Link into the examples of the qemu driver. Signed-off-by: Peter Krempa <pkrempa@redhat.com> Reviewed-by: Ján Tomko <jtomko@redhat.com>
13 KiB
Connection URIs
Since libvirt supports many different kinds of virtualization (often referred to as "drivers" or "hypervisors"), we need a way to be able to specify which driver a connection refers to. Additionally we may want to refer to a driver on a remote machine over the network.
To this end, libvirt uses URIs as used on the Web and as defined in RFC 2396. This page documents libvirt URIs.
Specifying URIs to libvirt
The URI is passed as the name
parameter to virConnectOpen or virConnectOpenReadOnly . For example:
virConnectPtr conn = virConnectOpenReadOnly ("test:///default");
Configuring URI aliases
To simplify life for administrators, it is possible to setup URI aliases in a libvirt client configuration file. The configuration file is /etc/libvirt/libvirt.conf
for the root user, or $XDG_CONFIG_HOME/libvirt/libvirt.conf
for any unprivileged user. In this file, the following syntax can be used to setup aliases
uri_aliases = [
"hail=qemu+ssh://root@hail.cloud.example.com/system",
"sleet=qemu+ssh://root@sleet.cloud.example.com/system",
]
A URI alias should be a string made up from the characters a-Z, 0-9, _, -
. Following the =
can be any libvirt URI string, including arbitrary URI parameters. URI aliases will apply to any application opening a libvirt connection, unless it has explicitly passed the VIR_CONNECT_NO_ALIASES
parameter to virConnectOpenAuth
. If the passed in URI contains characters outside the allowed alias character set, no alias lookup will be attempted.
Default URI choice
If the URI passed to virConnectOpen*
is NULL or empty string, then libvirt will use the following logic to determine what URI to use.
- The environment variable
LIBVIRT_DEFAULT_URI
- The client configuration file
uri_default
parameter - Probe each hypervisor in turn until one that works is found
Historically an empty URI was equivalent to xen:///system
.
Specifying URIs to virsh, virt-manager and virt-install
In virsh use the -c
or --connect
option:
virsh -c test:///default list
If virsh finds the environment variable VIRSH_DEFAULT_CONNECT_URI
set, it will try this URI by default. Use of this environment variable is, however, deprecated now that libvirt supports LIBVIRT_DEFAULT_URI
itself.
When using the interactive virsh shell, you can also use the connect
URI command to reconnect to another hypervisor.
In virt-manager use the -c
or --connect=
URI option:
virt-manager -c test:///default
In virt-install use the --connect=
URI option:
virt-install --connect=test:///default [other options]
Local hypervisor URIs
xen:///system URI
To access a Xen hypervisor running on the local machine use the URI xen:///system
.
Historically libvirt 0.2.2 and previous versions required to use the name "xen"
to refer to the Xen hypervisor.
qemu:///... QEMU and KVM URIs
To use QEMU support in libvirt you must be running the libvirtd
daemon (named libvirt_qemud
in releases prior to 0.3.0). The purpose of this daemon is to manage qemu instances.
The libvirtd
daemon should be started by the init scripts when the machine boots. It should appear as a process libvirtd --daemon
running as root in the background and will handle qemu instances on behalf of all users of the machine (among other things).
So to connect to the daemon, one of two different URIs is used:
qemu:///system
connects to a system mode daemon.qemu:///session
connects to a session mode daemon.
(If you do libvirtd --help
, the daemon will print out the paths of the Unix domain socket(s) that it listens on in the various different modes).
KVM URIs are identical. You select between qemu, qemu accelerated and KVM guests in the guest XML as described here.
test:///... Test URIs
The test driver is a dummy hypervisor for test purposes. The URIs supported are:
test:///default
connects to a default set of host definitions built into the driver.test:///path/to/host/definitions
connects to a set of host definitions held in the named file.
Remote URIs
Remote URIs have the general form ("[...]" meaning an optional part):
driver[+transport]://[username@][hostname][:port]/[path][?extraparameters]
Either the transport or the hostname must be given in order to distinguish this from a local URI.
Some examples:
xen+ssh://rjones@towada/system
— Connect to a remote Xen hypervisor on hosttowada
using ssh transport and ssh usernamerjones
.xen://towada/system
— Connect to a remote Xen hypervisor on hosttowada
using TLS.xen://towada/system?no_verify=1
— Connect to a remote Xen hypervisor on hosttowada
using TLS. Do not verify the server's certificate.qemu+unix:///system?socket=/opt/libvirt/run/libvirt/libvirt-sock
— Connect to the local qemu instances over a non-standard Unix socket (the full path to the Unix socket is supplied explicitly in this case).test+tcp://localhost:5000/default
— Connect to a libvirtd daemon offering unencrypted TCP/IP connections on localhost port 5000 and use the test driver with default settings.qemu+libssh2://user@host/system?known_hosts=/home/user/.ssh/known_hosts
— Connect to a remote host using a ssh connection with the libssh2 driver and use a different known_hosts file.qemu+libssh://user@host/system?known_hosts=/home/user/.ssh/known_hosts
— Connect to a remote host using a ssh connection with the libssh driver and use a different known_hosts file.
Transport configuration
The remote driver supports multiple transport protocols and approaches which are configurable via the URI.
Extra parameters can be added to remote URIs as part of the query string (the part following ?
). Remote URIs understand the extra parameters shown below. Any others are passed unmodified through to the back end. Note that parameter values must be URI-escaped.
All transports support the following parameters:
name
The name passed to the remote
virConnectOpen
function. The name is normally formed by removing transport, hostname, port number, username and extra parameters from the remote URI, but in certain very complex cases it may be better to supply the name explicitly.Example:
name=qemu:///system
ssh
transport
The ssh
transport uses the standard SSH protocol via the system installed binary.
Supported extra parameters:
mode
See the info on the mode parameter.
proxy
See the info on the proxy parameter.
command
Path to the
ssh
binary to use.Example:
command=/opt/openssh/bin/ssh
socket
See the info on the socket parameter.
netcat
See the info on the netcat parameter.
keyfile
See the info on the keyfile parameter.
no_verify
If set to a non-zero value, this disables client's strict host key checking making it auto-accept new host keys. Existing host keys will still be validated.
Example:
no_verify=1
no_tty
If set to a non-zero value, this stops ssh from asking for a password if it cannot log in to the remote machine automatically (eg. using ssh-agent etc.). Use this when you don't have access to a terminal - for example in graphical programs which use libvirt.
Example:
no_tty=1
libssh
and libssh2
transport
Same as the ssh
transport but the SSH client is handled directly by using either libssh
or libssh2
to handle the SSH protocol without spawning an extra process.
Supported extra parameters:
mode
See the info on the mode parameter.
proxy
See the info on the proxy parameter.
socket
See the info on the socket parameter.
netcat
See the info on the netcat parameter.
keyfile
See the info on the keyfile parameter.
known_hosts
Path to the known_hosts file to verify the host key against. LibSSH2 and libssh support OpenSSH-style known_hosts files, although LibSSH2 does not support all key types, so using files created by the OpenSSH binary may result into truncating the known_hosts file. Thus, with LibSSH2 it's recommended to use the default known_hosts file is located in libvirt's client local configuration directory e.g.: ~/.conf ig/libvirt/known_hosts.
Note: Use absolute paths.
Example:
known_hosts=/root/.ssh/known_hosts
known_hosts_verify
If set to
normal
(default), then the user will be asked to accept new host keys. If set toauto
, new host keys will be auto-accepted, but existing host keys will still be validated. If set toignore
, this disables client's strict host key checking.Example:
known_hosts_verify=ignore
sshauth
A comma separated list of authentication methods to use. Default (is "agent,privkey,password ,keyboard-interactive". The order of the methods is preserved. Some methods may require additional parameters.
Example:
sshauth=privkey,agent
tls
transport
This transport uses a TCP connection to the socket. The data is encrypted using TLS to ensure security. Note that TLS certificates must be setup for this to work.
Supported extra parameters:
tls_priority
A valid GNUTLS priority string.
Example:
tls_priority=NORMAL:-VERS-SSL3.0
no_verify
If set to a non-zero value, this disables client checks of the server's certificate. Note that to disable server checks of the client's certificate or IP address you must change the libvirtd configuration
Example:
no_verify=1
pkipath
Specifies x509 certificates path for the client. If any of the CA certificate, client certificate, or client key is missing, the connection will fail with a fatal error.
Example:
pkipath=/tmp/pki/client
unix
transport
This transport uses an unix domain socket is used to connect to the daemon. This is the most common case. In most cases no extra parameters are needed.
Supported extra parameters:
mode
See the info on the mode parameter.
socket
See the info on the socket parameter.
ext
transport
The ext
transport invokes the user specified command to transport the libvirt RPC protocol to the destination. The command must be able to handle the proper connection. Standard input/output is used for the communication.
Supported extra parameters:
command
The external command launched to tunnel the data to the destination.
tcp
transport
The tcp
transport uses plain unencrypted TCP connection to libvirt. This is insecure and should not be used. This transport has no additional arguments.
Common extra parameters
Certain extra parameters are shared between multiple protocols. See the list of transport protocols above for specific usage.
mode
parameter
Controls whether to connect to per-driver daemons or libvirtd.
Supported values:
auto
automatically determine the daemon
direct
connect to per-driver daemons
legacy
connect to libvirtd
Default is auto
. Can also be set in libvirt.conf
as remote_mode
.
Example: mode=direct
proxy
parameter
Controls which proxy binary is used on the remote side of connection to connect to the daemon.
Supported values:
auto
try native, fallback to netcat
netcat
only use netcat
native
use the libvirt native proxy binary
Default is auto
. Can also be set in libvirt.conf
as remote_proxy
.
Example: proxy=native
socket
parameter
The path to the Unix domain socket, which overrides the compiled-in default. This may be passed to the remote proxy command (See. proxy parameter).
Example: socket=/opt/libvirt/run/libvirt/libvirt-sock
netcat
parameter
The name of the netcat command on the remote machine. The default is nc
. This is not permitted when using the native
proxy mode.
The command used here is used on the remote side of the connection as:
netcat -U socket
Example: netcat=/opt/netcat/bin/nc
keyfile
parameter
The name of the private key file to use to authentication to the remote machine. If this option is not used the default keys are used.
Example: keyfile=/root/.ssh/example_key