HP Integrity Virtual Machines Installation, Configuration, and Administration Version A.03.50

9 Managing Guests......................................................................................................123
9.1 Monitoring Guests.........................................................................................................................123
9.2 Creating Guest Administrators and Operators.............................................................................126
9.3 Installing the Guest Management Software..................................................................................127
9.4 Using the Virtual Console.............................................................................................................128
9.5 Guest Configuration Files..............................................................................................................130
9.6 Dynamic Memory..........................................................................................................................130
9.6.1 Managing Dynamic Memory from the VM Host..................................................................130
9.6.1.1 Configuring a Virtual Machine to Use Dynamic Memory............................................131
9.6.1.2 Viewing Dynamic Memory on the VM Host................................................................132
9.6.1.3 Modifying a Virtual Machine's Memory Size on the VM Host.....................................134
9.6.2 Managing Dynamic Memory from the Guest.......................................................................134
9.6.2.1 Viewing Dynamic Memory Information from the Guest.............................................134
9.6.2.2 Modifying a Virtual Machine's Memory Size from the Guest......................................135
9.6.3 Troubleshooting Dynamic Memory Problems......................................................................135
9.6.3.1 Dynamic Memory Restrictions......................................................................................135
9.6.3.2 VM Host Resource Considerations...............................................................................135
9.6.3.3 Guest Resource Considerations.....................................................................................136
9.6.3.4 Specify Sufficient Guest Memory..................................................................................136
9.6.3.5 Actual Memory Allocations Might Differ.....................................................................137
9.6.3.6 Enable Dynamic Memory on the Guest and on the VM Host......................................137
9.6.3.7 Upgrade the Guest Kit When Upgrading Integrity VM...............................................137
9.7 Integrity VM Log Files...................................................................................................................138
9.8 Managing the Device Database.....................................................................................................138
9.8.1 The Device Database File.......................................................................................................138
9.8.2 Using the hpvmdevmgmt Command...................................................................................138
9.8.2.1 Sharing Devices.............................................................................................................139
9.8.2.2 Replacing Devices.........................................................................................................140
9.8.2.3 Deleting Devices............................................................................................................140
9.8.2.4 Restricting VM Host Devices........................................................................................140
9.9 HP AVIO Stor EFI Driver Enumeration Policy..............................................................................140
10 Migrating Virtual Machines....................................................................................143
10.1 Introduction to Virtual Machine Migration.................................................................................143
10.2 Migration Guests from VM Host to VM Host.............................................................................144
10.2.1 Using the hpvmmigrate Command.....................................................................................144
10.2.2 Example of the hpvmmigrate Command............................................................................145
10.3 Network and Storage Migration Considerations........................................................................146
10.3.1 Network Configuration Considerations..............................................................................146
10.3.2 Storage Configuration Considerations................................................................................146
10.3.3 Security Considerations.......................................................................................................146
10.3.3.1 SSH Key Setup.............................................................................................................147
10.3.3.2 SSH Key Setup Troubleshooting.................................................................................147
10.4 Migrating Guests from Physical to Virtual Machines.................................................................147
10.4.1 Requirements for Migrating a Workload............................................................................147
10.4.2 Using the p2vassist Utility...................................................................................................148
10.4.3 Troubleshooting P2V Problems...........................................................................................151
11 Using HP Serviceguard with Integrity VM.............................................................153
11.1 Introduction to HP Serviceguard with Integrity VM..................................................................153
11.2 VMs as Serviceguard Nodes Configurations..............................................................................154
11.2.1 Cluster in a Box....................................................................................................................155
11.2.2 Virtual-to-Virtual Cluster....................................................................................................155
6 Table of Contents