Feeds

Red Hat cranks virtualization power play

Move aside, Microsoft, Citrix, VMware...

High performance access to file storage

Inaugural KVM

And to that end, the first KVM-based product to come out of Red Hat will be called the Red Hat Enterprise Virtualization hypervisor. Thadani said it would be able to span up to 96 cores and 1 TB of main memory in a single system image - which is the top-end for current "Dunnington" Xeon 7400-based servers from IBM, Unisys, and NEC.

He said he would also allow a single guest virtual machine partition on a host to span up to 16 cores and up to 64 GB of main memory.This is significant, since VMware's ESX Server hypervisor can only span across four cores in a single guest, and XenServer, the commercial hypervisor from Citrix based on the Xen hypervisor, can only span eight cores per guest.

Red Hat says is can get its KVM-based hypervisor - which will be sold as a standalone product - down to a 64 MB memory footprint, including the RHEL kernel and the KVM hypervisor. It will include the VirtIO drivers and Libvirt and CIM management interfaces that are becoming industry standards for x64 virtualization. The RHEV hypervisor will also have memory page sharing, which allows more VMs to be crammed onto a server, and will include SELinux security features too.

RHEV will support Linux and Windows guests, and thus far, Red Hat is not saying anything more about details. But Windows Server 2003 and 2008 seem to be required, as will RHEL 5 and probably SUSE Linux Enterprise Server 10 from Novell.

Red Hat is also cooking up something it is calling RHEV Manager for Servers, which is a virtualization management tool that uses a search engine rather than a hierarchical, drill-down window interface that will allow system administrators to cope with thousands or tens of thousands of virtual machines. This management tool will allow admins to manage VM images, cluster them for high availability, live migrate them around the network, set power consumption limits for VMs, monitor their running, and provide audit trails as they are being created, deployed, and altered in a production environment.

A third KVM-related product is called RHEV Manager for Desktops, which is a commercialized version of the virtual desktop infrastructure (VDI) product that Qumranet had delivered as SolidICE back in early 2008. The VDI approach puts virtual desktop slices back on VMs in the servers in the data center (in this case, running KVM as the hypervisor) and the servers stream desktop applications down to thin clients or PCs on end user desktops.

Qumranet had created software that allowed efficient two-way streaming of audio and video between clients and servers in the VDI configuration and that allowed a thin client to give the look and feel of a local PC. This is what end users want, and the lack of this look and feel is why VDI has not taken off in the market despite years of sales pitches.

Red Hat is trying to position the standalone RHEV as a product intended for customers who don't have a lot of Linux experience but who might want to virtualize Linux and Windows servers, while the KVM embedded inside RHEL 5.4 will be pitched to big Linux shops that want to manage large numbers of virtualized servers. What is not obvious to me is why you need Xen or KVM bundled inside RHEL if you have a free-standing KVM hypervisor and tools to deploy it on desktops or servers and manage either Windows or Linux instances. This sounds more like a legacy packing and pricing issue than a technical one.

Thadani says that RHEV is based on KVM and the Linux kernel as implemented by Red Hat inside RHEL and will therefore be an open source product, but that some of the management tools that it got through the Qumranet acquisition are not currently open source. But, he added, over time these will be made open source as Red Hat "develops its own cross-platform solution."

Red Hat also wanted to make sure that RHEL customers did not get the wrong impression and think that customers using Xen will be left in the lurch. "We are fully committed to support Xen through the lifecycle of RHEL 5," explained Thadani. This includes adding new features, putting out bug fixes, providing long-term maintenance, and so forth. "However, our strategic direction is KVM, and we will be making tools available to companies to transition them from Xen to KVM."

Pricing and packaging specifics of the forthcoming products were not announced, but the first KVM-related products will debut in about three months. That should be the KVM hypervisor embedded in RHEL 5.4, if it takes about six months to rev the operating system. ®

High performance access to file storage

More from The Register

next story
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.