LVM)—for enterprise-grade storage
  • Securing your domain by encrypting root file systems
  • Plain device mapper-based encryption
  • Key-based device mapper encryption using LUKS
  • Migrating live domains from one server to another
  • Saving and restoring a domain
  • Trends and forthcoming advances in the Xen world:
  • libvirt to simplify access to virtualization domains in a vendor/hypervisor-independent way
  • VMcasting for transferring virtual machine images from the server to the client using RSS 2.0
See Packt for more info to buy.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

OS Virtualization comparison: Parallels' Virtuozzo vs the rest

Virtuozzo's main differentiators versus hypervisors center on overhead, virtualization flexibility, administration and cost. Virtuozzo requires significantly less overhead than hypervisor solutions, generally in the range of 1% to 5% compared with 7% to 25% for most hypervisors, leaving more of the system available to run user workloads. Customers can also virtualize a wider range of applications using Virtuozzo, including transactional databases, which often suffer from performance problems when used with hypervisors. On the administration side, customers need to manage, maintain and secure just a single OS instance, while the hypervisor model requires customers to manage many OS instances. Of course, the hypervisor vendors have worked hard to automate much of this process, but it still requires more effort to manage and maintain multiple operating systems than a single instance. Finally, OS virtualization with Virtuozzo has a lower list price than the leading hypervisor for comme...