SUSE Virtualization Technologies Roadmap Michal Svec Mike Latimer Senior Product Manager msvec@suse.com Senior Engineering Manager mlatimer@suse.com
Agenda Virtualization @SUSE Enhancements in XEN/KVM Enhancements in Linux Containers and Docker Virtualization with VMware Virtualization with Microsoft Virtualization in the Clouds 2
Virtualization @SUSE
SUSE Virtualization Virtualization is a key component in SUSE strategy! Xen 4 SUSE first to deliver Xen to the Enterprise in SLES 10 GA SUSE continues to support Xen in SLES 12 SP1 KVM SUSE first to deliver KVM to the Enterprise in SLES 11 GA SUSE first to deliver KVM on IBM System z in SLES 11 SP3 SUSE first to deliver Xen & KVM in OpenStack
Virtualization use cases In the Clouds Perfect Guest Available in Public Clouds Dual Hypervisor Support Cloud Hosts Host Guest In Your Data Center 5
Virtualization Host Full Support for leading open source hypervisors KVM and Xen Available for major architectures: Complete virtualization solution: 6 x86, x86_64, IBM System z and POWER8 VM save/restore, snapshots, hotplugging, live migration, etc... OS-level or application virtualization with Linux Containers (LXC) and Docker
Perfect Guest 7 Perfect Guest strategy, operating system tuned to run great as a guest on all major hypervisors
Virtualization in the Cloud Public Cloud: Private Cloud: 8 Deploy SUSE Linux Enterprise Server workloads in the public cloud or cloud service provider of your choice. Deliver cloud infrastructure solution powered by SUSE OpenStack Cloud Hybrid Cloud: SUSE Manager to manage servers on premise and in the public cloud. SUSE Studio tools to deploy workloads to your on premise, private and public clouds.
Virtualization in the Cloud Ecosystem SUSE Studio Building workloads for physical and cloud environments SUSE OpenStack Cloud Highly flexible and adaptable cloud infrastructure SUSE Manager - Provisioning - Management - Monitoring SUSE Linux Enterprise The foundation for your datacenter workloads and virtualization 9
Virtualization Enhancements in Xen and KVM
SLES 12 SP1 Virtualization Major changes were introduced in SLES12 xend libxl lxc libvirt-lxc qemu 1.4.1 2.0.2 Focus for SP1 is on stability! 11 Updated Virtualization Packages xen 4.5.1 qemu 2.3.1 libvirt 1.2.18.1
SLES 12 SP1 Virtualization Numerous bug fixes, but some enhancements... virt-builder 12 Rapidly deploy pre-built images SPICE support in tools remote server UI Guest Agent for Linux and Windows Updated VMDP, Hyper-V drivers, etc...
SLES 12 SP1 Virtualization Xen toolstack changes beginning with SLES12 RIP xm/xend Officially deprecated upstream in Xen 4.3 (removed in Xen 4.5) Managed (or persistent) domains are gone /etc/xen/xend-config.sxp is gone domuloader is gone Support for s-expression config format is gone Welcome xl/libxl (aka libxenlight)! 13 Documentation can be found in the Virtualization Guide appendix
xl/libxl Fast, light-weight, improved concurrency Technology preview in SLES 11 SP3/SP4 Only toolstack in SLE 12+ Global configuration file: 14 Not supported, but xend should be disabled when using xl/libxl /etc/xen/xl.conf Memory autoballooning Hotplugging and locking behavior
VM States under xend vs libxl libxl xend xm libvirt vm-install xl libvirt state state xend libxl state 15
SLES 12 SP1 Xen Highlights General Status of Xen: Libvirt preferred management layer 16 Xen 4.5.1 xl supported for thin management (not reflected in libvirt) New Features Global libxl configuration file (/etc/libvirt/libxl.conf) Supervisor Mode Access Prevention (SMAP) Improved support for large domains Integration with virtlockd Improved logging control (through libvirt)
SLES 12 SP1 QEMU / KVM Highlights General Status of QEMU/KVM: QEMU v2.3.1 and KVM in v3.12 kernel Available on Intel 64 / AMD 64, IBM System z and POWER 8! Libvirt preferred management layer... 17 QEMU command line supported for access to more features New Features USB 3.0 support Linux and Windows Guest-Agent Hotplug vcpus, memory, character devices and serial ports Improved NUMA Support Support for native RADOS block devices (rbd)
KVM at SUSE Where We Rely on KVM SUSE uses KVM for its mission-critical servers 18 NIS, NFS, webservers, etc. SUSE Studio uses KVM exclusively Build and Test Drive workers 600,000 users; 7,500 image builds each week Open Build Service uses KVM guests Build workers 75,000 package builds per day R&D, QA
Mixed Virtualization Environment? SLE 11 and SLE 12? Migration is supported from product to product+1 SLES12 SLES12SP1 SLES11SP4 SLES12 Xen and KVM? Domains can be converted from Xen to KVM... 19 No live migration between SLE 11 and SLE 12 virt-v2v Supported for SLE 11 or SLE 12 Xen host Conversions are non-destructive as source disk is copied
Virtualization with VMware 20 VMware tools and drivers integrated with SLES 12 SP1 for best out-of-the-box experience open-vm-tools (10.0.0) In-tree kernel modules: vmware_balloon vmw_vmci vmw_vsock vmxnet3 vmw_pvscsi vmwgfx APP APP SLES 12 SLES 12 Tools Drivers Tools Drivers vsphere Fully supported by VMware via L3 support agreement
Virtualization with Microsoft Hyper-V Latest drivers and features supported in SLES SUSE works directly with Microsoft to enhance and improve drivers Drivers are included with SUSE kernels External Linux Integration Services (LIS) package is not required Azure 21 Version numbers (such as LIS 3.5/4.0) are not applicable! SLES12 Linux RDMA image Very low-latency network connection Tuned for HPC workloads
SLES 12 SP1 Supported Guests (1/2) SLES 12 SLES 12 SP1 SLES 11 SP4 SLES 10 SP4 SLED 12 SP1 (technology preview) OES 11 SP1 NetWare PV 6.5 SP8 (32-bit) RHEL 7.1+ (*) RHEL 6.7+ (*) RHEL 5.11+ (*) 22
SLES 12 SP1 Supported Guests (2/2) MS Windows 2012 R2+ MS Windows 2012+ MS Windows 2008 R2 SP1+ MS Windows 2008 SP2+ MS Windows 2003 SP2+ MS Windows 10+ (best effort) MS Windows 8.1+ (best effort) MS Windows 8+ (best effort) MS Windows 7 SP1+ (best effort) 23
SUSE Linux Enterprise Virtual Machine Driver Pack 24 VMDP 2.3 for best guest support Support for SUSE Linux Enterprise Server 12 SP1 Support for Microsoft Windows Server 2012 R2 and Windows 10 Unified driver for easier migration from one hypervisor to another (Xen KVM) Simple host to guest access (Windows Guest Agent) Numerous bug fixes and enhancements
Outlook SLES 12 SP2 Hardware enablement Continuing improvements in hotplug, NUMA, etc... Evaluate management tooling qemu/kvm: post copy live migration Xen: 25 rbd support pvops enabled kernel VM snapshots with btrfs
What about SLES 11 SP4? 26 Hardware enablement (VMCS shadowing, Haswell) Support latest Hyper-V features (Gen2 VMs, host to guest copy) VMware tools integration (9.4.6) Linux guest agent support Amazon EC2-related improvements Update to Xen 4.4
Best Practices Virtualization can be complicated! Normal physical machine issues + virtualization layer Virtualization Best Practices Guide Regularly updated tips directly from SUSE Virtualization developers Recommended CPU and memory features and usage 27 Pinning, NUMA, etc... Block and filesystem recommendations Covers SLES11SP4, SLES12, SLES12SP1 Also see: SLES Virtualization Guide
Virtualization at SUSECon For more information: TUT19351 Virtualization at Scale in SUSE Linux Enterprise Server TUT19951 Using SLES as a Best Guest for Different Virtual Infrastructure Design Patterns 28 Thursday 10:15-11:15 Thursday 9:00-10:00 SLES Virtualization and Containers kiosk in the Technology Showcase
Virtualization Enhancements Container Technologies
Linux Containers Lightweight virtualization Faster provisioning, less downtime Higher virtualization density Flexibility and agility Containerized apps can be deployed anywhere Normal I/O, no congestion Near native performance IBM research: http://ibm.com/search/?q=rc25482
App A App A' Bins/Libs Bins/Libs Guest OS System container Application container Linux Containers App B App B' Bins/Libs Bins/Libs Guest OS Guest OS Kernel Kernel Guest OS Hypervisor (Type 2) Host OS Server 31
Advantages of Linux Containers 32 Lightweight virtualization solution Isolated from the other processes 1 kernel to rule them all Normal I/O Dynamic changes possible without reboot Nested virtualization is not a problem No boot time or very short one Isolate services (e.g. web server, ftp,...) Provide root read-only access Mount host / as read-only Add only needed resources read-write
Why Docker? Shipping applications everywhere Repository of images 33 https://registry.hub.docker.com/ Private repository possible Workflow for containers like git Commits; push / pull DevOps oriented Better disk usage: changes layers Easy to build new images Allows for image versioning
Docker from SUSE, Fully Supported Enterprise-ready Images from trusted source (repository) Full control over your data: on-premise registry, authentication Pre-built Docker images Operational Efficiency Complementary virtualization of Xen/KVM Btrfs support Higher virtualization density Easy-to-use tools YaST interface sle2docker, zypper-docker Portus
YaST module Simple solution to get started with Docker Manage the available Docker images Run Docker images Control of running containers
Portus Authentication: control access to your images Easy of use: navigate and search your catalog of images Collaboration: organize your users with teams Auditing: keep everyting under control
Learn More We listen! Join our Docker beta program: Docker mini-course videos Try SUSE Linux Enterprise Server 12 https://www.suse.com/products/server/download/ SUSE Docker QuickStart https://www.suse.com/promo/sle/docker.html https://www.suse.com/documentation/sles-12/singlehtml/docke rquick/dockerquick.html More information in SUSE Linux Enterprise 12 https://www.suse.com/promo/sle12.html
Docker at SUSECon 2015 TUT19930 - Docker & Portus : A Winning Duo for Your Infrastructure Tue, Nov 3rd, 3:15 PM 4:15 PM 5 Roland Holst kamer HO19929 - Hands on session on Docker Wednesday, Nov 4th, 2:15 PM - 4:15 PM B-Keurzaal Thursday, Nov 5th, 9:00 AM - 11:00 AM B-Keurzaal
41 Corporate Headquarters +49 911 740 53 0 (Worldwide) Join us on: Maxfeldstrasse 5 90409 Nuremberg Germany www.suse.com www.opensuse.org
Unpublished Work of SUSE LLC. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE LLC. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.