Advertisement
Guest User

Untitled

a guest
Apr 19th, 2018
613
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 29.12 KB | None | 0 0
  1. # Master configuration file for the QEMU driver.
  2. # All settings described here are optional - if omitted, sensible
  3. # defaults are used.
  4.  
  5. # Use of TLS requires that x509 certificates be issued. The default is
  6. # to keep them in /etc/pki/qemu. This directory must contain
  7. #
  8. # ca-cert.pem - the CA master certificate
  9. # server-cert.pem - the server certificate signed with ca-cert.pem
  10. # server-key.pem - the server private key
  11. #
  12. # and optionally may contain
  13. #
  14. # dh-params.pem - the DH params configuration file
  15. #
  16. # If the directory does not exist, libvirtd will fail to start. If the
  17. # directory doesn't contain the necessary files, QEMU domains will fail
  18. # to start if they are configured to use TLS.
  19. #
  20. # In order to overwrite the default path alter the following. This path
  21. # definition will be used as the default path for other *_tls_x509_cert_dir
  22. # configuration settings if their default path does not exist or is not
  23. # specifically set.
  24. #
  25. #default_tls_x509_cert_dir = "/etc/pki/qemu"
  26.  
  27.  
  28. # The default TLS configuration only uses certificates for the server
  29. # allowing the client to verify the server's identity and establish
  30. # an encrypted channel.
  31. #
  32. # It is possible to use x509 certificates for authentication too, by
  33. # issuing an x509 certificate to every client who needs to connect.
  34. #
  35. # Enabling this option will reject any client who does not have a
  36. # certificate signed by the CA in /etc/pki/qemu/ca-cert.pem
  37. #
  38. # The default_tls_x509_cert_dir directory must also contain
  39. #
  40. # client-cert.pem - the client certificate signed with the ca-cert.pem
  41. # client-key.pem - the client private key
  42. #
  43. #default_tls_x509_verify = 1
  44.  
  45. #
  46. # Libvirt assumes the server-key.pem file is unencrypted by default.
  47. # To use an encrypted server-key.pem file, the password to decrypt
  48. # the PEM file is required. This can be provided by creating a secret
  49. # object in libvirt and then to uncomment this setting to set the UUID
  50. # of the secret.
  51. #
  52. # NB This default all-zeros UUID will not work. Replace it with the
  53. # output from the UUID for the TLS secret from a 'virsh secret-list'
  54. # command and then uncomment the entry
  55. #
  56. #default_tls_x509_secret_uuid = "00000000-0000-0000-0000-000000000000"
  57.  
  58.  
  59. # VNC is configured to listen on 127.0.0.1 by default.
  60. # To make it listen on all public interfaces, uncomment
  61. # this next option.
  62. #
  63. # NB, strong recommendation to enable TLS + x509 certificate
  64. # verification when allowing public access
  65. #
  66. #vnc_listen = "0.0.0.0"
  67.  
  68. # Enable this option to have VNC served over an automatically created
  69. # unix socket. This prevents unprivileged access from users on the
  70. # host machine, though most VNC clients do not support it.
  71. #
  72. # This will only be enabled for VNC configurations that have listen
  73. # type=address but without any address specified. This setting takes
  74. # preference over vnc_listen.
  75. #
  76. #vnc_auto_unix_socket = 1
  77.  
  78. # Enable use of TLS encryption on the VNC server. This requires
  79. # a VNC client which supports the VeNCrypt protocol extension.
  80. # Examples include vinagre, virt-viewer, virt-manager and vencrypt
  81. # itself. UltraVNC, RealVNC, TightVNC do not support this
  82. #
  83. # It is necessary to setup CA and issue a server certificate
  84. # before enabling this.
  85. #
  86. #vnc_tls = 1
  87.  
  88.  
  89. # In order to override the default TLS certificate location for
  90. # vnc certificates, supply a valid path to the certificate directory.
  91. # If the provided path does not exist, libvirtd will fail to start.
  92. # If the path is not provided, but vnc_tls = 1, then the
  93. # default_tls_x509_cert_dir path will be used.
  94. #
  95. #vnc_tls_x509_cert_dir = "/etc/pki/libvirt-vnc"
  96.  
  97.  
  98. # The default TLS configuration only uses certificates for the server
  99. # allowing the client to verify the server's identity and establish
  100. # an encrypted channel.
  101. #
  102. # It is possible to use x509 certificates for authentication too, by
  103. # issuing an x509 certificate to every client who needs to connect.
  104. #
  105. # Enabling this option will reject any client that does not have a
  106. # ca-cert.pem certificate signed by the CA in the vnc_tls_x509_cert_dir
  107. # (or default_tls_x509_cert_dir) as well as the corresponding client-*.pem
  108. # files described in default_tls_x509_cert_dir.
  109. #
  110. # If this option is not supplied, it will be set to the value of
  111. # "default_tls_x509_verify".
  112. #
  113. #vnc_tls_x509_verify = 1
  114.  
  115.  
  116. # The default VNC password. Only 8 bytes are significant for
  117. # VNC passwords. This parameter is only used if the per-domain
  118. # XML config does not already provide a password. To allow
  119. # access without passwords, leave this commented out. An empty
  120. # string will still enable passwords, but be rejected by QEMU,
  121. # effectively preventing any use of VNC. Obviously change this
  122. # example here before you set this.
  123. #
  124. #vnc_password = "XYZ12345"
  125.  
  126.  
  127. # Enable use of SASL encryption on the VNC server. This requires
  128. # a VNC client which supports the SASL protocol extension.
  129. # Examples include vinagre, virt-viewer and virt-manager
  130. # itself. UltraVNC, RealVNC, TightVNC do not support this
  131. #
  132. # It is necessary to configure /etc/sasl2/qemu.conf to choose
  133. # the desired SASL plugin (eg, GSSPI for Kerberos)
  134. #
  135. #vnc_sasl = 1
  136.  
  137.  
  138. # The default SASL configuration file is located in /etc/sasl2/
  139. # When running libvirtd unprivileged, it may be desirable to
  140. # override the configs in this location. Set this parameter to
  141. # point to the directory, and create a qemu.conf in that location
  142. #
  143. #vnc_sasl_dir = "/some/directory/sasl2"
  144.  
  145.  
  146. # QEMU implements an extension for providing audio over a VNC connection,
  147. # though if your VNC client does not support it, your only chance for getting
  148. # sound output is through regular audio backends. By default, libvirt will
  149. # disable all QEMU sound backends if using VNC, since they can cause
  150. # permissions issues. Enabling this option will make libvirtd honor the
  151. # QEMU_AUDIO_DRV environment variable when using VNC.
  152. #
  153. #vnc_allow_host_audio = 0
  154.  
  155.  
  156.  
  157. # SPICE is configured to listen on 127.0.0.1 by default.
  158. # To make it listen on all public interfaces, uncomment
  159. # this next option.
  160. #
  161. # NB, strong recommendation to enable TLS + x509 certificate
  162. # verification when allowing public access
  163. #
  164. #spice_listen = "0.0.0.0"
  165.  
  166.  
  167. # Enable use of TLS encryption on the SPICE server.
  168. #
  169. # It is necessary to setup CA and issue a server certificate
  170. # before enabling this.
  171. #
  172. #spice_tls = 1
  173.  
  174.  
  175. # In order to override the default TLS certificate location for
  176. # spice certificates, supply a valid path to the certificate directory.
  177. # If the provided path does not exist, libvirtd will fail to start.
  178. # If the path is not provided, but spice_tls = 1, then the
  179. # default_tls_x509_cert_dir path will be used.
  180. #
  181. #spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
  182.  
  183.  
  184. # Enable this option to have SPICE served over an automatically created
  185. # unix socket. This prevents unprivileged access from users on the
  186. # host machine.
  187. #
  188. # This will only be enabled for SPICE configurations that have listen
  189. # type=address but without any address specified. This setting takes
  190. # preference over spice_listen.
  191. #
  192. #spice_auto_unix_socket = 1
  193.  
  194.  
  195. # The default SPICE password. This parameter is only used if the
  196. # per-domain XML config does not already provide a password. To
  197. # allow access without passwords, leave this commented out. An
  198. # empty string will still enable passwords, but be rejected by
  199. # QEMU, effectively preventing any use of SPICE. Obviously change
  200. # this example here before you set this.
  201. #
  202. #spice_password = "XYZ12345"
  203.  
  204.  
  205. # Enable use of SASL encryption on the SPICE server. This requires
  206. # a SPICE client which supports the SASL protocol extension.
  207. #
  208. # It is necessary to configure /etc/sasl2/qemu.conf to choose
  209. # the desired SASL plugin (eg, GSSPI for Kerberos)
  210. #
  211. #spice_sasl = 1
  212.  
  213. # The default SASL configuration file is located in /etc/sasl2/
  214. # When running libvirtd unprivileged, it may be desirable to
  215. # override the configs in this location. Set this parameter to
  216. # point to the directory, and create a qemu.conf in that location
  217. #
  218. #spice_sasl_dir = "/some/directory/sasl2"
  219.  
  220. # Enable use of TLS encryption on the chardev TCP transports.
  221. #
  222. # It is necessary to setup CA and issue a server certificate
  223. # before enabling this.
  224. #
  225. #chardev_tls = 1
  226.  
  227.  
  228. # In order to override the default TLS certificate location for character
  229. # device TCP certificates, supply a valid path to the certificate directory.
  230. # If the provided path does not exist, libvirtd will fail to start.
  231. # If the path is not provided, but chardev_tls = 1, then the
  232. # default_tls_x509_cert_dir path will be used.
  233. #
  234. #chardev_tls_x509_cert_dir = "/etc/pki/libvirt-chardev"
  235.  
  236.  
  237. # The default TLS configuration only uses certificates for the server
  238. # allowing the client to verify the server's identity and establish
  239. # an encrypted channel.
  240. #
  241. # It is possible to use x509 certificates for authentication too, by
  242. # issuing an x509 certificate to every client who needs to connect.
  243. #
  244. # Enabling this option will reject any client that does not have a
  245. # ca-cert.pem certificate signed by the CA in the chardev_tls_x509_cert_dir
  246. # (or default_tls_x509_cert_dir) as well as the corresponding client-*.pem
  247. # files described in default_tls_x509_cert_dir.
  248. #
  249. # If this option is not supplied, it will be set to the value of
  250. # "default_tls_x509_verify".
  251. #
  252. #chardev_tls_x509_verify = 1
  253.  
  254.  
  255. # Uncomment and use the following option to override the default secret
  256. # UUID provided in the default_tls_x509_secret_uuid parameter.
  257. #
  258. # NB This default all-zeros UUID will not work. Replace it with the
  259. # output from the UUID for the TLS secret from a 'virsh secret-list'
  260. # command and then uncomment the entry
  261. #
  262. #chardev_tls_x509_secret_uuid = "00000000-0000-0000-0000-000000000000"
  263.  
  264.  
  265. # Enable use of TLS encryption for all VxHS network block devices that
  266. # don't specifically disable.
  267. #
  268. # When the VxHS network block device server is set up appropriately,
  269. # x509 certificates are required for authentication between the clients
  270. # (qemu processes) and the remote VxHS server.
  271. #
  272. # It is necessary to setup CA and issue the client certificate before
  273. # enabling this.
  274. #
  275. #vxhs_tls = 1
  276.  
  277.  
  278. # In order to override the default TLS certificate location for VxHS
  279. # backed storage, supply a valid path to the certificate directory.
  280. # This is used to authenticate the VxHS block device clients to the VxHS
  281. # server.
  282. #
  283. # If the provided path does not exist, libvirtd will fail to start.
  284. # If the path is not provided, but vxhs_tls = 1, then the
  285. # default_tls_x509_cert_dir path will be used.
  286. #
  287. # VxHS block device clients expect the client certificate and key to be
  288. # present in the certificate directory along with the CA master certificate.
  289. # If using the default environment, default_tls_x509_verify must be configured.
  290. # Since this is only a client the server-key.pem certificate is not needed.
  291. # Thus a VxHS directory must contain the following:
  292. #
  293. # ca-cert.pem - the CA master certificate
  294. # client-cert.pem - the client certificate signed with the ca-cert.pem
  295. # client-key.pem - the client private key
  296. #
  297. #vxhs_tls_x509_cert_dir = "/etc/pki/libvirt-vxhs"
  298.  
  299.  
  300. # In order to override the default TLS certificate location for migration
  301. # certificates, supply a valid path to the certificate directory. If the
  302. # provided path does not exist, libvirtd will fail to start. If the path is
  303. # not provided, but migrate_tls = 1, then the default_tls_x509_cert_dir path
  304. # will be used. Once/if a default certificate is enabled/defined, migration
  305. # will then be able to use the certificate via migration API flags.
  306. #
  307. #migrate_tls_x509_cert_dir = "/etc/pki/libvirt-migrate"
  308.  
  309.  
  310. # The default TLS configuration only uses certificates for the server
  311. # allowing the client to verify the server's identity and establish
  312. # an encrypted channel.
  313. #
  314. # It is possible to use x509 certificates for authentication too, by
  315. # issuing an x509 certificate to every client who needs to connect.
  316. #
  317. # Enabling this option will reject any client that does not have a
  318. # ca-cert.pem certificate signed by the CA in the migrate_tls_x509_cert_dir
  319. # (or default_tls_x509_cert_dir) as well as the corresponding client-*.pem
  320. # files described in default_tls_x509_cert_dir.
  321. #
  322. # If this option is not supplied, it will be set to the value of
  323. # "default_tls_x509_verify".
  324. #
  325. #migrate_tls_x509_verify = 1
  326.  
  327.  
  328. # Uncomment and use the following option to override the default secret
  329. # UUID provided in the default_tls_x509_secret_uuid parameter.
  330. #
  331. # NB This default all-zeros UUID will not work. Replace it with the
  332. # output from the UUID for the TLS secret from a 'virsh secret-list'
  333. # command and then uncomment the entry
  334. #
  335. #migrate_tls_x509_secret_uuid = "00000000-0000-0000-0000-000000000000"
  336.  
  337.  
  338. # By default, if no graphical front end is configured, libvirt will disable
  339. # QEMU audio output since directly talking to alsa/pulseaudio may not work
  340. # with various security settings. If you know what you're doing, enable
  341. # the setting below and libvirt will passthrough the QEMU_AUDIO_DRV
  342. # environment variable when using nographics.
  343. #
  344. #nographics_allow_host_audio = 1
  345.  
  346.  
  347. # Override the port for creating both VNC and SPICE sessions (min).
  348. # This defaults to 5900 and increases for consecutive sessions
  349. # or when ports are occupied, until it hits the maximum.
  350. #
  351. # Minimum must be greater than or equal to 5900 as lower number would
  352. # result into negative vnc display number.
  353. #
  354. # Maximum must be less than 65536, because higher numbers do not make
  355. # sense as a port number.
  356. #
  357. #remote_display_port_min = 5900
  358. #remote_display_port_max = 65535
  359.  
  360. # VNC WebSocket port policies, same rules apply as with remote display
  361. # ports. VNC WebSockets use similar display <-> port mappings, with
  362. # the exception being that ports start from 5700 instead of 5900.
  363. #
  364. #remote_websocket_port_min = 5700
  365. #remote_websocket_port_max = 65535
  366.  
  367. # The default security driver is SELinux. If SELinux is disabled
  368. # on the host, then the security driver will automatically disable
  369. # itself. If you wish to disable QEMU SELinux security driver while
  370. # leaving SELinux enabled for the host in general, then set this
  371. # to 'none' instead. It's also possible to use more than one security
  372. # driver at the same time, for this use a list of names separated by
  373. # comma and delimited by square brackets. For example:
  374. #
  375. # security_driver = [ "selinux", "apparmor" ]
  376. #
  377. # Notes: The DAC security driver is always enabled; as a result, the
  378. # value of security_driver cannot contain "dac". The value "none" is
  379. # a special value; security_driver can be set to that value in
  380. # isolation, but it cannot appear in a list of drivers.
  381. #
  382. #security_driver = "selinux"
  383.  
  384. # If set to non-zero, then the default security labeling
  385. # will make guests confined. If set to zero, then guests
  386. # will be unconfined by default. Defaults to 1.
  387. #security_default_confined = 1
  388.  
  389. # If set to non-zero, then attempts to create unconfined
  390. # guests will be blocked. Defaults to 0.
  391. #security_require_confined = 1
  392.  
  393. # The user for QEMU processes run by the system instance. It can be
  394. # specified as a user name or as a user id. The qemu driver will try to
  395. # parse this value first as a name and then, if the name doesn't exist,
  396. # as a user id.
  397. #
  398. # Since a sequence of digits is a valid user name, a leading plus sign
  399. # can be used to ensure that a user id will not be interpreted as a user
  400. # name.
  401. #
  402. # Some examples of valid values are:
  403. #
  404. # user = "qemu" # A user named "qemu"
  405. # user = "+0" # Super user (uid=0)
  406. # user = "100" # A user named "100" or a user with uid=100
  407. #
  408. user = "ronin"
  409.  
  410. # The group for QEMU processes run by the system instance. It can be
  411. # specified in a similar way to user.
  412. #group = "root"
  413.  
  414. # Whether libvirt should dynamically change file ownership
  415. # to match the configured user/group above. Defaults to 1.
  416. # Set to 0 to disable file ownership changes.
  417. #dynamic_ownership = 1
  418.  
  419.  
  420. # What cgroup controllers to make use of with QEMU guests
  421. #
  422. # - 'cpu' - use for scheduler tunables
  423. # - 'devices' - use for device whitelisting
  424. # - 'memory' - use for memory tunables
  425. # - 'blkio' - use for block devices I/O tunables
  426. # - 'cpuset' - use for CPUs and memory nodes
  427. # - 'cpuacct' - use for CPUs statistics.
  428. #
  429. # NB, even if configured here, they won't be used unless
  430. # the administrator has mounted cgroups, e.g.:
  431. #
  432. # mkdir /dev/cgroup
  433. # mount -t cgroup -o devices,cpu,memory,blkio,cpuset none /dev/cgroup
  434. #
  435. # They can be mounted anywhere, and different controllers
  436. # can be mounted in different locations. libvirt will detect
  437. # where they are located.
  438. #
  439. #cgroup_controllers = [ "cpu", "devices", "memory", "blkio", "cpuset", "cpuacct" ]
  440.  
  441. # This is the basic set of devices allowed / required by
  442. # all virtual machines.
  443. #
  444. # As well as this, any configured block backed disks,
  445. # all sound device, and all PTY devices are allowed.
  446. #
  447. # This will only need setting if newer QEMU suddenly
  448. # wants some device we don't already know about.
  449. #
  450. #cgroup_device_acl = [
  451. # "/dev/null", "/dev/full", "/dev/zero",
  452. # "/dev/random", "/dev/urandom",
  453. # "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
  454. # "/dev/rtc","/dev/hpet"
  455. #]
  456. #
  457. # RDMA migration requires the following extra files to be added to the list:
  458. # "/dev/infiniband/rdma_cm",
  459. # "/dev/infiniband/issm0",
  460. # "/dev/infiniband/issm1",
  461. # "/dev/infiniband/umad0",
  462. # "/dev/infiniband/umad1",
  463. # "/dev/infiniband/uverbs0"
  464.  
  465.  
  466. # The default format for QEMU/KVM guest save images is raw; that is, the
  467. # memory from the domain is dumped out directly to a file. If you have
  468. # guests with a large amount of memory, however, this can take up quite
  469. # a bit of space. If you would like to compress the images while they
  470. # are being saved to disk, you can also set "lzop", "gzip", "bzip2", or "xz"
  471. # for save_image_format. Note that this means you slow down the process of
  472. # saving a domain in order to save disk space; the list above is in descending
  473. # order by performance and ascending order by compression ratio.
  474. #
  475. # save_image_format is used when you use 'virsh save' or 'virsh managedsave'
  476. # at scheduled saving, and it is an error if the specified save_image_format
  477. # is not valid, or the requested compression program can't be found.
  478. #
  479. # dump_image_format is used when you use 'virsh dump' at emergency
  480. # crashdump, and if the specified dump_image_format is not valid, or
  481. # the requested compression program can't be found, this falls
  482. # back to "raw" compression.
  483. #
  484. # snapshot_image_format specifies the compression algorithm of the memory save
  485. # image when an external snapshot of a domain is taken. This does not apply
  486. # on disk image format. It is an error if the specified format isn't valid,
  487. # or the requested compression program can't be found.
  488. #
  489. #save_image_format = "raw"
  490. #dump_image_format = "raw"
  491. #snapshot_image_format = "raw"
  492.  
  493. # When a domain is configured to be auto-dumped when libvirtd receives a
  494. # watchdog event from qemu guest, libvirtd will save dump files in directory
  495. # specified by auto_dump_path. Default value is /var/lib/libvirt/qemu/dump
  496. #
  497. #auto_dump_path = "/var/lib/libvirt/qemu/dump"
  498.  
  499. # When a domain is configured to be auto-dumped, enabling this flag
  500. # has the same effect as using the VIR_DUMP_BYPASS_CACHE flag with the
  501. # virDomainCoreDump API. That is, the system will avoid using the
  502. # file system cache while writing the dump file, but may cause
  503. # slower operation.
  504. #
  505. #auto_dump_bypass_cache = 0
  506.  
  507. # When a domain is configured to be auto-started, enabling this flag
  508. # has the same effect as using the VIR_DOMAIN_START_BYPASS_CACHE flag
  509. # with the virDomainCreateWithFlags API. That is, the system will
  510. # avoid using the file system cache when restoring any managed state
  511. # file, but may cause slower operation.
  512. #
  513. #auto_start_bypass_cache = 0
  514.  
  515. # If provided by the host and a hugetlbfs mount point is configured,
  516. # a guest may request huge page backing. When this mount point is
  517. # unspecified here, determination of a host mount point in /proc/mounts
  518. # will be attempted. Specifying an explicit mount overrides detection
  519. # of the same in /proc/mounts. Setting the mount point to "" will
  520. # disable guest hugepage backing. If desired, multiple mount points can
  521. # be specified at once, separated by comma and enclosed in square
  522. # brackets, for example:
  523. #
  524. # hugetlbfs_mount = ["/dev/hugepages2M", "/dev/hugepages1G"]
  525. #
  526. # The size of huge page served by specific mount point is determined by
  527. # libvirt at the daemon startup.
  528. #
  529. # NB, within these mount points, guests will create memory backing
  530. # files in a location of $MOUNTPOINT/libvirt/qemu
  531. #
  532. #hugetlbfs_mount = "/dev/hugepages"
  533.  
  534.  
  535. # Path to the setuid helper for creating tap devices. This executable
  536. # is used to create <source type='bridge'> interfaces when libvirtd is
  537. # running unprivileged. libvirt invokes the helper directly, instead
  538. # of using "-netdev bridge", for security reasons.
  539. #bridge_helper = "/usr/lib/qemu/qemu-bridge-helper"
  540.  
  541.  
  542.  
  543. # If clear_emulator_capabilities is enabled, libvirt will drop all
  544. # privileged capabilities of the QEmu/KVM emulator. This is enabled by
  545. # default.
  546. #
  547. # Warning: Disabling this option means that a compromised guest can
  548. # exploit the privileges and possibly do damage to the host.
  549. #
  550. #clear_emulator_capabilities = 1
  551.  
  552.  
  553. # If enabled, libvirt will have QEMU set its process name to
  554. # "qemu:VM_NAME", where VM_NAME is the name of the VM. The QEMU
  555. # process will appear as "qemu:VM_NAME" in process listings and
  556. # other system monitoring tools. By default, QEMU does not set
  557. # its process title, so the complete QEMU command (emulator and
  558. # its arguments) appear in process listings.
  559. #
  560. #set_process_name = 1
  561.  
  562.  
  563. # If max_processes is set to a positive integer, libvirt will use
  564. # it to set the maximum number of processes that can be run by qemu
  565. # user. This can be used to override default value set by host OS.
  566. # The same applies to max_files which sets the limit on the maximum
  567. # number of opened files.
  568. #
  569. #max_processes = 0
  570. #max_files = 0
  571.  
  572. # If max_core is set to a non-zero integer, then QEMU will be
  573. # permitted to create core dumps when it crashes, provided its
  574. # RAM size is smaller than the limit set.
  575. #
  576. # Be warned that the core dump will include a full copy of the
  577. # guest RAM, if the 'dump_guest_core' setting has been enabled,
  578. # or if the guest XML contains
  579. #
  580. # <memory dumpcore="on">...guest ram...</memory>
  581. #
  582. # If guest RAM is to be included, ensure the max_core limit
  583. # is set to at least the size of the largest expected guest
  584. # plus another 1GB for any QEMU host side memory mappings.
  585. #
  586. # As a special case it can be set to the string "unlimited" to
  587. # to allow arbitrarily sized core dumps.
  588. #
  589. # By default the core dump size is set to 0 disabling all dumps
  590. #
  591. # Size is a positive integer specifying bytes or the
  592. # string "unlimited"
  593. #
  594. #max_core = "unlimited"
  595.  
  596. # Determine if guest RAM is included in QEMU core dumps. By
  597. # default guest RAM will be excluded if a new enough QEMU is
  598. # present. Setting this to '1' will force guest RAM to always
  599. # be included in QEMU core dumps.
  600. #
  601. # This setting will be ignored if the guest XML has set the
  602. # dumpcore attribute on the <memory> element.
  603. #
  604. #dump_guest_core = 1
  605.  
  606. # mac_filter enables MAC addressed based filtering on bridge ports.
  607. # This currently requires ebtables to be installed.
  608. #
  609. #mac_filter = 1
  610.  
  611.  
  612. # By default, PCI devices below non-ACS switch are not allowed to be assigned
  613. # to guests. By setting relaxed_acs_check to 1 such devices will be allowed to
  614. # be assigned to guests.
  615. #
  616. #relaxed_acs_check = 1
  617.  
  618.  
  619. # If allow_disk_format_probing is enabled, libvirt will probe disk
  620. # images to attempt to identify their format, when not otherwise
  621. # specified in the XML. This is disabled by default.
  622. #
  623. # WARNING: Enabling probing is a security hole in almost all
  624. # deployments. It is strongly recommended that users update their
  625. # guest XML <disk> elements to include <driver type='XXXX'/>
  626. # elements instead of enabling this option.
  627. #
  628. #allow_disk_format_probing = 1
  629.  
  630.  
  631. # In order to prevent accidentally starting two domains that
  632. # share one writable disk, libvirt offers two approaches for
  633. # locking files. The first one is sanlock, the other one,
  634. # virtlockd, is then our own implementation. Accepted values
  635. # are "sanlock" and "lockd".
  636. #
  637. #lock_manager = "lockd"
  638.  
  639.  
  640.  
  641. # Set limit of maximum APIs queued on one domain. All other APIs
  642. # over this threshold will fail on acquiring job lock. Specially,
  643. # setting to zero turns this feature off.
  644. # Note, that job lock is per domain.
  645. #
  646. #max_queued = 0
  647.  
  648. ###################################################################
  649. # Keepalive protocol:
  650. # This allows qemu driver to detect broken connections to remote
  651. # libvirtd during peer-to-peer migration. A keepalive message is
  652. # sent to the daemon after keepalive_interval seconds of inactivity
  653. # to check if the daemon is still responding; keepalive_count is a
  654. # maximum number of keepalive messages that are allowed to be sent
  655. # to the daemon without getting any response before the connection
  656. # is considered broken. In other words, the connection is
  657. # automatically closed approximately after
  658. # keepalive_interval * (keepalive_count + 1) seconds since the last
  659. # message received from the daemon. If keepalive_interval is set to
  660. # -1, qemu driver will not send keepalive requests during
  661. # peer-to-peer migration; however, the remote libvirtd can still
  662. # send them and source libvirtd will send responses. When
  663. # keepalive_count is set to 0, connections will be automatically
  664. # closed after keepalive_interval seconds of inactivity without
  665. # sending any keepalive messages.
  666. #
  667. #keepalive_interval = 5
  668. #keepalive_count = 5
  669.  
  670.  
  671.  
  672. # Use seccomp syscall whitelisting in QEMU.
  673. # 1 = on, 0 = off, -1 = use QEMU default
  674. # Defaults to -1.
  675. #
  676. #seccomp_sandbox = 1
  677.  
  678.  
  679. # Override the listen address for all incoming migrations. Defaults to
  680. # 0.0.0.0, or :: if both host and qemu are capable of IPv6.
  681. #migration_address = "0.0.0.0"
  682.  
  683.  
  684. # The default hostname or IP address which will be used by a migration
  685. # source for transferring migration data to this host. The migration
  686. # source has to be able to resolve this hostname and connect to it so
  687. # setting "localhost" will not work. By default, the host's configured
  688. # hostname is used.
  689. #migration_host = "host.example.com"
  690.  
  691.  
  692. # Override the port range used for incoming migrations.
  693. #
  694. # Minimum must be greater than 0, however when QEMU is not running as root,
  695. # setting the minimum to be lower than 1024 will not work.
  696. #
  697. # Maximum must not be greater than 65535.
  698. #
  699. #migration_port_min = 49152
  700. #migration_port_max = 49215
  701.  
  702.  
  703.  
  704. # Timestamp QEMU's log messages (if QEMU supports it)
  705. #
  706. # Defaults to 1.
  707. #
  708. #log_timestamp = 0
  709.  
  710.  
  711. # Location of master nvram file
  712. #
  713. # When a domain is configured to use UEFI instead of standard
  714. # BIOS it may use a separate storage for UEFI variables. If
  715. # that's the case libvirt creates the variable store per domain
  716. # using this master file as image. Each UEFI firmware can,
  717. # however, have different variables store. Therefore the nvram is
  718. # a list of strings when a single item is in form of:
  719. # ${PATH_TO_UEFI_FW}:${PATH_TO_UEFI_VARS}.
  720. # Later, when libvirt creates per domain variable store, this list is
  721. # searched for the master image. The UEFI firmware can be called
  722. # differently for different guest architectures. For instance, it's OVMF
  723. # for x86_64 and i686, but it's AAVMF for aarch64. The libvirt default
  724. # follows this scheme.
  725. #nvram = [
  726. # "/usr/share/OVMF/OVMF_CODE.fd:/usr/share/OVMF/OVMF_VARS.fd",
  727. # "/usr/share/OVMF/OVMF_CODE.secboot.fd:/usr/share/OVMF/OVMF_VARS.fd",
  728. # "/usr/share/AAVMF/AAVMF_CODE.fd:/usr/share/AAVMF/AAVMF_VARS.fd",
  729. # "/usr/share/AAVMF/AAVMF32_CODE.fd:/usr/share/AAVMF/AAVMF32_VARS.fd"
  730.  
  731. nvram = [
  732. "/usr/share/ovmf/x64/OVMF_CODE.fd:/usr/share/ovmf/x64/OVMF_VARS.fd"
  733. ]
  734. # The backend to use for handling stdout/stderr output from
  735. # QEMU processes.
  736. #
  737. # 'file': QEMU writes directly to a plain file. This is the
  738. # historical default, but allows QEMU to inflict a
  739. # denial of service attack on the host by exhausting
  740. # filesystem space
  741. #
  742. # 'logd': QEMU writes to a pipe provided by virtlogd daemon.
  743. # This is the current default, providing protection
  744. # against denial of service by performing log file
  745. # rollover when a size limit is hit.
  746. #
  747. #stdio_handler = "logd"
  748.  
  749. # QEMU gluster libgfapi log level, debug levels are 0-9, with 9 being the
  750. # most verbose, and 0 representing no debugging output.
  751. #
  752. # The current logging levels defined in the gluster GFAPI are:
  753. #
  754. # 0 - None
  755. # 1 - Emergency
  756. # 2 - Alert
  757. # 3 - Critical
  758. # 4 - Error
  759. # 5 - Warning
  760. # 6 - Notice
  761. # 7 - Info
  762. # 8 - Debug
  763. # 9 - Trace
  764. #
  765. # Defaults to 4
  766. #
  767. #gluster_debug_level = 9
  768.  
  769. # To enhance security, QEMU driver is capable of creating private namespaces
  770. # for each domain started. Well, so far only "mount" namespace is supported. If
  771. # enabled it means qemu process is unable to see all the devices on the system,
  772. # only those configured for the domain in question. Libvirt then manages
  773. # devices entries throughout the domain lifetime. This namespace is turned on
  774. # by default.
  775. #namespaces = [ "mount" ]
  776.  
  777. # This directory is used for memoryBacking source if configured as file.
  778. # NOTE: big files will be stored here
  779. #memory_backing_dir = "/var/lib/libvirt/qemu/ram"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement