123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938 |
- Disk image file formats
- ~~~~~~~~~~~~~~~~~~~~~~~
- QEMU supports many image file formats that can be used with VMs as well as with
- any of the tools (like ``qemu-img``). This includes the preferred formats
- raw and qcow2 as well as formats that are supported for compatibility with
- older QEMU versions or other hypervisors.
- Depending on the image format, different options can be passed to
- ``qemu-img create`` and ``qemu-img convert`` using the ``-o`` option.
- This section describes each format and the options that are supported for it.
- .. program:: image-formats
- .. option:: raw
- Raw disk image format. This format has the advantage of
- being simple and easily exportable to all other emulators. If your
- file system supports *holes* (for example in ext2 or ext3 on
- Linux or NTFS on Windows), then only the written sectors will reserve
- space. Use ``qemu-img info`` to know the real size used by the
- image or ``ls -ls`` on Unix/Linux.
- Supported options:
- .. program:: raw
- .. option:: preallocation
- Preallocation mode (allowed values: ``off``, ``falloc``,
- ``full``). ``falloc`` mode preallocates space for image by
- calling ``posix_fallocate()``. ``full`` mode preallocates space
- for image by writing data to underlying storage. This data may or
- may not be zero, depending on the storage location.
- .. program:: image-formats
- .. option:: qcow2
- QEMU image format, the most versatile format. Use it to have smaller
- images (useful if your filesystem does not supports holes, for example
- on Windows), zlib based compression and support of multiple VM
- snapshots.
- Supported options:
- .. program:: qcow2
- .. option:: compat
- Determines the qcow2 version to use. ``compat=0.10`` uses the
- traditional image format that can be read by any QEMU since 0.10.
- ``compat=1.1`` enables image format extensions that only QEMU 1.1 and
- newer understand (this is the default). Amongst others, this includes
- zero clusters, which allow efficient copy-on-read for sparse images.
- .. option:: backing_file
- File name of a base image (see ``create`` subcommand)
- .. option:: backing_fmt
- Image format of the base image
- .. option:: encryption
- This option is deprecated and equivalent to ``encrypt.format=aes``
- .. option:: encrypt.format
- If this is set to ``luks``, it requests that the qcow2 payload (not
- qcow2 header) be encrypted using the LUKS format. The passphrase to
- use to unlock the LUKS key slot is given by the ``encrypt.key-secret``
- parameter. LUKS encryption parameters can be tuned with the other
- ``encrypt.*`` parameters.
- If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
- The encryption key is given by the ``encrypt.key-secret`` parameter.
- This encryption format is considered to be flawed by modern cryptography
- standards, suffering from a number of design problems:
- - The AES-CBC cipher is used with predictable initialization vectors based
- on the sector number. This makes it vulnerable to chosen plaintext attacks
- which can reveal the existence of encrypted data.
- - The user passphrase is directly used as the encryption key. A poorly
- chosen or short passphrase will compromise the security of the encryption.
- - In the event of the passphrase being compromised there is no way to
- change the passphrase to protect data in any qcow images. The files must
- be cloned, using a different encryption passphrase in the new file. The
- original file must then be securely erased using a program like shred,
- though even this is ineffective with many modern storage technologies.
- The use of this is no longer supported in system emulators. Support only
- remains in the command line utilities, for the purposes of data liberation
- and interoperability with old versions of QEMU. The ``luks`` format
- should be used instead.
- .. option:: encrypt.key-secret
- Provides the ID of a ``secret`` object that contains the passphrase
- (``encrypt.format=luks``) or encryption key (``encrypt.format=aes``).
- .. option:: encrypt.cipher-alg
- Name of the cipher algorithm and key length. Currently defaults
- to ``aes-256``. Only used when ``encrypt.format=luks``.
- .. option:: encrypt.cipher-mode
- Name of the encryption mode to use. Currently defaults to ``xts``.
- Only used when ``encrypt.format=luks``.
- .. option:: encrypt.ivgen-alg
- Name of the initialization vector generator algorithm. Currently defaults
- to ``plain64``. Only used when ``encrypt.format=luks``.
- .. option:: encrypt.ivgen-hash-alg
- Name of the hash algorithm to use with the initialization vector generator
- (if required). Defaults to ``sha256``. Only used when ``encrypt.format=luks``.
- .. option:: encrypt.hash-alg
- Name of the hash algorithm to use for PBKDF algorithm
- Defaults to ``sha256``. Only used when ``encrypt.format=luks``.
- .. option:: encrypt.iter-time
- Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
- Defaults to ``2000``. Only used when ``encrypt.format=luks``.
- .. option:: cluster_size
- Changes the qcow2 cluster size (must be between 512 and 2M). Smaller cluster
- sizes can improve the image file size whereas larger cluster sizes generally
- provide better performance.
- .. option:: preallocation
- Preallocation mode (allowed values: ``off``, ``metadata``, ``falloc``,
- ``full``). An image with preallocated metadata is initially larger but can
- improve performance when the image needs to grow. ``falloc`` and ``full``
- preallocations are like the same options of ``raw`` format, but sets up
- metadata also.
- .. option:: lazy_refcounts
- If this option is set to ``on``, reference count updates are postponed with
- the goal of avoiding metadata I/O and improving performance. This is
- particularly interesting with :option:`cache=writethrough` which doesn't batch
- metadata updates. The tradeoff is that after a host crash, the reference count
- tables must be rebuilt, i.e. on the next open an (automatic) ``qemu-img
- check -r all`` is required, which may take some time.
- This option can only be enabled if ``compat=1.1`` is specified.
- .. option:: nocow
- If this option is set to ``on``, it will turn off COW of the file. It's only
- valid on btrfs, no effect on other file systems.
- Btrfs has low performance when hosting a VM image file, even more
- when the guest on the VM also using btrfs as file system. Turning off
- COW is a way to mitigate this bad performance. Generally there are two
- ways to turn off COW on btrfs:
- - Disable it by mounting with nodatacow, then all newly created files
- will be NOCOW.
- - For an empty file, add the NOCOW file attribute. That's what this
- option does.
- Note: this option is only valid to new or empty files. If there is
- an existing file which is COW and has data blocks already, it couldn't
- be changed to NOCOW by setting ``nocow=on``. One can issue ``lsattr
- filename`` to check if the NOCOW flag is set or not (Capital 'C' is
- NOCOW flag).
- .. program:: image-formats
- .. option:: qed
- Old QEMU image format with support for backing files and compact image files
- (when your filesystem or transport medium does not support holes).
- When converting QED images to qcow2, you might want to consider using the
- ``lazy_refcounts=on`` option to get a more QED-like behaviour.
- Supported options:
- .. program:: qed
- .. option:: backing_file
- File name of a base image (see ``create`` subcommand).
- .. option:: backing_fmt
- Image file format of backing file (optional). Useful if the format cannot be
- autodetected because it has no header, like some vhd/vpc files.
- .. option:: cluster_size
- Changes the cluster size (must be power-of-2 between 4K and 64K). Smaller
- cluster sizes can improve the image file size whereas larger cluster sizes
- generally provide better performance.
- .. option:: table_size
- Changes the number of clusters per L1/L2 table (must be
- power-of-2 between 1 and 16). There is normally no need to
- change this value but this option can between used for
- performance benchmarking.
- .. program:: image-formats
- .. option:: qcow
- Old QEMU image format with support for backing files, compact image files,
- encryption and compression.
- Supported options:
- .. program:: qcow
- .. option:: backing_file
- File name of a base image (see ``create`` subcommand)
- .. option:: encryption
- This option is deprecated and equivalent to ``encrypt.format=aes``
- .. option:: encrypt.format
- If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
- The encryption key is given by the ``encrypt.key-secret`` parameter.
- This encryption format is considered to be flawed by modern cryptography
- standards, suffering from a number of design problems enumerated previously
- against the ``qcow2`` image format.
- The use of this is no longer supported in system emulators. Support only
- remains in the command line utilities, for the purposes of data liberation
- and interoperability with old versions of QEMU.
- Users requiring native encryption should use the ``qcow2`` format
- instead with ``encrypt.format=luks``.
- .. option:: encrypt.key-secret
- Provides the ID of a ``secret`` object that contains the encryption
- key (``encrypt.format=aes``).
- .. program:: image-formats
- .. option:: luks
- LUKS v1 encryption format, compatible with Linux dm-crypt/cryptsetup
- Supported options:
- .. program:: luks
- .. option:: key-secret
- Provides the ID of a ``secret`` object that contains the passphrase.
- .. option:: cipher-alg
- Name of the cipher algorithm and key length. Currently defaults
- to ``aes-256``.
- .. option:: cipher-mode
- Name of the encryption mode to use. Currently defaults to ``xts``.
- .. option:: ivgen-alg
- Name of the initialization vector generator algorithm. Currently defaults
- to ``plain64``.
- .. option:: ivgen-hash-alg
- Name of the hash algorithm to use with the initialization vector generator
- (if required). Defaults to ``sha256``.
- .. option:: hash-alg
- Name of the hash algorithm to use for PBKDF algorithm
- Defaults to ``sha256``.
- .. option:: iter-time
- Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
- Defaults to ``2000``.
- .. program:: image-formats
- .. option:: vdi
- VirtualBox 1.1 compatible image format.
- Supported options:
- .. program:: vdi
- .. option:: static
- If this option is set to ``on``, the image is created with metadata
- preallocation.
- .. program:: image-formats
- .. option:: vmdk
- VMware 3 and 4 compatible image format.
- Supported options:
- .. program: vmdk
- .. option:: backing_file
- File name of a base image (see ``create`` subcommand).
- .. option:: compat6
- Create a VMDK version 6 image (instead of version 4)
- .. option:: hwversion
- Specify vmdk virtual hardware version. Compat6 flag cannot be enabled
- if hwversion is specified.
- .. option:: subformat
- Specifies which VMDK subformat to use. Valid options are
- ``monolithicSparse`` (default),
- ``monolithicFlat``,
- ``twoGbMaxExtentSparse``,
- ``twoGbMaxExtentFlat`` and
- ``streamOptimized``.
- .. program:: image-formats
- .. option:: vpc
- VirtualPC compatible image format (VHD).
- Supported options:
- .. program:: vpc
- .. option:: subformat
- Specifies which VHD subformat to use. Valid options are
- ``dynamic`` (default) and ``fixed``.
- .. program:: image-formats
- .. option:: VHDX
- Hyper-V compatible image format (VHDX).
- Supported options:
- .. program:: VHDX
- .. option:: subformat
- Specifies which VHDX subformat to use. Valid options are
- ``dynamic`` (default) and ``fixed``.
- .. option:: block_state_zero
- Force use of payload blocks of type 'ZERO'. Can be set to ``on`` (default)
- or ``off``. When set to ``off``, new blocks will be created as
- ``PAYLOAD_BLOCK_NOT_PRESENT``, which means parsers are free to return
- arbitrary data for those blocks. Do not set to ``off`` when using
- ``qemu-img convert`` with ``subformat=dynamic``.
- .. option:: block_size
- Block size; min 1 MB, max 256 MB. 0 means auto-calculate based on
- image size.
- .. option:: log_size
- Log size; min 1 MB.
- Read-only formats
- ~~~~~~~~~~~~~~~~~
- More disk image file formats are supported in a read-only mode.
- .. program:: image-formats
- .. option:: bochs
- Bochs images of ``growing`` type.
- .. program:: image-formats
- .. option:: cloop
- Linux Compressed Loop image, useful only to reuse directly compressed
- CD-ROM images present for example in the Knoppix CD-ROMs.
- .. program:: image-formats
- .. option:: dmg
- Apple disk image.
- .. program:: image-formats
- .. option:: parallels
- Parallels disk image format.
- Using host drives
- ~~~~~~~~~~~~~~~~~
- In addition to disk image files, QEMU can directly access host
- devices. We describe here the usage for QEMU version >= 0.8.3.
- Linux
- ^^^^^
- On Linux, you can directly use the host device filename instead of a
- disk image filename provided you have enough privileges to access
- it. For example, use ``/dev/cdrom`` to access to the CDROM.
- CD
- You can specify a CDROM device even if no CDROM is loaded. QEMU has
- specific code to detect CDROM insertion or removal. CDROM ejection by
- the guest OS is supported. Currently only data CDs are supported.
- Floppy
- You can specify a floppy device even if no floppy is loaded. Floppy
- removal is currently not detected accurately (if you change floppy
- without doing floppy access while the floppy is not loaded, the guest
- OS will think that the same floppy is loaded).
- Use of the host's floppy device is deprecated, and support for it will
- be removed in a future release.
- Hard disks
- Hard disks can be used. Normally you must specify the whole disk
- (``/dev/hdb`` instead of ``/dev/hdb1``) so that the guest OS can
- see it as a partitioned disk. WARNING: unless you know what you do, it
- is better to only make READ-ONLY accesses to the hard disk otherwise
- you may corrupt your host data (use the ``-snapshot`` command
- line option or modify the device permissions accordingly).
- Zoned block devices
- Zoned block devices can be passed through to the guest if the emulated storage
- controller supports zoned storage. Use ``--blockdev host_device,
- node-name=drive0,filename=/dev/nullb0,cache.direct=on`` to pass through
- ``/dev/nullb0`` as ``drive0``.
- Windows
- ^^^^^^^
- CD
- The preferred syntax is the drive letter (e.g. ``d:``). The
- alternate syntax ``\\.\d:`` is supported. ``/dev/cdrom`` is
- supported as an alias to the first CDROM drive.
- Currently there is no specific code to handle removable media, so it
- is better to use the ``change`` or ``eject`` monitor commands to
- change or eject media.
- Hard disks
- Hard disks can be used with the syntax: ``\\.\PhysicalDriveN``
- where *N* is the drive number (0 is the first hard disk).
- WARNING: unless you know what you do, it is better to only make
- READ-ONLY accesses to the hard disk otherwise you may corrupt your
- host data (use the ``-snapshot`` command line so that the
- modifications are written in a temporary file).
- Mac OS X
- ^^^^^^^^
- ``/dev/cdrom`` is an alias to the first CDROM.
- Currently there is no specific code to handle removable media, so it
- is better to use the ``change`` or ``eject`` monitor commands to
- change or eject media.
- Virtual FAT disk images
- ~~~~~~~~~~~~~~~~~~~~~~~
- QEMU can automatically create a virtual FAT disk image from a
- directory tree. In order to use it, just type:
- .. parsed-literal::
- |qemu_system| linux.img -hdb fat:/my_directory
- Then you access access to all the files in the ``/my_directory``
- directory without having to copy them in a disk image or to export
- them via SAMBA or NFS. The default access is *read-only*.
- Floppies can be emulated with the ``:floppy:`` option:
- .. parsed-literal::
- |qemu_system| linux.img -fda fat:floppy:/my_directory
- A read/write support is available for testing (beta stage) with the
- ``:rw:`` option:
- .. parsed-literal::
- |qemu_system| linux.img -fda fat:floppy:rw:/my_directory
- What you should *never* do:
- - use non-ASCII filenames
- - use "-snapshot" together with ":rw:"
- - expect it to work when loadvm'ing
- - write to the FAT directory on the host system while accessing it with the guest system
- NBD access
- ~~~~~~~~~~
- QEMU can access directly to block device exported using the Network Block Device
- protocol.
- .. parsed-literal::
- |qemu_system| linux.img -hdb nbd://my_nbd_server.mydomain.org:1024/
- If the NBD server is located on the same host, you can use an unix socket instead
- of an inet socket:
- .. parsed-literal::
- |qemu_system| linux.img -hdb nbd+unix://?socket=/tmp/my_socket
- In this case, the block device must be exported using ``qemu-nbd``:
- .. parsed-literal::
- qemu-nbd --socket=/tmp/my_socket my_disk.qcow2
- The use of ``qemu-nbd`` allows sharing of a disk between several guests:
- .. parsed-literal::
- qemu-nbd --socket=/tmp/my_socket --share=2 my_disk.qcow2
- and then you can use it with two guests:
- .. parsed-literal::
- |qemu_system| linux1.img -hdb nbd+unix://?socket=/tmp/my_socket
- |qemu_system| linux2.img -hdb nbd+unix://?socket=/tmp/my_socket
- If the ``nbd-server`` uses named exports (supported since NBD 2.9.18, or with QEMU's
- own embedded NBD server), you must specify an export name in the URI:
- .. parsed-literal::
- |qemu_system| -cdrom nbd://localhost/debian-500-ppc-netinst
- |qemu_system| -cdrom nbd://localhost/openSUSE-11.1-ppc-netinst
- The URI syntax for NBD is supported since QEMU 1.3. An alternative syntax is
- also available. Here are some example of the older syntax:
- .. parsed-literal::
- |qemu_system| linux.img -hdb nbd:my_nbd_server.mydomain.org:1024
- |qemu_system| linux2.img -hdb nbd:unix:/tmp/my_socket
- |qemu_system| -cdrom nbd:localhost:10809:exportname=debian-500-ppc-netinst
- iSCSI LUNs
- ~~~~~~~~~~
- iSCSI is a popular protocol used to access SCSI devices across a computer
- network.
- There are two different ways iSCSI devices can be used by QEMU.
- The first method is to mount the iSCSI LUN on the host, and make it appear as
- any other ordinary SCSI device on the host and then to access this device as a
- /dev/sd device from QEMU. How to do this differs between host OSes.
- The second method involves using the iSCSI initiator that is built into
- QEMU. This provides a mechanism that works the same way regardless of which
- host OS you are running QEMU on. This section will describe this second method
- of using iSCSI together with QEMU.
- In QEMU, iSCSI devices are described using special iSCSI URLs. URL syntax:
- ::
- iscsi://[<username>[%<password>]@]<host>[:<port>]/<target-iqn-name>/<lun>
- Username and password are optional and only used if your target is set up
- using CHAP authentication for access control.
- Alternatively the username and password can also be set via environment
- variables to have these not show up in the process list:
- ::
- export LIBISCSI_CHAP_USERNAME=<username>
- export LIBISCSI_CHAP_PASSWORD=<password>
- iscsi://<host>/<target-iqn-name>/<lun>
- Various session related parameters can be set via special options, either
- in a configuration file provided via '-readconfig' or directly on the
- command line.
- If the initiator-name is not specified qemu will use a default name
- of 'iqn.2008-11.org.linux-kvm[:<uuid>'] where <uuid> is the UUID of the
- virtual machine. If the UUID is not specified qemu will use
- 'iqn.2008-11.org.linux-kvm[:<name>'] where <name> is the name of the
- virtual machine.
- Setting a specific initiator name to use when logging in to the target:
- ::
- -iscsi initiator-name=iqn.qemu.test:my-initiator
- Controlling which type of header digest to negotiate with the target:
- ::
- -iscsi header-digest=CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
- These can also be set via a configuration file:
- ::
- [iscsi]
- user = "CHAP username"
- password = "CHAP password"
- initiator-name = "iqn.qemu.test:my-initiator"
- # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
- header-digest = "CRC32C"
- Setting the target name allows different options for different targets:
- ::
- [iscsi "iqn.target.name"]
- user = "CHAP username"
- password = "CHAP password"
- initiator-name = "iqn.qemu.test:my-initiator"
- # header digest is one of CRC32C|CRC32C-NONE|NONE-CRC32C|NONE
- header-digest = "CRC32C"
- How to use a configuration file to set iSCSI configuration options:
- .. parsed-literal::
- cat >iscsi.conf <<EOF
- [iscsi]
- user = "me"
- password = "my password"
- initiator-name = "iqn.qemu.test:my-initiator"
- header-digest = "CRC32C"
- EOF
- |qemu_system| -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \\
- -readconfig iscsi.conf
- How to set up a simple iSCSI target on loopback and access it via QEMU:
- this example shows how to set up an iSCSI target with one CDROM and one DISK
- using the Linux STGT software target. This target is available on Red Hat based
- systems as the package 'scsi-target-utils'.
- .. parsed-literal::
- tgtd --iscsi portal=127.0.0.1:3260
- tgtadm --lld iscsi --op new --mode target --tid 1 -T iqn.qemu.test
- tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 1 \\
- -b /IMAGES/disk.img --device-type=disk
- tgtadm --lld iscsi --mode logicalunit --op new --tid 1 --lun 2 \\
- -b /IMAGES/cd.iso --device-type=cd
- tgtadm --lld iscsi --op bind --mode target --tid 1 -I ALL
- |qemu_system| -iscsi initiator-name=iqn.qemu.test:my-initiator \\
- -boot d -drive file=iscsi://127.0.0.1/iqn.qemu.test/1 \\
- -cdrom iscsi://127.0.0.1/iqn.qemu.test/2
- GlusterFS disk images
- ~~~~~~~~~~~~~~~~~~~~~
- GlusterFS is a user space distributed file system.
- You can boot from the GlusterFS disk image with the command:
- URI:
- .. parsed-literal::
- |qemu_system| -drive file=gluster[+TYPE]://[HOST}[:PORT]]/VOLUME/PATH
- [?socket=...][,file.debug=9][,file.logfile=...]
- JSON:
- .. parsed-literal::
- |qemu_system| 'json:{"driver":"qcow2",
- "file":{"driver":"gluster",
- "volume":"testvol","path":"a.img","debug":9,"logfile":"...",
- "server":[{"type":"tcp","host":"...","port":"..."},
- {"type":"unix","socket":"..."}]}}'
- *gluster* is the protocol.
- *TYPE* specifies the transport type used to connect to gluster
- management daemon (glusterd). Valid transport types are
- tcp and unix. In the URI form, if a transport type isn't specified,
- then tcp type is assumed.
- *HOST* specifies the server where the volume file specification for
- the given volume resides. This can be either a hostname or an ipv4 address.
- If transport type is unix, then *HOST* field should not be specified.
- Instead *socket* field needs to be populated with the path to unix domain
- socket.
- *PORT* is the port number on which glusterd is listening. This is optional
- and if not specified, it defaults to port 24007. If the transport type is unix,
- then *PORT* should not be specified.
- *VOLUME* is the name of the gluster volume which contains the disk image.
- *PATH* is the path to the actual disk image that resides on gluster volume.
- *debug* is the logging level of the gluster protocol driver. Debug levels
- are 0-9, with 9 being the most verbose, and 0 representing no debugging output.
- The default level is 4. The current logging levels defined in the gluster source
- are 0 - None, 1 - Emergency, 2 - Alert, 3 - Critical, 4 - Error, 5 - Warning,
- 6 - Notice, 7 - Info, 8 - Debug, 9 - Trace
- *logfile* is a commandline option to mention log file path which helps in
- logging to the specified file and also help in persisting the gfapi logs. The
- default is stderr.
- You can create a GlusterFS disk image with the command:
- .. parsed-literal::
- qemu-img create gluster://HOST/VOLUME/PATH SIZE
- Examples
- .. parsed-literal::
- |qemu_system| -drive file=gluster://1.2.3.4/testvol/a.img
- |qemu_system| -drive file=gluster+tcp://1.2.3.4/testvol/a.img
- |qemu_system| -drive file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img
- |qemu_system| -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]/testvol/dir/a.img
- |qemu_system| -drive file=gluster+tcp://[1:2:3:4:5:6:7:8]:24007/testvol/dir/a.img
- |qemu_system| -drive file=gluster+tcp://server.domain.com:24007/testvol/dir/a.img
- |qemu_system| -drive file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket
- |qemu_system| -drive file=gluster://1.2.3.4/testvol/a.img,file.debug=9,file.logfile=/var/log/qemu-gluster.log
- |qemu_system| 'json:{"driver":"qcow2",
- "file":{"driver":"gluster",
- "volume":"testvol","path":"a.img",
- "debug":9,"logfile":"/var/log/qemu-gluster.log",
- "server":[{"type":"tcp","host":"1.2.3.4","port":24007},
- {"type":"unix","socket":"/var/run/glusterd.socket"}]}}'
- |qemu_system| -drive driver=qcow2,file.driver=gluster,file.volume=testvol,file.path=/path/a.img,
- file.debug=9,file.logfile=/var/log/qemu-gluster.log,
- file.server.0.type=tcp,file.server.0.host=1.2.3.4,file.server.0.port=24007,
- file.server.1.type=unix,file.server.1.socket=/var/run/glusterd.socket
- Secure Shell (ssh) disk images
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- You can access disk images located on a remote ssh server
- by using the ssh protocol:
- .. parsed-literal::
- |qemu_system| -drive file=ssh://[USER@]SERVER[:PORT]/PATH[?host_key_check=HOST_KEY_CHECK]
- Alternative syntax using properties:
- .. parsed-literal::
- |qemu_system| -drive file.driver=ssh[,file.user=USER],file.host=SERVER[,file.port=PORT],file.path=PATH[,file.host_key_check=HOST_KEY_CHECK]
- *ssh* is the protocol.
- *USER* is the remote user. If not specified, then the local
- username is tried.
- *SERVER* specifies the remote ssh server. Any ssh server can be
- used, but it must implement the sftp-server protocol. Most Unix/Linux
- systems should work without requiring any extra configuration.
- *PORT* is the port number on which sshd is listening. By default
- the standard ssh port (22) is used.
- *PATH* is the path to the disk image.
- The optional *HOST_KEY_CHECK* parameter controls how the remote
- host's key is checked. The default is ``yes`` which means to use
- the local ``.ssh/known_hosts`` file. Setting this to ``no``
- turns off known-hosts checking. Or you can check that the host key
- matches a specific fingerprint. The fingerprint can be provided in
- ``md5``, ``sha1``, or ``sha256`` format, however, it is strongly
- recommended to only use ``sha256``, since the other options are
- considered insecure by modern standards. The fingerprint value
- must be given as a hex encoded string::
- host_key_check=sha256:04ce2ae89ff4295a6b9c4111640bdcb3297858ee55cb434d9dd88796e93aa795
- The key string may optionally contain ":" separators between
- each pair of hex digits.
- The ``$HOME/.ssh/known_hosts`` file contains the base64 encoded
- host keys. These can be converted into the format needed for
- QEMU using a command such as::
- $ for key in `grep 10.33.8.112 known_hosts | awk '{print $3}'`
- do
- echo $key | base64 -d | sha256sum
- done
- 6c3aa525beda9dc83eadfbd7e5ba7d976ecb59575d1633c87cd06ed2ed6e366f -
- 12214fd9ea5b408086f98ecccd9958609bd9ac7c0ea316734006bc7818b45dc8 -
- d36420137bcbd101209ef70c3b15dc07362fbe0fa53c5b135eba6e6afa82f0ce -
- Note that there can be multiple keys present per host, each with
- different key ciphers. Care is needed to pick the key fingerprint
- that matches the cipher QEMU will negotiate with the remote server.
- Currently authentication must be done using ssh-agent. Other
- authentication methods may be supported in future.
- Note: Many ssh servers do not support an ``fsync``-style operation.
- The ssh driver cannot guarantee that disk flush requests are
- obeyed, and this causes a risk of disk corruption if the remote
- server or network goes down during writes. The driver will
- print a warning when ``fsync`` is not supported:
- ::
- warning: ssh server ssh.example.com:22 does not support fsync
- With sufficiently new versions of libssh and OpenSSH, ``fsync`` is
- supported.
- NVMe disk images
- ~~~~~~~~~~~~~~~~
- NVM Express (NVMe) storage controllers can be accessed directly by a userspace
- driver in QEMU. This bypasses the host kernel file system and block layers
- while retaining QEMU block layer functionalities, such as block jobs, I/O
- throttling, image formats, etc. Disk I/O performance is typically higher than
- with ``-drive file=/dev/sda`` using either thread pool or linux-aio.
- The controller will be exclusively used by the QEMU process once started. To be
- able to share storage between multiple VMs and other applications on the host,
- please use the file based protocols.
- Before starting QEMU, bind the host NVMe controller to the host vfio-pci
- driver. For example:
- .. parsed-literal::
- # modprobe vfio-pci
- # lspci -n -s 0000:06:0d.0
- 06:0d.0 0401: 1102:0002 (rev 08)
- # echo 0000:06:0d.0 > /sys/bus/pci/devices/0000:06:0d.0/driver/unbind
- # echo 1102 0002 > /sys/bus/pci/drivers/vfio-pci/new_id
- # |qemu_system| -drive file=nvme://HOST:BUS:SLOT.FUNC/NAMESPACE
- Alternative syntax using properties:
- .. parsed-literal::
- |qemu_system| -drive file.driver=nvme,file.device=HOST:BUS:SLOT.FUNC,file.namespace=NAMESPACE
- *HOST*:*BUS*:*SLOT*.\ *FUNC* is the NVMe controller's PCI device
- address on the host.
- *NAMESPACE* is the NVMe namespace number, starting from 1.
- Disk image file locking
- ~~~~~~~~~~~~~~~~~~~~~~~
- By default, QEMU tries to protect image files from unexpected concurrent
- access, as long as it's supported by the block protocol driver and host
- operating system. If multiple QEMU processes (including QEMU emulators and
- utilities) try to open the same image with conflicting accessing modes, all but
- the first one will get an error.
- This feature is currently supported by the file protocol on Linux with the Open
- File Descriptor (OFD) locking API, and can be configured to fall back to POSIX
- locking if the POSIX host doesn't support Linux OFD locking.
- To explicitly enable image locking, specify "locking=on" in the file protocol
- driver options. If OFD locking is not possible, a warning will be printed and
- the POSIX locking API will be used. In this case there is a risk that the lock
- will get silently lost when doing hot plugging and block jobs, due to the
- shortcomings of the POSIX locking API.
- QEMU transparently handles lock handover during shared storage migration. For
- shared virtual disk images between multiple VMs, the "share-rw" device option
- should be used.
- By default, the guest has exclusive write access to its disk image. If the
- guest can safely share the disk image with other writers the
- ``-device ...,share-rw=on`` parameter can be used. This is only safe if
- the guest is running software, such as a cluster file system, that
- coordinates disk accesses to avoid corruption.
- Note that share-rw=on only declares the guest's ability to share the disk.
- Some QEMU features, such as image file formats, require exclusive write access
- to the disk image and this is unaffected by the share-rw=on option.
- Alternatively, locking can be fully disabled by "locking=off" block device
- option. In the command line, the option is usually in the form of
- "file.locking=off" as the protocol driver is normally placed as a "file" child
- under a format driver. For example:
- ::
- -blockdev driver=qcow2,file.filename=/path/to/image,file.locking=off,file.driver=file
- To check if image locking is active, check the output of the "lslocks" command
- on host and see if there are locks held by the QEMU process on the image file.
- More than one byte could be locked by the QEMU instance, each byte of which
- reflects a particular permission that is acquired or protected by the running
- block driver.
- Filter drivers
- ~~~~~~~~~~~~~~
- QEMU supports several filter drivers, which don't store any data, but perform
- some additional tasks, hooking io requests.
- .. program:: filter-drivers
- .. option:: preallocate
- The preallocate filter driver is intended to be inserted between format
- and protocol nodes and preallocates some additional space
- (expanding the protocol file) when writing past the file’s end. This can be
- useful for file-systems with slow allocation.
- Supported options:
- .. program:: preallocate
- .. option:: prealloc-align
- On preallocation, align the file length to this value (in bytes), default 1M.
- .. program:: preallocate
- .. option:: prealloc-size
- How much to preallocate (in bytes), default 128M.
|