Virtual Machines

libvirt

“libvirt” provides a framework and API for accessing and controlling different virtualization hypervisors. This Root Pages’ guide assumes that libvirt is used for managing Quick Emulator (QEMU) virtual machines. [1]

VNC

Any virtual machine can be accessed remotely via a VNC GUI. Shutdown the virtual machine with virsh shutdown and then run virsh edit ${VM}.

Examples:

Automatically assign a VNC port number (starting at 5900/TCP) and listen on every IP address.

<domain>
    <devices>
        <graphics type='vnc' port='-1' autoport='yes' listen='0.0.0.0'/>
    </devices>
</domain>

Assign a static port number, listen only on localhost, and password protect the VNC console. The password will be stored in plaintext on the file system.

<domain>
    <devices>
        <graphics type='vnc' port='5987' autoport='no' listen='127.0.0.1' passwd='securepasswordhere'/>
    </devices>
</domain>

[50]

Hardware Virtualization

Hardware virtualization speeds up and further isolates virtualized environments. Most newer CPUs support this. There is “Intel VT (Virtualization Technology)” and “AMD SVM (Secure Virtual Machine)” for x86 processors. Hardware virtualization must be supported by both the motherboard and processor. It should also be enabled in the BIOS. [2]

Intel has three subtypes of virtualization:

  • VT-x = Basic hardware virtualization and host separation support.

  • VT-d = I/O pass-through support.

  • VT-c = Improved network I/O pass-through support.

[3]

AMD has two subtypes of virtualization:

  • AMD-V = Basic hardware virtualization and host separation support.

  • AMD-Vi = I/O pass-through support.

Check for Intel or AMD virtualization support. If a result is found, then virtualization is supported by the processor but may still need to be enabled via the motherboard BIOS.

$ grep -m 1 --color vmx /proc/cpuinfo # Intel
$ grep -m 1 --color svm /proc/cpuinfo # AMD

Verify the exact subtype of virtualization:

$ lscpu | grep ^Virtualization # Intel or AMD

KVM

The “Kernel-based Virtual Machine (KVM)” is the default kernel module for handling hardware virtualization in Linux since the 2.6.20 kernel. [4] It is used to accelerate the QEMU hypervisor. [5]

Fedora installation:

  • Install KVM and Libvirt. Add non-privileged users to the “libvirt” group to be able to manage virtual machines through qemu:///system. By default, users can only manage them through qemu:///session which has limited configuration options.

$ sudo dnf -y install qemu-kvm libvirt
$ sudo groupadd libvirt
$ sudo usermod -a -G libvirt $USER
$ sudo systemctl enable --now libvirtd

Performance Tuning

Processor

Configuration details for virtual machines can be modified to provide better performance. For processors, it is recommended to use the same CPU settings so that all of it’s features are available to the guest. [6]

QEMU:

$ sudo qemu -cpu host ...

libvirt:

$ sudo virsh edit <VIRTUAL_MACHINE>
<cpu mode='host-passthrough'/>

Proxmox [60]:

$ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
cpu: host
Memory
Huge Pages

Enable isolated Huge Pages and disable Transparent Huge Pages (THP) on the hypervisor for better memory performance in virtual machines. Instead of allocating RAM dynamically, the Linux kernel will isolate the RAM on boot so that the hypervisor will not use it.

Verify that the processor supports Huge Pages. This command will return nothing if it does not. [53]

$ grep --color pdpe1gb /proc/cpuinfo

View current Huge Pages allocation. The total should be “0” if it is disabled. The default size is 2048 KB. Modern processors support setting the Huge Pages size to 1 GB which provides less overhead for the hypervisor.

$ grep -i hugepages /proc/meminfo
AnonHugePages:         0 kB
ShmemHugePages:        0 kB
HugePages_Total:       0
HugePages_Free:        0
HugePages_Rsvd:        0
HugePages_Surp:        0
Hugepagesize:       2048 kB

Increase the Huge Pages size for Linux by modifying the GRUB configuration. [53]

$ sudo vim /etc/default/grub
GRUB_CMDLINE_LINUX="<EXISTING_OPTIONS> hugepagesz=1GB hugepages=1"
  • Optionally disable THP entirely to enforce the use of isolated Huge Pages.

    $ sudo vim /etc/default/grub
    GRUB_CMDLINE_LINUX="<EXISTING_OPTIONS> transparent_hugepage=never hugepagesz=1GB hugepages=1"
    
    • THP can also be manually disabled until the next reboot. Note that if the GRUB method is used, it will set “enabled” to “never” on boot which means “defrag” does not need to be set to “never” since it is not in use. This manual method should be used on systems that will not be rebooted.

      $ echo never | sudo tee /sys/kernel/mm/transparent_hugepage/enabled
      $ echo never | sudo tee /sys/kernel/mm/transparent_hugepage/defrag
      

Rebuild the GRUB configuration.

  • UEFI:

    $ sudo grub2-mkconfig -o /boot/efi/EFI/<OPERATING_SYSTEM>/grub.cfg
    
  • BIOS:

    $ sudo grub2-mkconfig -o /boot/grub2/grub.cfg
    

Huge Pages must be configured to be used by the virtualization software. The hypervisor isolates and reserves the Huge Pages RAM and will otherwise make the memory unusable by other resources.

  • libvirt:

    <domain type='kvm'>
        <memoryBacking>
            <hugepages/>
        </memoryBacking>
    </domain>
    
  • Proxmox (set to “1024” or “2” MiB) [54]:

    $ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
    hugepages: 1024
    

In Fedora, services such as ktune and tuned will, by default, force THP to be enabled. Profiles can be modified in /usr/lib/tuned/ on Fedora or in /etc/tune-profiles/ on <= RHEL 7.

Increase the security limits in Fedora to allow the maximum valuable of RAM (in kilobytes) for a virtual machine that can be used with Huge Pages.

File: /etc/security/limits.d/90-mem.conf

soft memlock 25165824
hard memlock 25165824

Optionally calculate the optimal Huge Pages total based on the amount of RAM that will be allocated to virtual machines. For example, if 24GB of RAM will be allocated to virtual machines then the Huge Pages total should be set to 245. A virtual machine can be configured to only have part of its total RAM be Huge Pages.

  • Equation:

    <AMOUNT_OF_RAM_FOR_VMS_IN_KB> / <HUGEPAGES_SIZE> = <HUGEPAGES_TOTAL>
    
  • Example (24 GB):

    (24 GB x 1024 MB x 1024 KB) / 1024000 KB = 245
    
    (24 GB x 1024 MB x 1024 KB) / 2048 KB = 1228
    

Enable Huge Pages by setting the total in sysctl.

$ sudo vim /etc/sysctl.conf
vm.nr_hugepages = <HUGEPAGES_TOTAL>
$ sudo sysctl -p
$ sudo mkdir /hugepages
$ sudo vim /etc/fstab
hugetlbfs    /hugepages    hugetlbfs    defaults    0 0

Reboot the server and verify that the new settings have taken affect.

$ grep -i huge /proc/meminfo
AnonHugePages:         0 kB
ShmemHugePages:        0 kB
HugePages_Total:    8192
HugePages_Free:        0
HugePages_Rsvd:        0
HugePages_Surp:        0
Hugepagesize:       2048 kB
Hugetlb:        16777216 kB
$ hugeadm --pool-list
      Size  Minimum  Current  Maximum  Default
   2097152        0        0        0        *
1073741824        0       24        0

[33]

Network

The network driver that provides the best performance is “virtio.” Some guests may not support this feature and require additional drivers.

QEMU:

$ sudo qemu -net nic,model=virtio ...

libvirt:

$ sudo virsh edit <VIRTUAL_MACHINE>
<interface type='network'>
  ...
  <model type='virtio' />
</interface>****

Proxmox (define any valid MAC address and the network bridge to use) [47]:

net0: virtio=<MAC_ADDRESS>,bridge=vmbr0

Using a tap device (that will be assigned to an existing interface) or a bridge will speed up network connections.

QEMU:

... -net tap,ifname=<NETWORK_DEVICE> ...
... -net bridge,br=<NETWORK_BRIDGE_DEVICE> ...

libvirt:

$ sudo virsh edit <VIRTUAL_MACHINE>
    <interface type='bridge'>
...
      <source bridge='<BRIDGE_DEVICE>'/>
      <model type='virtio'/>
    </interface>
Storage

virtio

Raw disk partitions have the greatest speeds with the “virtio” driver, cache disabled, and the I/O mode set to “native.” If a sparsely allocated storage device is used for the virtual machine (such as a thin-provisioned QCOW2 image) then the I/O mode of “threads” is preferred. This is because with “native” some writes may be temporarily blocked as the sparsely allocated storage needs to first grow before committing the write. [20]

QEMU:

  • Block:

    $ sudo qemu -drive file=<PATH_TO_STORAGE_DEVICE>,cache=none,aio=threads,if=virtio ...
    
  • CDROM:

    $ sudo qemu -cdrom <PATH_TO_CDROM>
    

libvirt:

  • Block:

    <disk type='block' device='disk'>
          <driver name='qemu' type='raw' cache='none'/>
          <source dev='/dev/sr0'/>
          <target dev='vdb' bus='virtio'/>
    </disk>
    
  • CDROM:

    <disk type='block' device='cdrom'>
      <driver name='qemu' type='raw'/>
      <source dev='/dev/sr0'/>
      <target dev='hdc' bus='ide'/>
      <readonly/>
    </disk>
    

Proxmox [47]:

  • Block:

    $ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
    virtio0: local:iso/<ISO_IMAGE_NAME>,media=block,aio=threads,cache=none
    
  • CDROM:

    $ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
    ide0: local:iso/<ISO_IMAGE_NAME>,media=cdrom
    

Virsh:

  • Block:

    $ virsh attach-disk <VM_NAME> --source <SOURCE_BLOCK_DEVICE> --target <DESTINATION_BLOCK_DEVICE> --cache none --persistent
    
  • CDROM:

    $ virsh attach-disk <VM_NAME> /dev/sr0 vdb --config --type cdrom --mode readonly
    

[6][7][51]

QCOW2

When using the QCOW2 image format, create the image using metadata preallocation or else there could be up to a x5 performance penalty. [8]

$ qemu-img create -f qcow2 -o size=<SIZE>G,preallocation=metadata <NEW_IMAGE_NAME>

If using a file system with copy-on-write capabilities, either (1) disable copy-on-write functionality of the QCOW2 when creating the file or (2) prevent the QCOW2 file from being part of the copy-on-write for the underlying file system.

  1. Create a QCOW2 file without copy-on-write.

    $ qemu-img create -f qcow2 -o size=<SIZE>G,preallocation=metadata,nocow=on <NEW_IMAGE_NAME>
    
  2. Or prevent the file system from using its copy-on-write functionality for the QCOW2 file or directory where the QCOW2 files are stored.

    $ chattr +C <FILE_OR_DIRECTORY>
    
PCI

If possible, PCI pass-through provides the best performance as there is no virtualization overhead. The “GPU Pass-through” section expands upon this. The PCI device address should be in the format of XXXX:YY:ZZ.

QEMU:

$ sudo qemu -net none -device vfio-pci,host=<PCI_DEVICE_ADDRESS> ...

Proxmox [47]:

$ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
hostpci0: <PCI_DEVICE_ADDRESS>

Networking

Different models of virtual network interface cards (NICs) are available for the purposes of compatibility with the virtualized operating system. This can be set using the follow syntax:

$ sudo qemu -net nic,model=<MODEL>
$ sudo virt-install --network network=default,model=<MODEL>

Supported virtual device models [47]:

  • e1000 = The default NIC. It emulates a 1 Gbps Intel NIC.

  • virtio = High-performance device for operating systems with the driver available. Most Linux distributions has this driver available by default.

  • rtl8139 = An old NIC for older operating systems. It emulates a 100 Mbps Realtek 8139 card.

  • vmxnet3 = Use for VMware virtual machines and the VMware ESXi hypervisor. It emulates a virtual VMware NSXi NIC.

Nested Virtualization

KVM supports nested virtualization. This allows a virtual machine full access to the processor to run another virtual machine in itself. This is disabled by default.

Verify that the computers’ processor supports nested hardware virtualization. [11] If a result is found, then virtualization is supported by the processor but may still need to be enabled via the motherboard BIOS.

  • Intel:

    $ grep -m 1 --color vmx /proc/cpuinfo
    
  • AMD:

    $ grep -m 1 --color svm /proc/cpuinfo
    

Newer processors support APICv which allow direct hardware calls to go straight to the motherboard’s APIC. This can provide up to a 10% increase in performance for the processor and storage. [18] Verify if this is supported on the processor before trying to enable it in the relevant kernel driver. [19]

$ dmesg | grep x2apic
[    0.062174] x2apic enabled

Option #1 - Modprobe

  • Intel

File: /etc/modprobe.d/nested_virtualization.conf

options kvm-intel nested=1
options kvm-intel enable_apicv=1
$ sudo modprobe -r kvm-intel
$ sudo modprobe kvm-intel
  • AMD

File: /etc/modprobe.d/nested_virtualization.conf

options kvm-amd nested=1
options kvm-amd enable_apicv=1
$ sudo modprobe -r kvm-amd
$ sudo modprobe kvm-amd

Option #2 - GRUB2

Append this option to the already existing “GRUB_CMDLINE_LINUX” options.

  • Intel

File: /etc/default/grub

GRUB_CMDLINE_LINUX="kvm-intel.nested=1"
  • AMD

File: /etc/default/grub

GRUB_CMDLINE_LINUX="kvm-amd.nested=1"
  • Then rebuild the GRUB 2 configuration.

  • UEFI:

$ sudo grub2-mkconfig -o /boot/efi/EFI/<OPERATING_SYSTEM>/grub.cfg
  • BIOS:

    $ sudo grub2-mkconfig -o /boot/grub2/grub.cfg
    

[9]

Edit the virtual machine’s XML configuration to change the CPU mode to be “host-passthrough.”

$ sudo virsh edit <VIRTUAL_MACHINE>
<cpu mode='host-passthrough'/>

[10]

Reboot the virtual machine and verify that the hypervisor and the virtual machine both report the same capabilities and processor information.

$ sudo virsh capabilities

Finally verify that, in the virtual machine, it has full hardware virtualization support.

$ sudo virt-host-validate

OR

  • Intel:

    $ cat /sys/module/kvm_intel/parameters/nested
    Y
    
  • AMD:

    $ cat /sys/module/kvm_amd/parameters/nested
    Y
    

[11]

GPU Pass-through

GPU pass-through provides a virtual machine guest with full access to a graphics card. It is required to have two video cards, one for host/hypervisor and one for the guest. [12] Hardware virtualization via VT-d (Intel) or SVM (AMD) is also required along with input-output memory management unit (IOMMU) support. Those settings can be enabled in the BIOS/UEFI on supported motherboards. Components of a motherboard are separated into different IOMMU groups. For GPU pass-through to work, every device in the IOMMU group has to be disabled on the host with a stub kernel driver and passed through to the guest. For the best results, it is recommended to use a motherboard that isolates each connector for the graphics card, usually a PCI slot, into it’s own IOMMU group. The QEMU settings for the guest should be configured to use “SeaBIOS” for older cards or “OVMF” for newer cards that support UEFI. [36]

  • Enable IOMMU on the hypervisor via the bootloader’s kernel options. This will provide a static ID to each hardware device. The “vfio-pci” kernel module also needs to start on boot.

    • AMD:

      amd_iommu=on
      
    • Intel:

      intel_iommu=on
      
  • For the GRUB bootloader, rebuild the configuration.

    • Arch Linux and Debian:

      $ sudo grub-mkconfig -o /boot/grub/grub.cfg
      
    • Fedora:

      • UEFI:

        $ sudo grub2-mkconfig -o /boot/efi/EFI/<OPERATING_SYSTEM>/grub.cfg
        
      • Legacy BIOS:

        $ sudo grub2-mkconfig -o /boot/grub2/grub.cfg
        
  • Find the IOMMU number for the graphics card. This should be the last alphanumeric set at the end of the line for the graphics card. The format should look similar to XXXX:XXXX. Add it to the options for the “vfio-pci” kernel module. This will bind a stub kernel driver to the device so that Linux does not use it.

    $ sudo lspci -k -nn -v | grep -i -P "amd|nvidia"
    $ sudo vim /etc/modprobe.d/vfio.conf
    options vfio-pci ids=XXXX:XXXX,YYYY:YYYY,ZZZZ:ZZZZ disable_vga=1
    
  • Allow VFIO to handle IOMMU interrupt remapping. This prevents issues when a virtual machine with PCI pass-through is shutdown.

    echo "options vfio_iommu_type1 allow_unsafe_interrupts=1" | sudo tee /etc/modprobe.d/iommu_unsafe_interrupts.conf
    echo "options kvm ignore_msrs=1" | sudo tee /etc/modprobe.d/kvm.conf
    
  • Rebuild the initramfs to include the VFIO related drivers.

    • Arch Linux:

      $ sudo sed -i 's/MODULES=(/MODULES=(vfio vfio_iommu_type1 vfio_pci vfio_virqfd /'g /etc/mkinitcpio.conf
      $ sudo mkinitcpio --allpresets
      
    • Debian:

      $ echo "vfio
      vfio_iommu_type1
      vfio_pci
      vfio_virqfd" | sudo tee -a /etc/modules
      $ sudo update-initramfs -u
      
    • Fedora:

      $ echo 'add_drivers+="vfio vfio_iommu_type1 vfio_pci vfio_virqfd"' > /etc/dracut.conf.d/vfio.conf
      $ sudo dracut --force
      
  • Reboot the hypervisor operating system.

[34][35]

Hide Virtualization

Nvidia cards initialized in the guest with a driver version >= 337.88 can detect if the operating system is being virtualized. This can lead to a “Code: 43” error being returned by the driver and the graphics card not working. A work-a-round for this is to set a random “vendor_id” to a alphanumeric 12 character value and forcing KVM’s emulation to be hidden. This does not affect ATI/AMD graphics cards.

Libvirt [13]:

$ sudo virsh edit <VIRTUAL_MACHINE>
<features>
    <hyperv>
        <vendor_id state='on' value='123456abcdef'/>
    </hyperv>
    <kvm>
        <hidden state='on'/>
    </kvm>
</features>

Proxmox [60]:

$ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
cpu: host,hidden=1,flags=+pcid
args: -cpu 'host,+kvm_pv_unhalt,+kvm_pv_eoi,hv_vendor_id=NV43FIX,kvm=off'

It is also possible that a GPU ROM may be required. [60] It can only be downloaded from the GPU a legacy BIOS boot system (not UEFI). [63]

$ cd /sys/bus/pci/devices/<PCI_DEVICE_ADDRESS>/
$ echo 1 > rom
$ cat rom > /usr/share/kvm/gpu.rom
$ echo 0 > rom

Some games will refuse to start, such as Halo Infinite, if they detect if there is any hypervisor and not just KVM. Disable the hypervisor feature in QEMU to workaround this.

Libvirt [66]:

<feature policy='disable' name='hypervisor'/>

Proxmox (add the -hypervisor CPU arguments list) [67]:

$ sudo vim /etc/pve/qemu-server/<VIRTUAL_MACHINE_ID>.conf
cpu: host,hidden=1,flags=+pcid
args: -cpu 'host,+kvm_pv_unhalt,+kvm_pv_eoi,hv_vendor_id=NV43FIX,kvm=off,-hypervisor'
Troubleshooting

Issue: a black screen is shown on the monitor connected to the GPU that is pass-through.

Solutions:

  • On the hypervisor, check the dmesg logs to see if there are any errors. If so, view the rest of this troubleshooting guide to see if the error and solution is listed.

    $ sudo dmesg
    
  • Some newer graphics cards do not display the boot sequence. For example, the NVIDIA GTX 1650 is reported as working whereas both the 2080 and 3060 do not.

    • If the UEFI or system bootloader (such as GRUB) menu needs to be accessed, use a VNC display to access the virtual machine during boot. Once booted, the graphics card will then display the operating system. [68]

  • Older graphics cards do not support UEFI boot. Use legacy BIOS boot with SeaBIOS instead.


Error: BAR <NUMBER>: can't reserve [mem <MEMORY> 64bit pref]

$ sudo dmesg
[   62.665557] vfio-pci 0000:09:00.0: vfio_ecap_init: hiding ecap 0x1e@0x258
[   62.665588] vfio-pci 0000:09:00.0: vfio_ecap_init: hiding ecap 0x19@0x900
[   62.666956] vfio-pci 0000:09:00.0: BAR 3: can't reserve [mem 0xe0000000-0xe1ffffff 64bit pref]
[   62.667139] vfio-pci 0000:09:00.0: No more image in the PCI ROM
[   65.494712] vfio-pci 0000:09:00.0: No more image in the PCI ROM
[   65.494738] vfio-pci 0000:09:00.0: No more image in the PCI ROM

Solutions:

  • Edit /etc/default/grub, add video=vesafb:off,efifb:off vga=off to GRUB_CMDLINE_LINUX_DEFAULT, and then rebuild the GRUB configuration. [61]

  • In the BIOS, disable CMS. The exact steps on how to do this will vary based on the motherboard.[62]


Error: No NVIDIA devices probed.

$ sudo dmesg
[    7.205812] NVRM: The NVIDIA probe routine was not called for 1 device(s).
[    7.206258] NVRM: This can occur when a driver such as:
               NVRM: nouveau, rivafb, nvidiafb or rivatv
               NVRM: was loaded and obtained ownership of the NVIDIA device(s).
[    7.206259] NVRM: Try unloading the conflicting kernel module (and/or
               NVRM: reconfigure your kernel without the conflicting
               NVRM: driver(s)), then try loading the NVIDIA kernel module
               NVRM: again.
[    7.206260] NVRM: No NVIDIA devices probed.

Solution:

  • This means that the NVIDIA driver could not be loaded. If the hypervisor has an Intel processor, edit /etc/default/grub, add ibt=off to GRUB_CMDLINE_LINUX_DEFAULT, and then rebuild the GRUB configuration. [64]


Errors: ignored rdmsr and ignored wrmsr.

$ sudo dmesg
[  493.113240] kvm [3020]: ignored rdmsr: 0xc001100d data 0x0
[  493.113248] kvm [3020]: ignored wrmsr: 0xc001100d data 0x0
[  493.223228] kvm [3020]: ignored rdmsr: 0xc001100d data 0x0
[  493.223236] kvm [3020]: ignored wrmsr: 0xc001100d data 0x0
[  493.223669] kvm [3020]: ignored rdmsr: 0xc001100d data 0x0
[  493.223674] kvm [3020]: ignored wrmsr: 0xc001100d data 0x0
[  493.224042] kvm [3020]: ignored rdmsr: 0xc001100d data 0x0
[  493.224047] kvm [3020]: ignored wrmsr: 0xc001100d data 0x0
[  493.224452] kvm [3020]: ignored rdmsr: 0xc001100d data 0x0
[  493.224460] kvm [3020]: ignored wrmsr: 0xc001100d data 0x0

Solution:

  • This is a harmless bug that can be ignored. [65]

    $ echo "options kvm ignore_msrs=1 report_ignored_msrs=0" | sudo tee -a /etc/modprobe.d/kvm.conf
    

Xen

Xen is a free and open source software hypervisor under the GNU General Public License (GPL). It was originally designed to be a competitor of VMware. It is currently owned by Citrix and offers a paid support package for it’s virtual machine hypervisor/manager XenServer. [14] By itself it can be used as a basic hypervisor, similar to QEMU. It can also be used with QEMU to provide accelerated hardware virtualization.

Nested Virtualization

Since Xen 4.4, experimental support was added for nested virtualization. A few settings need to be added to the Xen virtual machine’s file, typically located in the “/etc/xen/” directory. Turn “nestedhvm” on for nested virtualization support. The “hap” feature also needs to be enabled for faster performance. Lastly, the CPU’s ID needs to be modified to hide the original virtualization ID.

nestedhvm=1
hap=1
cpuid = ['0x1:ecx=0xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx']

[15]

Orchestration

Virtual machine provisioning can be automated through the use of different tools.

Manual

Instead of installing operating systems from scratch, a pre-built cloud virtual machine image can be used and customized for use in a non-cloud environment.

  • Find and download cloud images from here.

  • Set the root password and uninstall cloud-init: $ virt-customize --root-password password:<PASSWORD> --uninstall cloud-init -a <VM_IMAGE>

  • Reset the machine-id: $ virt-sysprep --operations machine-id -a <VM_IMAGE>

  • Increase the QCOW2 image size: $ qemu-img resize <VM_IMAGE> <SIZE>G

  • Create a new QCOW2 image for resizing the partition: $ qemu-img create -f qcow2 <VM_IMAGE_NEW> <SIZE>G

  • Resize the partition: $ virt-resize --expand /dev/sda1 <VM_IMAGE> <VM_IMAGE_NEW>

  • Delete the original cloud image: $ rm <VM_IMAGE>

  • Rename the new resized QCOW2 image: $ mv <VM_IMAGE_NEW> <VM_IMAGE>

Anaconda

Anaconda is an installer for the RHEL and Fedora operating systems.

Kickstart File

A Kickstart file defines all of the steps necessary to install the operating system.

Common commands:

  • authconfig = Configure authentication using options specified in the authconfig manual.

  • autopart = Automatically create partitions.

    • –encrypted –passphrase <PASSWORD> = Encrypt the drive with the given password.

    • –type

      • btrfs = Use Btrfs subvolumes.

      • lvm = Use LVM volumes.

      • plan = Use standard partitions without Btrfs.

      • partition = Use standard partitions with Btrfs (no subvolumes).

      • thinp = Thinly provisioned partitions for efficient storage usage.

    • –fstype = Can be ext4 or xfs. It cannot be btrfs. Use --type btrfs instead.

    • –no{boot|home|swap} = Do not create this partition.

  • bootloader = Define how the bootloader should be installed.

  • clearpart = Delete existing partitions.

    • –type <TYPE> = Using one of these partition schemes: partition (partition only, no formatting), plain (normal partitions that are not Btrfs or LVM), btrfs, lvm, or thinp (thin-provisioned logical volumes).

  • {cmdline|graphical|text} = The display mode for the installer.

    • cmdline = Non-interactive text installer.

    • graphical = The graphical installer will be displayed.

    • text = An interactive text installer that will prompt for missing options.

  • eula –accept = Automatically accept the end-user license agreement (EULA).

  • firewall = Configure Firewalld

    • –enable

    • –disable

    • –port = Specify the ports to open.

    • –service = Specify a known service in Firewalld to open ports for.

    • –use-system-default = Do not configure the firewall.

  • firstboot = Configure the initial setup (requires the initial-setup package to be installed).

    • –disable = Default. Do not launch the initial setup agent on the first boot.

    • –enable = Launch the initial setup agent on the first boot.

    • –reconfig = Launch the initial setup agent on the first boot to allow changing settings that are required to have been set during the Kickstart (language, networking, root password, time, etc.).

  • %include = Include another file this Kickstart file. End the list of included files b using %end.

  • install = Start the installer.

  • keyboard = Configure the keyboard layout.

  • lang = The primary language to use.

  • mount = Manually specify a partition to mount.

  • network = Configure the network settings.

  • ostreesetup = Required for Fedora Silverblue to install the file system. A reboot is required after this step. The Kickstart installation will continue where it left off.

    • –osname = Default: “fedora”.

    • –remote = Default: “fedora”.

    • –url = Repository URL for the OCI image. Example: “https://kojipkgs.fedoraproject.org/compose/ostree/repo” or “file:///ostree/repo”.

    • –ref = Extension of the repository URL that provides the OCI image. Example: “fedora/<MAJOR_VERSION>/<CPU_ARCHITECTURE>/{kinote|sericea|silverblue}”.

      • Both the --url and ref are combined to make this URL: https://kojipkgs.fedoraproject.org/compose/ostree/repo/refs/heads/fedora/<MAJOR_VERSION>/<CPU_ARCHITECTURE>/<OPERATING_SYSTEM>.

    • –nogpg = Do not verify the GPG signature of the OCI image.

  • %packages = A list of packages, separated by a newline, to be installed. End the list of packages by using %end.

  • part or partition = Manually create partitions.

    • –grow = Use all available storage space that is left.

    • –fstype {btrfs|ext2|ext3|ext4|swap|vfat|xfs}

    • –size = The size in MiB for the partition.

    • UEFI devices need a dedicated partition for storing the EFI information. [16]

      • part /boot/efi –fstype vfat –size=256 –ondisk=sda

  • %post = Run commands after installation steps. End the list of post commands by using %end.

    • –erroronfail = If any commands fail, the Kickstart will error out and fail.

    • –log = Log all output to a specified file.

    • –nochroot = Do not run commands inside of the /mnt/sysimage/ chroot. It is possible to use both %post and %post --nochroot in a Kickstart file.

  • raid = Create a software RAID.

  • repo –name=”<REPO_NAME>” –baseurl=”<REPO_URL>” = Add a repository.

  • rootpw = Change the root password.

    • –lock = Do not change the root password and, instead, disable the account.

  • selinux = Change the SELinux settings.

    • –permissive

    • –enforcing

    • –disabled

  • services = Manage systemd services.

    • –enabled=<SERVICE1>,<SERVICE2>,SERVICE3> = Enable these services.

  • sshkey = Add a SSH key to a specified user.

  • timezone = Configure the timezone.

  • url = Do a network installation using the specified URL to the operating system’s repository.

  • user = Configure a new user. Due to a bug, this function does not work on rpm-ostree operating systems. Manually create the user instead. [71]

    • –name

    • –groups

  • vnc = Configure a VNC for remote graphical installations.

  • xconfig = Configure the desktop environment. Do not use this function to get a headless server instead.

    • –defaultdesktop {GNOME|KDE} = Set the default desktop environment.

    • –startxonboot = Start the display manager and desktop environment automatically after boot. This supports both Xorg and Wayland back-ends.

  • zerombr = Erase the partition table.

[37][38][70]

Examples

Here are examples of common functions used in Kickstart files.

Example Kickstart files:

Only use the first storage device:

ignoredisk --only-use=vda

Clear any existing bootloader and partition information:

zerombr
clearpart --all --initlabel --disklabel gpt --drives=vda

Configure the bootloader to be installed at the beginning of the first drive:

bootloader --location=mbr --boot-drive=vda

Automatically partition a drive with Btrfs subvolumes:

autopart --type btrfs

Manually partition a drive to support legacy BIOS and UEFI boot:

zerombr
clearpart --all --initlabel --disklabel gpt
part biosboot --fstype biosboot --size 1
part /boot/efi --fstype efi --size 99
part /boot --fstype ext4 --size 1000

Fedora Silverblue (previously known as Fedora Atomic Host) setup:

ostreesetup --osname fedora-silverblue --remote fedora-silverblue --url "https://kojipkgs.fedoraproject.org/compose/ostree/repo" --ref="fedora/37/x86_64/silverblue"
reboot

Fedora Atomic Host (this is no longer maintained):

ostreesetup --osname fedora-atomic --remote fedora-atomic --url="https://kojipkgs.fedoraproject.org/atomic/repo" --ref="fedora/29/x86_64/atomic-host"
reboot

U.S.A. keyboard layout:

keyboard --vckeymap=us --xlayouts='us'

English language:

lang en_US.UTF-8

UTC timezone:

timezone UTC --utc

Create a user:

user --name bob

Create a user for Fedora Silverblue (there is a bug that prevents the Kickstart user function from working [71]):

%post
echo '%wheel ALL=(ALL) NOPASSWD:ALL' > /etc/sudoers.d/wheel
useradd -g wheel bob
echo "bob:password" | chpasswd
%end

Enable the GNOME desktop environment to always start after booting (assuming it has been installed):

xconfig --defaultdesktop GNOME --startxonboot

Launch the Fedora initial setup agent (requires the initial-setup package to be installed):

firstboot --enable

Enable persistent debug logging for the post-installation tasks [80]:

%post --logfile=/root/ks-post.log --erroronfail
set -x

Terraform

Terraform provides infrastructure automation.

Find and download the latest version of Terraform from here.

$ cd ~/.local/bin/
$ TERRAFORM_VERSION=0.12.28
$ curl -LO https://releases.hashicorp.com/terraform/${TERRAFORM_VERSION}/terraform_${TERRAFORM_VERSION}_linux_amd64.zip
$ unzip terraform_${TERRAFORM_VERSION}_linux_amd64.zip
$ terraform --version
Terraform v0.12.28

Optionally install tab completion support for bash and zsh.

$ terraform -install-autocomplete

[42]

Modules

A Terraform Module consists of at least a single main.tf file that defines the provider (plugin) to use and what resources to apply. In addition, variables.tf can be used to define related variables used by main.tf and a outputs.tf file can be used to define what outputs to save (such as generated SSH keys). [44]

Providers

Common cloud providers:

  • AWS

  • Azure

  • Cloud-init

  • DigitalOcean

  • Google Cloud Platform

  • Helm

  • Kubernetes

  • OpenStack

  • Packet

  • VMware Cloud

  • Vultr

Database providers:

  • InfluxDB

  • MongoDB Atlas

  • MySQL

  • PostgreSQL

DNS providers:

  • DNS

  • DNSimple

  • DNSMadeEasy

  • PowerDNS

  • UltraDNS

Git providers:

  • Bitbucket

  • GitHub

  • GitLab

Logging and monitoring:

  • Auth0

  • Circonus

  • Datadog

  • Dyn

  • Grafana

  • Icinga2

  • LaunchDarkly

  • Librato

  • Logentries

  • LogicMonitor

  • New Relic

  • OpsGenie

  • PagerDuty

  • Runscope

  • SignalFx

  • StatusCake

  • Sumo Logic

  • Wavefront

Common miscellaneous providers:

  • Chef

  • Cobbler

  • Docker

  • HTTP

  • Local

  • Rundeck

  • RabbitMQ

  • Time

  • Terraform

  • TLS

  • Vault

[43]

OpenStack

Authentication via an existing clouds.yaml:

provider "openstack" {
   cloud = "<CLOUD>"
}

Authentication via Terraform configuration for Keystone v3:

provider "openstack" {
   project_name = "<PROJECT>"
   project_domain_name = "<PROJECT_DOMAIN_NAME>"
   user_name = "<USER>"
   user_domain_name = "<USER_DOMAIN_NAME>"
   password = "<PASSWORD>"
   auth_url = "https://<CLOUD_HOSTNAME>:5000/v3"
   region = "<REGION>"
}

Common resources:

  • openstack_blockstorage_volume_v3

  • openstack_compute_flavor_v2

  • openstack_compute_floatingip_associate_v2

  • openstack_compute_instance_v2

  • openstack_compute_keypair_v2

  • openstack_compute_secgroup_v2

  • openstack_compute_volume_attach_v2

  • openstack_identity_project_v3

  • openstack_identity_role_v3

  • opentsack_identity_role_assignment_v3

  • openstack_identity_user_v3

  • openstack_images_image_v2

  • openstack_networking_floatingip_v2

  • openstack_networking_network_v2

  • openstack_networking_router_v2

  • openstack_networking_subnet_v2

  • openstack_lb_loadbalancer_v2

  • openstack_lb_listener_v2

  • openstack_lb_pool_v2

  • openstack_lb_member_v2

  • openstack_fw_firewall_v1

  • openstack_fw_policy_v1

  • openstack_fw_rule_v1

  • openstack_objectstorage_container_v1

  • openstack_objectstorage_object_v1

  • openstack_objectstorage_tempurl_v1

  • openstack_sharedfilesystem_securityservice_v2

  • openstack_sharedfilesystem_sharenetwork_v2

  • openstack_sharedfilesystem_share_v2

  • openstack_sharedfilesystem_access_v2

[45]

Vagrant

Vagrant is programmed in Ruby to help automate virtual machine (VM) deployment. It uses a single file called “Vagrantfile” to describe the virtual machines to create. By default, Vagrant will use VirtualBox as the hypervisor but other technologies can be used.

  • Officially supported hypervisor providers [21]:

    • docker

    • hyperv

    • virtualbox

    • vmware_desktop

    • vmware_fusion

  • Unofficial hypervisor providers [22]:

    • aws

    • azure

    • google

    • libvirt (KVM or Xen)

    • lxc

    • managed-servers (physical bare metal servers)

    • parallels

    • vsphere

Most unofficial hypervisor providers can be automatically installed as a plugin from the command line.

$ vagrant plugin install vagrant-<HYPERVISOR>

Vagrantfiles can be downloaded from here based on the virtual machine box name.

Syntax:

$ vagrant init <PROJECT>/<VM_NAME>

Example:

$ vagrant init centos/7

Deploy VMs using a Vagrantfile:

$ vagrant up

OR

$ vagrant up --provider <HYPERVISOR>

Destroy VMs using a Vagrant file:

$ vagrant destroy

The default username and password should be vagrant.

This guide can be followed for creating custom Vagrant boxes: https://www.vagrantup.com/docs/boxes/base.html.

Boxes (Images)

Usage

Common Vagrant boxes to use with vagrant init:

  • Arch Linux

    • archlinux/archlinux

  • Debian

    • debian/buster64 (Debian 10)

    • ubuntu/focal64 (Ubuntu 20.04)

  • Fedora

    • centos/8

    • fedora/33-cloud-base

  • openSUSE

    • opensuse/openSUSE-15.2-x86_64

    • opensuse/openSUSE-Tumbleweed-x86_64

Creation

Custom Vagrant boxes can be created from scratch and used.

  • Virtual machine setup (for an automated setup, use the ansible_role_vagrant_box project):

    • Create a vagrant user with password-less sudo access.

      $ sudo useradd vagrant
      $ echo 'vagrant ALL=(ALL) NOPASSWD:ALL' | sudo tee /etc/sudoers.d/vagrant
      $ sudo chmod 0440 /etc/sudoers.d/vagrant
      
    • Install and enable the SSH service.

      # Debian
      $ sudo apt-get install openssh-server
      
      # Fedora
      $ sudo dnf install openssh-server
      
    • Add the Vagrant SSH public key.

      $ sudo mkdir /home/vagrant/.ssh/
      $ sudo chmod 0700 /home/vagrant/.ssh/
      $ curl https://raw.githubusercontent.com/hashicorp/vagrant/master/keys/vagrant.pub | sudo tee -a /home/vagrant/.ssh/authorized_keys
      $ sudo chmod 0600 /home/vagrant/.ssh/authorized_keys
      $ sudo chown -R vagrant.vagrant /home/vagrant/.ssh
      
    • Disable SSH password authentication.

      $ sudo vi /etc/ssh/sshd_config
      PasswordAuthentication no
      PubKeyAuthentication yes
      
    • Enable the SSH service.

      # Debian
      $ sudo systemctl enable ssh
      
      # Fedora
      $ sudo systemctl enable sshd
      
    • Shutdown the virtual machine.

      $ sudo shutdown now
      
  • Hypervisor steps:

    • Create a metadata.json file with information about the virtual machine.

      {
          "provider"     : "libvirt",
          "format"       : "qcow2",
          "virtual_size" : <SIZE_IN_GB>
      }
      
    • Rename the virtual machine to be box.img.

      $ mv <VM_IMAGE>.qcow2 box.img
      
    • Create the tarball for the Vagrant-compatible box.

      $ tar -c -z -f <BOX_NAME>.box ./metadata.json ./box.img
      
    • Import the new box.

      $ vagrant box add --name <BOX_NAME> <BOX_NAME>.box
      
    • Test the new box.

      $ vagrant init <BOX_NAME>
      $ vagrant up --provider=libvirt
      

[46]

Vagrantfile

A default Vagrantfile can be created to start customizing with.

$ vagrant init

All of the settings should be defined within the Vagrant.configure() block.

Vagrant.configure("2") do |config|
    #Define VM settings here.
end

Define the virtual machine template to use. This will be downloaded, by default (if the box_url is not changed) from the HashiCorp website.

  • box = Required. The name of the virtual machine to download. A list of official virtual machines can be found at https://atlas.hashicorp.com/boxes/search.

  • box_version = The version of the virtual machine to use.

  • box_url = The URL to the virtual machine details.

Example:

Vagrant.configure("2") do |config|
  config.vm.box = "ubuntu/xenial64"
  config.vm.box_version = "v20170508.0.0"
  config.vm.box_url = "https://cloud-images.ubuntu.com/xenial/current/xenial-server-cloudimg-amd64-vagrant.box"
end

[23]

Resource Allocation

Defining the amount of resources a virtual machine has access to is different for each back-end provider. The default primary disk space is normally 40GB.

config.vm.provider "<PROVIDER>" do |vm_provider|
  vm_provider.<KEY> = <VALUE>
end

Provider specific options:

  • libvirt [25]

    • cpu_mode (string) = The CPU mode to use.

    • cpus (string) = The number of vCPU cores to allocate.

    • memory (string) = The size, in MiB, of RAM to allocate.

    • storage (dictionary of strings) = Create additional disks.

    • volume_cache (string) = The disk cache mode to use.

  • virtualbox [17]

    • cpus (string) = The number of vCPU cores to allocate.

    • customize (list of strings) = Run custom commands after the virtual machine has been created.

    • gui (boolean) = Launch the VirtualBox GUI console.

    • linked_clone (boolean) = Use a thin provisioned virtual machine image.

    • memory (string) = The size, in MiB, of RAM to allocate.

  • vmware_desktop (VMware Fusion and VMware Workstation) [48]

    • gui (boolean) = Launch the VirtualBox GUI console.

    • memsize (string) = The size, in MiB, of RAM to allocate.

    • numvcpus (string) = The number of vCPU cores to allocate.

The vmware_desktop provider requires a license from Vagrant. It can be used on two different computers. A new license is required when there is a new major version of the provider plugin. [49]

Networks

Networks are either private or public. private networks use host-only networking and use network address translation (NAT) to communicate out to the Internet. Virtual machines (VMs) can communicate with each other but they cannot be reached from the outside world. Port forwarding can also be configured to allow access to specific ports from the hypervisor node. public networks allow a virtual machine to attach to a bridge device for full connectivity with the external network. This section covers VirtualBox networks since it is the default virtualization provider.

With a private network, the IP address can either be a random address assigned by DHCP or a static IP that is defined.

Vagrant.configure("2") do |config|
  config.vm.network "private_network", type: "dhcp"
end
Vagrant.configure("2") do |config|
  config.vm.network "private_network", ip: "<IP4_OR_IP6_ADDRESS>", netmask: "<SUBNET_MASK>"
end

The same rules apply to public networks except it uses the external DHCP server on the network (if it exists).

Vagrant.configure("2") do |config|
  config.vm.network "public_network", use_dhcp_assigned_default_route: true
end

When a public network is defined and no interface is given, the end-user is prompted to pick a physical network interface device to bridge onto for public network access. This bridge device can also be specified manually.

Vagrant.configure("2") do |config|
  config.vm.network "public_network", bridge: "eth0: First NIC"
end

In this example, port 2222 on the localhost (127.0.0.1) of the hypervisor will forward to port 22 of the VM.

...
    config.vm.network "forwarded_port", id: "ssh", guest: 22, host: 2222
...

[24]

libvirt

The options and syntax for public networks with the “libvirt” provider are slightly different.

Options:

  • dev = The bridge device name.

  • mode = The libvirt mode to use. Default: bridge.

  • type = The libvirt interface type. This is normally set to bridge.

  • network_name = The name of a network to use.

  • portgroup = The libvirt portgroup to use.

  • ovs = Instead of using a Linux bridge, use Open vSwitch instead. Default: false.

  • trust_guest_rx_filters = Enable the trustGuestRxFilters setting. Default: false.

Example:

config.vm.define "controller" do |controller|
    controller.vm.network "public_network", ip: "10.0.0.205", dev: "br0", mode: "bridge", type: "bridge"
end

[25]

Boxes for libvirt are cached by Vagrant at: ~/.local/share/libvirt/images/.

Provisioning

After a virtual machine (VM) has been created, additional commands can be run to configure the guest VMs. This is referred to as “provisioning.”

  • Provisioners [26]:

    • ansible = Run a Ansible Playbook from the hypervisor node.

    • ansible_local = Run a Ansible Playbook from within the VM.

    • cfengine = Use CFEngine to configure the VM.

    • chef_solo = Run a Chef Cookbook from inside the VM using chef-solo.

    • chef_zero = Run a Chef Cookbook, but use chef-zero to emulate a Chef server inside of the VM.

    • chef_client = Use a remote Chef server to run a Cookbook inside the VM.

    • chef_apply = Run a Chef recipe with chef-apply.

    • docker = Install and configure docker inside of the VM.

    • file = Copy files from the hypervisor to the VM. Note that the directory that the Vagrantfile is in will be mounted as the directory /vagrant/ inside of the VM.

    • puppet = Run single Puppet manifests with puppet apply.

    • puppet_server = Run a Puppet manifest inside of the VM using an external Puppet server.

    • salt = Run Salt states inside of the VM.

    • shell = Run CLI shell commands.

Multiple Machines

A Vagrantfile can specify more than one virtual machine.

The recommended way to provision multiple VMs is to statically define each individual VM to create as shown here. [27]

Vagrant.configure("2") do |config|

  config.vm.define "web" do |web|
    web.vm.box = "nginx"
  end

  config.vm.define "php" do |php|
    php.vm.box = "phpfpm"
  end

  config.vm.define "db" do |db|
    db.vm.box = "mariadb"
  end

end

However, it is possible to use Ruby to dynamically define and create VMs. This will work for creating the VMs but using the vagrant command to manage the VMs will not work properly [28]:

servers=[
  {
    :hostname => "web",
    :ip => "10.0.0.10",
    :box => "xenial",
    :ram => 1024,
    :cpu => 2
  },
  {
    :hostname => "db",
    :ip => "10.10.10.11",
    :box => "saucy",
    :ram => xenial,
    :cpu => 4
  }
]

Vagrant.configure(2) do |config|
    servers.each do |machine|
        config.vm.define machine[:hostname] do |node|
            node.vm.box = machine[:box]
            node.vm.hostname = machine[:hostname]
            node.vm.network "private_network", ip: machine[:ip]
            node.vm.provider "virtualbox" do |vb|
                vb.customize ["modifyvm", :id, "--memory", machine[:ram]]
            end
        end
    end
end

GUI

There are many programs for managing virtualization from a graphical user interface (GUI).

Common GUIs:

  • oVirt

  • Proxmox

  • Virtual Machine Manager (virt-manager)

  • XenServer

GNOME Boxes

GNOME Boxes can be installed on any Linux distribution using Flatpak:

$ flatpak install org.gnome.Boxes

File locations:

  • ~/.var/app/org.gnome.Boxes/data/gnome-boxes/images/<LINUX_DISTRIBUTION> = The QCOW2 image created for the virtual machine.

  • ~/Downloads/<LINUX_DISTRIBUTION_ISO>.iso = The ISO file downloaded to install the Linux distribution.

oVirt

Supported operating systems: RHEL/CentOS 7

oVirt is an open-source API and GUI front-end for KVM virtualization similar to VMware ESXi and XenServer. It is the open source upstream version of Red Hat Virtualization (RHV). It supports using network storage from NFS, Gluster, iSCSI, and other solutions.

oVirt has three components [39]:

  • oVirt Engine = The node that controls oVirt operations and monitoring.

  • Hypervisor nodes = The nodes where the virtual machines run.

  • Storage nodes = Where the operating system images and volumes of created virtual machines.

Install

Quick

All-in-One (AIO)

Minimum requirements:

  • One 1Gb network interface

  • Hardware virtualization

  • 60GB free disk space in /var/tmp/ or a custom directory

  • Two fully qualified domain names (FQDNs) setup

  • One for the oVirt Engine (that is not in use) and one already set for the hypervisor

Install the stable, development, or the master repository. [32]

  • Stable:

    $ sudo yum install http://resources.ovirt.org/pub/yum-repo/ovirt-release42.rpm
    
  • Development:

    $ sudo yum install http://resources.ovirt.org/pub/yum-repo/ovirt-release42.rpm
    $ sudo yum install http://resources.ovirt.org/pub/yum-repo/ovirt-release42-snapshot.rpm
    
  • Master:

    $ sudo yum install http://resources.ovirt.org/pub/yum-repo/ovirt-release-master.rpm
    

Install the oVirt Engine dependencies.

$ sudo yum install ovirt-hosted-engine-setup ovirt-engine-appliance

Setup NFS. The user “vdsm” needs full access to a NFS exported directory. The group “kvm” should have readable and executable permissions to run virtual machines from there. [31]

$ sudo mkdir -p /exports/data
$ sudo chmod 0755 /exports/data
$ sudo vim /etc/exports
/exports/data      *(rw)
$ sudo systemctl restart nfs
$ sudo groupadd kvm -g 36
$ sudo useradd vdsm -u 36 -g 36
$ sudo chown -R vdsm:kvm /exports/data

Run the manual Engine setup. This will prompt the end-user for different configuration options.

$ sudo hosted-engine --deploy

Configure the Engine virtual machine to use static IP addressing. Enter in the address that is setup for the Engine’s fully qualified domain name.

How should the engine VM network be configured (DHCP, Static)[DHCP]? Static
Please enter the IP address to be used for the engine VM []: <ENGINE_IP_ADDRESS>
The engine VM will be configured to use <ENGINE_IP_ADDRESS>/24
Please provide a comma-separated list (max 3) of IP addresses of domain name servers for the engine VM
Engine VM DNS (leave it empty to skip) [127.0.0.1]: <OPTIONAL_DNS_SERVER>

If no DNS server is being used to resolve domain names, configure oVirt to use local resolution on the hypervisor and oVirt Engine via /etc/hosts.

Add lines for the appliance itself and for this host to /etc/hosts on the engine VM?
Note: ensuring that this host could resolve the engine VM hostname is still up to you
(Yes, No)[No] Yes

Define the oVirt Engine’s hostname. This needs to already exist and be resolvable at least by /etc/hosts if the above option is set to Yes.

Please provide the FQDN for the engine you would like to use.
This needs to match the FQDN that you will use for the engine installation within the VM.
Note: This will be the FQDN of the VM you are now going to create,
it should not point to the base host or to any other existing machine.
Engine FQDN:  []: <OVIRT_ENGINE_HOSTNAME>

Specify the NFS mount options. For avoiding DNS issues, the NFS server’s IP address can be used instead of the hostname.

Please specify the storage you would like to use (glusterfs, iscsi, fc, nfs)[nfs]: nfs
Please specify the nfs version you would like to use (auto, v3, v4, v4_1)[auto]: v4_1
Please specify the full shared storage connection path to use (example: host:/path): <NFS_HOSTNAME>:/exports/data

[40]

Once the installation is complete, log into the oVirt Engine web portal at https://<OVIRT_ENGINE_HOSTNAME>. Use the admin@internal account with the password that was configured during the setup. Accessing the web portal using the IP address may not work and result in this error: "The redirection URI for client is not registered". The fully qualified domain name has to be used for the link. [41]

If tasks, such as uploading an image, get stuck in the “Paused by System” state then the certificate authority (CA) needs to be imported into the end-user’s web browser. Download it from the oVirt Engine by going to: https://<OVIRT_ENGINE_HOSTNAME>/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA. [29]

Hooks

Hooks can be installed on the oVirt Engine to provide additional features. After they are installed, both the ovirt-engine and vdsmd services need to be restarted.

oVirt Engine:

$ sudo systemctl restart ovirt-engine

Hypervisors:

$ sudo systemctl restart vdsmd
MAC Spoofing

Allowing MAC spoofing on a virtual network interface card (vNIC) is required for some services such as Ironic from the OpenStack suite of software.

Install the hook and define the required virtual machine property.

$ sudo yum install -y vdsm-hook-macspoof
$ sudo engine-config -s "UserDefinedVMProperties=macspoof=(true|false)"

This will add an option to virtual machines to allow MAC spoofing. By default, it will still not be allowed.

[30]

Nested Virtualization

Install the hook.

$ sudo yum install vdsm-hook-nestedvt

Nested virtualization also requires MAC spoofing to be enabled.

[30]

Proxmox Virutal Environment (VE)

Introduction

Proxmox was designed to be a free and open source alternative to VMware vSphere. It is based on Debian and KVM.

Free Repository

By default, only the Proxmox VE Enterprise repository is configured at /etc/apt/sources.list.d/pve-enterprise.list. This requires a valid paid subscription to use and provides all of the Proxmox packages and some newer Debian packages. As an alternative, Proxmox offers a free Proxmox VE No-Subscription repository. These packages are slightly newer than the enterprise repository and have not been tested as long.

  • Proxmox VE 8:

    $ cat <<EOF > /etc/apt/sources.list.d/pve-no-subscription.list
    deb http://ftp.debian.org/debian bookworm main contrib
    deb http://ftp.debian.org/debian bookworm-updates main contrib
    deb http://download.proxmox.com/debian/pve bookworm pve-no-subscription
    deb http://security.debian.org/debian-security bookworm-security main contrib
    EOF
    
  • Proxmox VE 7:

    $ cat <<EOF > /etc/apt/sources.list.d/pve-no-subscription.list
    deb http://ftp.debian.org/debian bullseye main contrib
    deb http://ftp.debian.org/debian bullseye-updates main contrib
    deb http://download.proxmox.com/debian/pve bullseye pve-no-subscription
    deb http://security.debian.org/debian-security bullseye-security main contrib
    EOF
    

[55]

Perform a minor upgrade to complete the installation.

Local Storage

It is recommended to have the Proxmox operating system installed onto a dedicated storage device. However, for lab environments, it is possible to use the same storage device for virtual machines.

Delete the local-lvm storage which is used for virtual machine and container images by default.

Datacenter > Storage > local-lvm > Remove > Yes

Add that free space back to the root file system.

Datacenter > (select the server) > Shell
$ lvremove /dev/pve/data
$ lvresize -l +100%FREE /dev/pve/root
$ resize2fs /dev/mapper/pve-root

Enable all types of storage to be allowed on the root file system.

Datacenter > Storage > local > Edit > Content: > (select everything) > OK

[52]

NVIDIA Drivers

If the hypervisor has a NVIDIA graphics card that is not used by a virtual machine, it will use less energy with the proprietary driver installed. The driver will automatically put the graphics card into a lower power state when idle. [56][75] AMD graphics cards have native support in the Linux kernel so no additional drivers need to be installed for them.

  • Install the Linux kernel headers for Proxmox VE [57]:

    $ apt install pve-headers-$(uname -r)
    
  • Enable additional Debian repositories that contain the NVIDIA graphics driver:

    $ apt-get install software-properties-common
    $ apt-add-repository contrib
    $ apt-add-repository non-free
    $ apt-get update
    
  • Install the NVIDIA graphics driver [58]:

    $ apt-get install nvidia-driver
    

UEFI Virtual Machines

Virtual machines with UEFI support may fail to boot from a network PXE server or ISO image with the error below due to an issue with pre-generated UEFI keys. [59]

BdsDxe: failed to load Boot0001 "UEFI QEMU DVD-ROM QM00003 " from PciRoot(0x0)/Pci(0x1,0x1)/Ata(Secondary,Master,0x0): Access Denied

This can be fixed by deleting and recreating the UEFI keys with pre-enrollment disabled.

Datacenter > (select the server) > (select the virtual machine) > Hardware > EFI Disk > Remove > Yes
Datacenter > (select the server) > (select the virtual machine) > Hardware > EFI Disk > Add > EFI Disk > Pre-Enroll keys: No

Drive Pass-through

The Proxmox GUI does not support adding bare metal drives. Instead, use the CLI.

  • Find the virtual machine to add the disk to and see what SCSI device numbers are already attached.

    $ sudo qm list
    $ sudo qm config <VM_ID> | grep -P "^scsi"
    
  • View the existing drives. Then find the disk ID path.

    $ lsblk -o name,size,model,serial
    $ sudo ls -1 /dev/disk/by-id/
    
  • Add the SCSI device using the next sequential number after what is already used. At the very least, an existing vitual machine will normally have scsi0 already set as the boot drive.

    $ sudo qm set <VM_ID> -scsi<NUMBER> /dev/disk/by-id/<DISK_ID>
    
  • If the drive is a SSD, use the Proxmox GUI to enable SSD emulation. [77]

    • (Select the virtual machine) > Hardware > (select the SCSI device) > Advanced > SSD emulation: Yes > OK

  • This drive can be hot unplugged at any time. [76]

    $ sudo qm unlink <VM_ID> --idlist scsi<NUMBER>
    

Upgrades

Minor

  • Using apt-get upgrade can break the installation of Proxmox. Always use apt-get dist-upgrade instead. [72][73]

    $ pveversion
    $ sudo apt-get update
    $ sudo apt-get dist-upgrade
    $ pveversion
    
  • Reboot.

Major

  • Proxmox VE 7 to 8:

    • Perform a minor upgrade.

    • Verify the current version.

      $ pveversion
      
    • Read the known upgrade issues for Debian 12 Bookworm and Proxmox VE 8.

    • Run the official checklist to see what upgrade problems may occur.

      $ sudo pve7to8 --full
      
    • Update Debian repositories.

      $ sudo sed -i 's/bullseye/bookworm/g' /etc/apt/sources.list
      $ sudo sed -i -e 's/bullseye/bookworm/g' /etc/apt/sources.list.d/pve-*.list
      $ sudo apt-get update
      
    • Upgrade from Debian 11 Bullseye with Proxmox VE 7 to Debian 12 Bookworm with Proxmox VE 8. [74]

      $ sudo apt-get dist-upgrade
      
    • Verify the new version.

      $ pveversion
      
    • Reboot.

Virtual Machine Manager (virt-manager)

Installation

Virtual Machine Manager provides a more advanced alternative to GNOME Boxes.

Installation:

  • Arch Linux:

    $ sudo pacman -S install libvirt virt-manager
    
  • Debian [69]:

    $ sudo apt-get update
    $ sudo apt-get install qemu-system libvirt-daemon-system virt-manager
    
  • Fedora:

    $ sudo dnf install libvirt virt-manager
    

Enable the service:

$ sudo systemctl enable --now libvirtd

Disable Secure Boot

Upstream Virtual Machine Manager does not enforce secure boot on UEFI. However, some operating systems, such as Fedora, do enforce secure boot.

The workarounds below assume the Fedora path for OVMF files which is /usr/share/edk2/ovmf/. On Arch Linux, this path is /usr/share/edk2/x64/.

New Virtual Machine

GUI:

  • When creating a new virtual machine, check the box for “Customize configuration before install” > Overview > Firmware: “UEFI x86_64: /usr/share/edk2/ovmf/OVMF_CODE.fd” > Apply > Begin Installation

CLI:

  • Copy and use the UEFI NVRAM settings for insecure boot. [78]

    $ sudo cp /usr/share/edk2/ovmf/OVMF_VARS.fd /var/lib/libvirt/qemu/nvram/<VM_NAME>_VARS.fd
    $ sudo virt-install \
        --name <VM_NAME>
        --boot loader=/usr/share/edk2/ovmf/OVMF_CODE.fd,loader.readonly=yes,loader.secure='no',loader.type=pflash,nvram=/var/lib/libvirt/qemu/nvram/<VM_NAME>_VARS.fd
    

Existing Virtual Machine

  • Modify the libvirt XML to set secure='no'.

    $ sudo virsh edit <VM_NAME>
    
    <loader readonly='yes' secure='no' type='pflash'>/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd</loader>
    
  • Delete the secure boot UEFI NVRAM settings and replace them with the insecure boot settings. [79]

    $ sudo rm -f /var/lib/libvirt/qemu/nvram/<VM_NAME>_VARS.fd
    $ sudo cp /usr/share/edk2/ovmf/OVMF_VARS.fd /var/lib/libvirt/qemu/nvram/<VM_NAME>_VARS.fd
    

VMware vSphere

VMware vSphere is a collection of VMware virtualization products including ESXi hypervisors, vSphere, and vCenter Server Add-on products include NSX-T, vROps, vSAN, and more. VMware Cloud Foundation = VMware vSphere with most of the add-ons included.

Terminology:

  • ESXi hypervisor = Previously Linux based, now a proprietary UNIX-like operating system. This is the base operating system and hypervisor software suite that is installed onto a node.

  • vSphere = Has two meanings. (1) The entire collection of VMware virtualization products or (2) a management dashboard for a single region of ESXi hypervisors.

  • vCenter Server = Manage and operate vSphere infrastructure such as clusters, NSX-T, DRS, vSANs, and more.

  • vSAN = Storage from each ESXi hypervisor can be pooled together in as a virtual storage area network (vSAN) device. This is a hyperconverged infrastructure.

  • vSphere cluster = A group of two or more ESXi hypervisors that typically share a common vSAN back-end.

  • NSX-T = A fork of Open vSwitch. Used for virtual networking across nodes.

  • VSS = vSphere Standard Switch. A virtual switch that is manually managed across a cluster. Each ESXi hypervisor requires a VSS to be created if VDS is not being used. This is provided for free in VMware vSphere.

  • VDS = vSphere Distributed Switch. A virtual switch that is automatically managed across a cluster by NSX-T.

  • vSwitch = A virtual switch that is either a VSS or VDS..

  • Port group = A virtual VLAN interface on a vSwitch. It can be a single VLAN or have various trunked VLANs.

  • Content library = Local virtual machines templates/images.

  • vROps = vRealize Operations. An observability tool for vSphere.

  • DRS = Distributed Resource Scheduler. Used to manage and monitor virtual machines across a vSphere cluster.

  • Predictive DRS = Requires vROps. This can predict when to reallocate virtual machines to different hypervisors based on load and usage. Moving virtual machines will happen automatically.

Troubleshooting

Errors

“Error starting domain: Requested operation is not valid: network ‘<LIBVIRT_NETWORK>’ is not active” when starting a libvirt virtual machine.

  • View the status of all libvirt networks: sudo virsh net-list --all.

  • Start the network: sudo virsh net-start <LIBVIRT_NETWORK>

  • Optionally, enable the network to start automatically when the libvirtd service starts: sudo virsh net-autostart <LIBVIRT_NETWORK>

History

Bibliography

  1. “libvirt Introduction.” libvirt VIRTUALIZATION API. Accessed December 22, 2017. https://libvirt.org/index.html

  2. “Linux: Find Out If CPU Support Intel VT and AMD-V Virtualization Support.” February 11, 2015. nixCraft. Accessed December 18, 2016. https://www.cyberciti.biz/faq/linux-xen-vmware-kvm-intel-vt-amd-v-support/

  3. “Intel VT (Virtualization Technology) Definition.” TechTarget. October, 2009. Accessed December 18, 2016. http://searchservervirtualization.techtarget.com/definition/Intel-VT

  4. “Kernel Virtual Machine.” KVM. Accessed December 18, 2016. http://www.linux-kvm.org/page/Main_Page

  5. “KVM vs QEMU vs Libvirt.” The Geeky Way. February 14, 2014. Accessed December 22, 2017. http://thegeekyway.com/kvm-vs-qemu-vs-libvirt/

  6. “Tuning KVM.” KVM. Accessed January 7, 2016. http://www.linux-kvm.org/page/Tuning_KVM

  7. “Virtio.” libvirt Wiki. October 3, 2013. Accessed January 7, 2016. https://wiki.libvirt.org/page/Virtio

  8. “KVM I/O slowness on RHEL 6.” March 11, 2011. Accessed August 30, 2017. http://www.ilsistemista.net/index.php/virtualization/11-kvm-io-slowness-on-rhel-6.html

  9. “How to Enable Nested KVM.” Rhys Oxenhams’ Cloud Technology Blog. June 26, 2012. Accessed December 1, 2017. http://www.rdoxenham.com/?p=275

  10. “Configure DevStack with KVM-based Nested Virtualization.” December 18, 2016. Accessed December 18, 2016. http://docs.openstack.org/developer/devstack/guides/devstack-with-nested-kvm.html

  11. “How to enable nested virtualization in KVM.” Fedora Project Wiki. June 19, 2015. Accessed August 30, 2017. https://fedoraproject.org/wiki/How_to_enable_nested_virtualization_in_KVM

  12. “GPU Passthrough with KVM and Debian Linux.” scottlinux.com Linux Blog. August 28, 2016. Accessed December 18, 2016. https://scottlinux.com/2016/08/28/gpu-passthrough-with-kvm-and-debian-linux/

  13. “PCI passthrough via OVMF.” Arch Linux Wiki. December 18, 2016. Accessed December 18, 2016. https://wiki.archlinux.org/index.php/PCI_passthrough_via_OVMF

  14. “Xen Definition.” TechTarget. March, 2009. Accessed December 18, 2016. http://searchservervirtualization.techtarget.com/definition/Xen

  15. “Nested Virtualization in Xen.” Xen Project Wiki. November 2, 2017. Accessed December 22, 2017. https://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen

  16. “UEFI Kickstart failed to find a suitable stage1 device.” Red Hat Discussions. October 1, 2015. Accessed October 18, 2018. https://access.redhat.com/discussions/1534853

  17. “Providers VirtualBox Configuration.” Vagrant Documentation. November 23, 2020. Accessed February 10, 2021. https://www.vagrantup.com/docs/virtualbox/configuration.html

  18. “APIC Virtualization Performance Testing and Iozone.” Intel Developer Zone Blog. December 17, 2013. Accessed September 6, 2018. https://software.intel.com/en-us/blogs/2013/12/17/apic-virtualization-performance-testing-and-iozone

  19. “Intel x2APIC and APIC Virtualization (APICv or vAPIC).” Red Hat vfio-users Mailing list. June 14, 2016. Accessed September 6, 2018. https://www.redhat.com/archives/vfio-users/2016-June/msg00055.html

  20. “QEMU Disk IO Which perfoms Better: Native or threads?” SlideShare. February, 2016. Accessed May 13, 2018. https://www.slideshare.net/pradeepkumarsuvce/qemu-disk-io-which-performs-better-native-or-threads

  21. “Introduction to Vagrant.” Vagrant Documentation. April 24, 2017. Accessed May 9, 2017. https://www.vagrantup.com/intro/getting-started/index.html

  22. “Available Vagrant Plugins.” mitchell/vagrant GitHub. November 9, 2016. Accessed May 8, 2017. https://github.com/mitchellh/vagrant/wiki/Available-Vagrant-Plugins

  23. “[Vagrant] Boxes.” Vagrant Documentation. April 24, 2017. Accessed May 9, 2017. https://www.vagrantup.com/docs/boxes.html

  24. “[Vagrant] Networking.” Vagrant Documentation. April 24, 2017. Accessed May 9, 2017. https://www.vagrantup.com/docs/networking/

  25. “Vagrant Libvirt Provider [README].” vagrant-libvirt GitHub. May 8, 2017. Accessed October 2, 2018. https://github.com/vagrant-libvirt/vagrant-libvirt

  26. “[Vagrant] Provisioning.” Vagrant Documentation. April 24, 2017. Accessed May 9, 2017. https://www.vagrantup.com/docs/provisioning/

  27. “[Vagrant] Multi-Machine.” Vagrant Documentation. April 24, 2017. Accessed May 9, 2017. https://www.vagrantup.com/docs/multi-machine/

  28. “Vagrantfile.” Linux system administration and monitoring / Windows servers and CDN video. May 9, 2017. Accessed May 9, 2017. http://sysadm.pp.ua/linux/sistemy-virtualizacii/vagrantfile.html

  29. “RHV 4 Upload Image tasks end in Paused by System state.” Red Hat Customer Portal. April 11, 2017. Accessed March 26, 2018. https://access.redhat.com/solutions/2592941

  30. “Testing oVirt 3.3 with Nested KVM.” Red Hat Open Source Community. August 15, 2013. Accessed March 29, 2018. https://community.redhat.com/blog/2013/08/testing-ovirt-3-3-with-nested-kvm/

  31. “Storage.” oVirt Documentation. Accessed March 20, 2018. https://www.ovirt.org/documentation/admin-guide/chap-Storage/

  32. “Install nightly snapshot.” oVirt Documentation. Accessed March 21, 2018. https://www.ovirt.org/develop/dev-process/install-nightly-snapshot/

  33. “Guide: How to Enable Huge Pages to improve VFIO KVM Performance in Fedora 25.” Gaming on Linux with VFIO. August 20, 2017. Accessed March 23, 2018. http://vfiogaming.blogspot.com/2017/08/guide-how-to-enable-huge-pages-to.html

  34. “PCI passthrough via OVMF.” Arch Linux Wiki. February 13, 2018. Accessed February 26, 2018. https://wiki.archlinux.org/index.php/PCI_passthrough_via_OVMF

  35. “RYZEN GPU PASSTHROUGH SETUP GUIDE: FEDORA 26 + WINDOWS GAMING ON LINUX.” Level One Techs. June 25, 2017. Accessed February 26, 2018. https://level1techs.com/article/ryzen-gpu-passthrough-setup-guide-fedora-26-windows-gaming-linux

  36. “IOMMU Groups – What You Need to Consider.” Heiko’s Blog. July 25, 2017. Accessed March 3, 2018. https://heiko-sieger.info/iommu-groups-what-you-need-to-consider/

  37. “Kickstart Documentation.” Pykickstart. Accessed March 15, 2018. http://pykickstart.readthedocs.io/en/latest/kickstart-docs.html

  38. “Creating an automated CentOS 7 Install via Kickstart file.” Marc Lopez Personal Blog. December 1, 2014. Accessed March 15, 2018. https://marclop.svbtle.com/creating-an-automated-centos-7-install-via-kickstart-file

  39. “oVirt Architecture.” oVirt Documentation. Accessed March 20, 2018. https://www.ovirt.org/documentation/architecture/architecture/

  40. “Deploying Self-Hosted Engine.” oVirt Documentation. Accessed March 20, 2018. https://www.ovirt.org/documentation/self-hosted/chap-Deploying_Self-Hosted_Engine/

  41. “[ovirt-users] Fresh install - unable to web gui login.” oVirt Users Mailing List. January 11, 2018. Accessed March 26, 2018. http://lists.ovirt.org/pipermail/users/2018-January/086223.html

  42. “Install Terraform.” HashiCorp Learn. Accessed July 8, 2020.https://learn.hashicorp.com/terraform/getting-started/install

  43. “Providers.” Terraform CLI. Accessed July 8, 2020. https://www.terraform.io/docs/providers/index.html

  44. “Create a Terraform Module.” Linode Guides & Tutorials. May 1, 2020. Accessed July 8, 2020. https://www.linode.com/docs/applications/configuration-management/terraform/create-terraform-module/

  45. “OpenStack Provider.” Terraform Docs. Accessed July 18, 2020. https://www.terraform.io/docs/providers/openstack/index.html

  46. “How to create a vagrant VM from a libvirt vm/image.” openATTIC. January 11, 2018. Accessed October 19, 2020. https://www.openattic.org/posts/how-to-create-a-vagrant-vm-from-a-libvirt-vmimage/

  47. “Qemu/KVM Virtual Machines.” Proxmox VE Wiki. May 4, 2022. Accessed August 26, 2022. https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines

  48. “Providers VMware Configuration.” Vagrant Documentation. November 23, 2020. Accessed February 10, 2021. https://www.vagrantup.com/docs/providers/vmware/configuration

  49. “VMware Integration.” Vagrant by HashiCorp. Accessed February 10, 2021. https://www.vagrantup.com/vmware

  50. “KVM Virtualization: Start VNC Remote Access For Guest Operating Systems.” nixCraft. May 6, 2017. Accessed February 18, 2021. https://www.cyberciti.biz/faq/linux-kvm-vnc-for-guest-machine/

  51. “CHAPTER 11. MANAGING STORAGE FOR VIRTUAL MACHINES.” Red Hat Customer Portal. Accessed February 25, 2021. https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_virtualization/managing-storage-for-virtual-machines_configuring-and-managing-virtualization#understanding-virtual-machine-storage_managing-storage-for-virtual-machines

  52. “How to install Proxmox VE 7.0.” YouTube - H2DC - How to do Computers. October 20, 2021. Accessed August 7, 2022. https://www.youtube.com/watch?v=GYOlulPwxlE

  53. “Huge pages part 3: Administration.” LWN.net. June 21, 2011. Accessed August 7, 2022. https://lwn.net/Articles/448571/

  54. “Qemu/KVM Virtual Machines.” Proxmox VE. May 4, 2022. Accessed August 7, 2022. https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines

  55. “Package Repositories.” Proxmox VE. June 22, 2023. Accessed July 29, 2023. https://pve.proxmox.com/wiki/Package_Repositories

  56. “Trying to save power - can I completely “switch off” GPU?” Reddit r/VFIO. May 21, 2022. Accessed August 11, 2022. https://www.reddit.com/r/VFIO/comments/uujulb/trying_to_save_power_can_i_completely_switch_off/

  57. “PVE-Headers.” Proxmox Support Forums. October 13, 2021. Accessed August 11, 2022. https://forum.proxmox.com/threads/pve-headers.97882/

  58. “Install NVIDIA Drivers on Debian 11.” Linux Hint. March, 2022. Accessed August 11, 2022. https://linuxhint.com/install-nvidia-drivers-debian-11/

  59. “Unable to PXE Boot UEFI-Based VMs.” Reddit r/Proxmox. May 18, 2022. Accessed August 11, 2022. https://www.reddit.com/r/Proxmox/comments/qil7qy/unable_to_pxe_boot_uefibased_vms/

  60. “The Ultimate Beginner’s Guide to GPU Passthrough (Proxmox, Windows 10).” Reddit r/homelab. March 26, 2019. Accessed August 27, 2022. https://www.reddit.com/r/homelab/comments/b5xpua/the_ultimate_beginners_guide_to_gpu_passthrough/

  61. “BAR 0: can’t reserve.” Reddit r/VFIO. May 1, 2022. Accessed August 27, 2022. https://www.reddit.com/r/VFIO/comments/cktnhv/bar_0_cant_reserve/

  62. “PVE7: vfio-pci xxxx:xx:xx.x: No more image in the PCI ROM.” Proxmox Support Forums. May 17, 2022. Accessed August 27, 2022. https://forum.proxmox.com/threads/pve7-vfio-pci-xxxx-xx-xx-x-no-more-image-in-the-pci-rom.108189/

  63. “cat: rom: Input/output error #4.” GitHub awilliam/rom-parser. February 19, 2022. Accessed August 27, 2022. https://github.com/awilliam/rom-parser/issues/4

  64. “PSA. If you run kernel 5.18 with NVIDIA, pass ibt=off to your kernel cmd line if your NVIDIA driver refuses to load.” Reddit r/archlinux. July 2, 2022. Accessed August 27, 2022. https://www.reddit.com/r/archlinux/comments/v0x3c4/psa_if_you_run_kernel_518_with_nvidia_pass_ibtoff/

  65. “Pci passthrough.” Proxmox VE. September 1, 2021. Accessed August 27, 2022. https://pve.proxmox.com/wiki/Pci_passthrough#NVIDIA_Tips

  66. “Get Halo Infinite running under a VM.” Reddit r/VFIO. January 2, 2022. Accessed August 27, 2022. https://www.reddit.com/r/VFIO/comments/pvt9en/get_halo_infinite_running_under_a_vm/

  67. “How To set “<feature policy=’disable’ name=’hypervisor’/>” in Proxmox.” Reddit r/Proxmox. November 17, 2022. Accessed August 27, 2022. https://www.reddit.com/r/Proxmox/comments/quwmp7/how_to_set_feature_policydisable_namehypervisor/

  68. “GPU Passthrough - not displaying boot sequence.” Proxmox VE. December 30, 2021. Accessed October 17, 2022. https://forum.proxmox.com/threads/gpu-passthrough-not-displaying-boot-sequence.77997/

  69. “KVM.” Debian Wiki. February 6, 2023. Accessed February 18, 2023. https://wiki.debian.org/KVM

  70. “Kickstart Documentation.” Pykickstart Documentation. Accessed February 28, 2023. https://pykickstart.readthedocs.io/en/latest/kickstart-docs.html

  71. “Bug 1838859 - user from kickstart is not created on ostreesetup based install.” Red Hat Bugzilla. February 8, 2022. Accessed February 18, 2023. https://bugzilla.redhat.com/show_bug.cgi?id=1838859

  72. “pve7to8 not present.” Proxmox Support Forum. July 27, 2023. Accessed July 29, 2023. https://forum.proxmox.com/threads/pve7to8-not-present.129479/

  73. “Proxmox VE Administration Guide.” Proxmox VE Documentation. June 25, 2023. Accessed July 29, 2023. https://pve.proxmox.com/pve-docs/pve-admin-guide.html#_system_software_updates

  74. “Upgrade from 7 to 8.” Proxmox VE. July 18, 2023. Accessed July 29, 2023. https://pve.proxmox.com/wiki/Upgrade_from_7_to_8

  75. “High Power Consumption with VM off (vfio-pci).” Reddit r/VFIO. July 14, 2022. Accessed July 31, 2023. https://www.reddit.com/r/VFIO/comments/lgavgk/high_power_consumption_with_vm_off_vfiopci/

  76. “Passthrough Physical Disk to Virtual Machine (VM).” Proxmox VE. December 6, 2022. Accessed August 8, 2023. https://pve.proxmox.com/wiki/Passthrough_Physical_Disk_to_Virtual_Machine_(VM)

  77. “How to Passthrough a Disk in Proxmox.” WunderTech. February 28, 2023. Accessed August 8, 2023. https://www.wundertech.net/how-to-passthrough-a-disk-in-proxmox/

  78. “Disable Secure-Boot from Virt-Install Command Line.” SmoothNet. May 19, 2022. Accessed AUgust 15, 2023. https://www.smoothnet.org/disable-secure-boot-from-virt-install/

  79. “RHEL: Booting a virtual machine with UEFI but without secure boot.” Andreas Karis Blog. June 25, 2021. Accessed August 15, 2023. https://andreaskaris.github.io/blog/linux/libvirt-uefi-without-secureboot/

  80. “Logging all the commands executed during a kickstart installation to file and screen.” Server Fault. April 6, 2011. Accessed September 28, 2023. https://serverfault.com/questions/256305/logging-all-the-commands-executed-during-a-kickstart-installation-to-file-and-sc