Advertisement
Guest User

Untitled

a guest
Mar 30th, 2018
545
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 29.20 KB | None | 0 0
  1. [root@darkstar ~]# cat /etc/libvirt/qemu.conf
  2. # Master configuration file for the QEMU driver.
  3. # All settings described here are optional - if omitted, sensible
  4. # defaults are used.
  5.  
  6. nvram = [
  7. "/usr/share/ovmf/x64/OVMF_CODE.fd:/usr/share/ovmf/x64/OVMF_VARS.fd"
  8. ]
  9.  
  10.  
  11.  
  12. # Use of TLS requires that x509 certificates be issued. The default is
  13. # to keep them in /etc/pki/qemu. This directory must contain
  14. #
  15. # ca-cert.pem - the CA master certificate
  16. # server-cert.pem - the server certificate signed with ca-cert.pem
  17. # server-key.pem - the server private key
  18. #
  19. # and optionally may contain
  20. #
  21. # dh-params.pem - the DH params configuration file
  22. #
  23. # If the directory does not exist, libvirtd will fail to start. If the
  24. # directory doesn't contain the necessary files, QEMU domains will fail
  25. # to start if they are configured to use TLS.
  26. #
  27. # In order to overwrite the default path alter the following. This path
  28. # definition will be used as the default path for other *_tls_x509_cert_dir
  29. # configuration settings if their default path does not exist or is not
  30. # specifically set.
  31. #
  32. #default_tls_x509_cert_dir = "/etc/pki/qemu"
  33.  
  34.  
  35. # The default TLS configuration only uses certificates for the server
  36. # allowing the client to verify the server's identity and establish
  37. # an encrypted channel.
  38. #
  39. # It is possible to use x509 certificates for authentication too, by
  40. # issuing an x509 certificate to every client who needs to connect.
  41. #
  42. # Enabling this option will reject any client who does not have a
  43. # certificate signed by the CA in /etc/pki/qemu/ca-cert.pem
  44. #
  45. # The default_tls_x509_cert_dir directory must also contain
  46. #
  47. # client-cert.pem - the client certificate signed with the ca-cert.pem
  48. # client-key.pem - the client private key
  49. #
  50. #default_tls_x509_verify = 1
  51.  
  52. #
  53. # Libvirt assumes the server-key.pem file is unencrypted by default.
  54. # To use an encrypted server-key.pem file, the password to decrypt
  55. # the PEM file is required. This can be provided by creating a secret
  56. # object in libvirt and then to uncomment this setting to set the UUID
  57. # of the secret.
  58. #
  59. # NB This default all-zeros UUID will not work. Replace it with the
  60. # output from the UUID for the TLS secret from a 'virsh secret-list'
  61. # command and then uncomment the entry
  62. #
  63. #default_tls_x509_secret_uuid = "00000000-0000-0000-0000-000000000000"
  64.  
  65.  
  66. # VNC is configured to listen on 127.0.0.1 by default.
  67. # To make it listen on all public interfaces, uncomment
  68. # this next option.
  69. #
  70. # NB, strong recommendation to enable TLS + x509 certificate
  71. # verification when allowing public access
  72. #
  73. #vnc_listen = "0.0.0.0"
  74.  
  75. # Enable this option to have VNC served over an automatically created
  76. # unix socket. This prevents unprivileged access from users on the
  77. # host machine, though most VNC clients do not support it.
  78. #
  79. # This will only be enabled for VNC configurations that have listen
  80. # type=address but without any address specified. This setting takes
  81. # preference over vnc_listen.
  82. #
  83. #vnc_auto_unix_socket = 1
  84.  
  85. # Enable use of TLS encryption on the VNC server. This requires
  86. # a VNC client which supports the VeNCrypt protocol extension.
  87. # Examples include vinagre, virt-viewer, virt-manager and vencrypt
  88. # itself. UltraVNC, RealVNC, TightVNC do not support this
  89. #
  90. # It is necessary to setup CA and issue a server certificate
  91. # before enabling this.
  92. #
  93. #vnc_tls = 1
  94.  
  95.  
  96. # In order to override the default TLS certificate location for
  97. # vnc certificates, supply a valid path to the certificate directory.
  98. # If the provided path does not exist, libvirtd will fail to start.
  99. # If the path is not provided, but vnc_tls = 1, then the
  100. # default_tls_x509_cert_dir path will be used.
  101. #
  102. #vnc_tls_x509_cert_dir = "/etc/pki/libvirt-vnc"
  103.  
  104.  
  105. # The default TLS configuration only uses certificates for the server
  106. # allowing the client to verify the server's identity and establish
  107. # an encrypted channel.
  108. #
  109. # It is possible to use x509 certificates for authentication too, by
  110. # issuing an x509 certificate to every client who needs to connect.
  111. #
  112. # Enabling this option will reject any client that does not have a
  113. # ca-cert.pem certificate signed by the CA in the vnc_tls_x509_cert_dir
  114. # (or default_tls_x509_cert_dir) as well as the corresponding client-*.pem
  115. # files described in default_tls_x509_cert_dir.
  116. #
  117. # If this option is not supplied, it will be set to the value of
  118. # "default_tls_x509_verify".
  119. #
  120. #vnc_tls_x509_verify = 1
  121.  
  122.  
  123. # The default VNC password. Only 8 bytes are significant for
  124. # VNC passwords. This parameter is only used if the per-domain
  125. # XML config does not already provide a password. To allow
  126. # access without passwords, leave this commented out. An empty
  127. # string will still enable passwords, but be rejected by QEMU,
  128. # effectively preventing any use of VNC. Obviously change this
  129. # example here before you set this.
  130. #
  131. #vnc_password = "XYZ12345"
  132.  
  133.  
  134. # Enable use of SASL encryption on the VNC server. This requires
  135. # a VNC client which supports the SASL protocol extension.
  136. # Examples include vinagre, virt-viewer and virt-manager
  137. # itself. UltraVNC, RealVNC, TightVNC do not support this
  138. #
  139. # It is necessary to configure /etc/sasl2/qemu.conf to choose
  140. # the desired SASL plugin (eg, GSSPI for Kerberos)
  141. #
  142. #vnc_sasl = 1
  143.  
  144.  
  145. # The default SASL configuration file is located in /etc/sasl2/
  146. # When running libvirtd unprivileged, it may be desirable to
  147. # override the configs in this location. Set this parameter to
  148. # point to the directory, and create a qemu.conf in that location
  149. #
  150. #vnc_sasl_dir = "/some/directory/sasl2"
  151.  
  152.  
  153. # QEMU implements an extension for providing audio over a VNC connection,
  154. # though if your VNC client does not support it, your only chance for getting
  155. # sound output is through regular audio backends. By default, libvirt will
  156. # disable all QEMU sound backends if using VNC, since they can cause
  157. # permissions issues. Enabling this option will make libvirtd honor the
  158. # QEMU_AUDIO_DRV environment variable when using VNC.
  159. #
  160. #vnc_allow_host_audio = 0
  161.  
  162.  
  163.  
  164. # SPICE is configured to listen on 127.0.0.1 by default.
  165. # To make it listen on all public interfaces, uncomment
  166. # this next option.
  167. #
  168. # NB, strong recommendation to enable TLS + x509 certificate
  169. # verification when allowing public access
  170. #
  171. #spice_listen = "0.0.0.0"
  172.  
  173.  
  174. # Enable use of TLS encryption on the SPICE server.
  175. #
  176. # It is necessary to setup CA and issue a server certificate
  177. # before enabling this.
  178. #
  179. #spice_tls = 1
  180.  
  181.  
  182. # In order to override the default TLS certificate location for
  183. # spice certificates, supply a valid path to the certificate directory.
  184. # If the provided path does not exist, libvirtd will fail to start.
  185. # If the path is not provided, but spice_tls = 1, then the
  186. # default_tls_x509_cert_dir path will be used.
  187. #
  188. #spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
  189.  
  190.  
  191. # Enable this option to have SPICE served over an automatically created
  192. # unix socket. This prevents unprivileged access from users on the
  193. # host machine.
  194. #
  195. # This will only be enabled for SPICE configurations that have listen
  196. # type=address but without any address specified. This setting takes
  197. # preference over spice_listen.
  198. #
  199. #spice_auto_unix_socket = 1
  200.  
  201.  
  202. # The default SPICE password. This parameter is only used if the
  203. # per-domain XML config does not already provide a password. To
  204. # allow access without passwords, leave this commented out. An
  205. # empty string will still enable passwords, but be rejected by
  206. # QEMU, effectively preventing any use of SPICE. Obviously change
  207. # this example here before you set this.
  208. #
  209. #spice_password = "XYZ12345"
  210.  
  211.  
  212. # Enable use of SASL encryption on the SPICE server. This requires
  213. # a SPICE client which supports the SASL protocol extension.
  214. #
  215. # It is necessary to configure /etc/sasl2/qemu.conf to choose
  216. # the desired SASL plugin (eg, GSSPI for Kerberos)
  217. #
  218. #spice_sasl = 1
  219.  
  220. # The default SASL configuration file is located in /etc/sasl2/
  221. # When running libvirtd unprivileged, it may be desirable to
  222. # override the configs in this location. Set this parameter to
  223. # point to the directory, and create a qemu.conf in that location
  224. #
  225. #spice_sasl_dir = "/some/directory/sasl2"
  226.  
  227. # Enable use of TLS encryption on the chardev TCP transports.
  228. #
  229. # It is necessary to setup CA and issue a server certificate
  230. # before enabling this.
  231. #
  232. #chardev_tls = 1
  233.  
  234.  
  235. # In order to override the default TLS certificate location for character
  236. # device TCP certificates, supply a valid path to the certificate directory.
  237. # If the provided path does not exist, libvirtd will fail to start.
  238. # If the path is not provided, but chardev_tls = 1, then the
  239. # default_tls_x509_cert_dir path will be used.
  240. #
  241. #chardev_tls_x509_cert_dir = "/etc/pki/libvirt-chardev"
  242.  
  243.  
  244. # The default TLS configuration only uses certificates for the server
  245. # allowing the client to verify the server's identity and establish
  246. # an encrypted channel.
  247. #
  248. # It is possible to use x509 certificates for authentication too, by
  249. # issuing an x509 certificate to every client who needs to connect.
  250. #
  251. # Enabling this option will reject any client that does not have a
  252. # ca-cert.pem certificate signed by the CA in the chardev_tls_x509_cert_dir
  253. # (or default_tls_x509_cert_dir) as well as the corresponding client-*.pem
  254. # files described in default_tls_x509_cert_dir.
  255. #
  256. # If this option is not supplied, it will be set to the value of
  257. # "default_tls_x509_verify".
  258. #
  259. #chardev_tls_x509_verify = 1
  260.  
  261.  
  262. # Uncomment and use the following option to override the default secret
  263. # UUID provided in the default_tls_x509_secret_uuid parameter.
  264. #
  265. # NB This default all-zeros UUID will not work. Replace it with the
  266. # output from the UUID for the TLS secret from a 'virsh secret-list'
  267. # command and then uncomment the entry
  268. #
  269. #chardev_tls_x509_secret_uuid = "00000000-0000-0000-0000-000000000000"
  270.  
  271.  
  272. # Enable use of TLS encryption for all VxHS network block devices that
  273. # don't specifically disable.
  274. #
  275. # When the VxHS network block device server is set up appropriately,
  276. # x509 certificates are required for authentication between the clients
  277. # (qemu processes) and the remote VxHS server.
  278. #
  279. # It is necessary to setup CA and issue the client certificate before
  280. # enabling this.
  281. #
  282. #vxhs_tls = 1
  283.  
  284.  
  285. # In order to override the default TLS certificate location for VxHS
  286. # backed storage, supply a valid path to the certificate directory.
  287. # This is used to authenticate the VxHS block device clients to the VxHS
  288. # server.
  289. #
  290. # If the provided path does not exist, libvirtd will fail to start.
  291. # If the path is not provided, but vxhs_tls = 1, then the
  292. # default_tls_x509_cert_dir path will be used.
  293. #
  294. # VxHS block device clients expect the client certificate and key to be
  295. # present in the certificate directory along with the CA master certificate.
  296. # If using the default environment, default_tls_x509_verify must be configured.
  297. # Since this is only a client the server-key.pem certificate is not needed.
  298. # Thus a VxHS directory must contain the following:
  299. #
  300. # ca-cert.pem - the CA master certificate
  301. # client-cert.pem - the client certificate signed with the ca-cert.pem
  302. # client-key.pem - the client private key
  303. #
  304. #vxhs_tls_x509_cert_dir = "/etc/pki/libvirt-vxhs"
  305.  
  306.  
  307. # In order to override the default TLS certificate location for migration
  308. # certificates, supply a valid path to the certificate directory. If the
  309. # provided path does not exist, libvirtd will fail to start. If the path is
  310. # not provided, but migrate_tls = 1, then the default_tls_x509_cert_dir path
  311. # will be used. Once/if a default certificate is enabled/defined, migration
  312. # will then be able to use the certificate via migration API flags.
  313. #
  314. #migrate_tls_x509_cert_dir = "/etc/pki/libvirt-migrate"
  315.  
  316.  
  317. # The default TLS configuration only uses certificates for the server
  318. # allowing the client to verify the server's identity and establish
  319. # an encrypted channel.
  320. #
  321. # It is possible to use x509 certificates for authentication too, by
  322. # issuing an x509 certificate to every client who needs to connect.
  323. #
  324. # Enabling this option will reject any client that does not have a
  325. # ca-cert.pem certificate signed by the CA in the migrate_tls_x509_cert_dir
  326. # (or default_tls_x509_cert_dir) as well as the corresponding client-*.pem
  327. # files described in default_tls_x509_cert_dir.
  328. #
  329. # If this option is not supplied, it will be set to the value of
  330. # "default_tls_x509_verify".
  331. #
  332. #migrate_tls_x509_verify = 1
  333.  
  334.  
  335. # Uncomment and use the following option to override the default secret
  336. # UUID provided in the default_tls_x509_secret_uuid parameter.
  337. #
  338. # NB This default all-zeros UUID will not work. Replace it with the
  339. # output from the UUID for the TLS secret from a 'virsh secret-list'
  340. # command and then uncomment the entry
  341. #
  342. #migrate_tls_x509_secret_uuid = "00000000-0000-0000-0000-000000000000"
  343.  
  344.  
  345. # By default, if no graphical front end is configured, libvirt will disable
  346. # QEMU audio output since directly talking to alsa/pulseaudio may not work
  347. # with various security settings. If you know what you're doing, enable
  348. # the setting below and libvirt will passthrough the QEMU_AUDIO_DRV
  349. # environment variable when using nographics.
  350. #
  351. #nographics_allow_host_audio = 1
  352.  
  353.  
  354. # Override the port for creating both VNC and SPICE sessions (min).
  355. # This defaults to 5900 and increases for consecutive sessions
  356. # or when ports are occupied, until it hits the maximum.
  357. #
  358. # Minimum must be greater than or equal to 5900 as lower number would
  359. # result into negative vnc display number.
  360. #
  361. # Maximum must be less than 65536, because higher numbers do not make
  362. # sense as a port number.
  363. #
  364. #remote_display_port_min = 5900
  365. #remote_display_port_max = 65535
  366.  
  367. # VNC WebSocket port policies, same rules apply as with remote display
  368. # ports. VNC WebSockets use similar display <-> port mappings, with
  369. # the exception being that ports start from 5700 instead of 5900.
  370. #
  371. #remote_websocket_port_min = 5700
  372. #remote_websocket_port_max = 65535
  373.  
  374. # The default security driver is SELinux. If SELinux is disabled
  375. # on the host, then the security driver will automatically disable
  376. # itself. If you wish to disable QEMU SELinux security driver while
  377. # leaving SELinux enabled for the host in general, then set this
  378. # to 'none' instead. It's also possible to use more than one security
  379. # driver at the same time, for this use a list of names separated by
  380. # comma and delimited by square brackets. For example:
  381. #
  382. # security_driver = [ "selinux", "apparmor" ]
  383. #
  384. # Notes: The DAC security driver is always enabled; as a result, the
  385. # value of security_driver cannot contain "dac". The value "none" is
  386. # a special value; security_driver can be set to that value in
  387. # isolation, but it cannot appear in a list of drivers.
  388. #
  389. #security_driver = "selinux"
  390.  
  391. # If set to non-zero, then the default security labeling
  392. # will make guests confined. If set to zero, then guests
  393. # will be unconfined by default. Defaults to 1.
  394. #security_default_confined = 1
  395.  
  396. # If set to non-zero, then attempts to create unconfined
  397. # guests will be blocked. Defaults to 0.
  398. #security_require_confined = 1
  399.  
  400. # The user for QEMU processes run by the system instance. It can be
  401. # specified as a user name or as a user id. The qemu driver will try to
  402. # parse this value first as a name and then, if the name doesn't exist,
  403. # as a user id.
  404. #
  405. # Since a sequence of digits is a valid user name, a leading plus sign
  406. # can be used to ensure that a user id will not be interpreted as a user
  407. # name.
  408. #
  409. # Some examples of valid values are:
  410. #
  411. # user = "qemu" # A user named "qemu"
  412. # user = "+0" # Super user (uid=0)
  413. # user = "100" # A user named "100" or a user with uid=100
  414. #
  415. #user = "root"
  416.  
  417. # The group for QEMU processes run by the system instance. It can be
  418. # specified in a similar way to user.
  419. #group = "root"
  420.  
  421. # Whether libvirt should dynamically change file ownership
  422. # to match the configured user/group above. Defaults to 1.
  423. # Set to 0 to disable file ownership changes.
  424. #dynamic_ownership = 1
  425.  
  426.  
  427. # What cgroup controllers to make use of with QEMU guests
  428. #
  429. # - 'cpu' - use for scheduler tunables
  430. # - 'devices' - use for device whitelisting
  431. # - 'memory' - use for memory tunables
  432. # - 'blkio' - use for block devices I/O tunables
  433. # - 'cpuset' - use for CPUs and memory nodes
  434. # - 'cpuacct' - use for CPUs statistics.
  435. #
  436. # NB, even if configured here, they won't be used unless
  437. # the administrator has mounted cgroups, e.g.:
  438. #
  439. # mkdir /dev/cgroup
  440. # mount -t cgroup -o devices,cpu,memory,blkio,cpuset none /dev/cgroup
  441. #
  442. # They can be mounted anywhere, and different controllers
  443. # can be mounted in different locations. libvirt will detect
  444. # where they are located.
  445. #
  446. #cgroup_controllers = [ "cpu", "devices", "memory", "blkio", "cpuset", "cpuacct" ]
  447.  
  448. # This is the basic set of devices allowed / required by
  449. # all virtual machines.
  450. #
  451. # As well as this, any configured block backed disks,
  452. # all sound device, and all PTY devices are allowed.
  453. #
  454. # This will only need setting if newer QEMU suddenly
  455. # wants some device we don't already know about.
  456. #
  457. #cgroup_device_acl = [
  458. # "/dev/null", "/dev/full", "/dev/zero",
  459. # "/dev/random", "/dev/urandom",
  460. # "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
  461. # "/dev/rtc","/dev/hpet"
  462. #]
  463. #
  464. # RDMA migration requires the following extra files to be added to the list:
  465. # "/dev/infiniband/rdma_cm",
  466. # "/dev/infiniband/issm0",
  467. # "/dev/infiniband/issm1",
  468. # "/dev/infiniband/umad0",
  469. # "/dev/infiniband/umad1",
  470. # "/dev/infiniband/uverbs0"
  471.  
  472.  
  473. # The default format for QEMU/KVM guest save images is raw; that is, the
  474. # memory from the domain is dumped out directly to a file. If you have
  475. # guests with a large amount of memory, however, this can take up quite
  476. # a bit of space. If you would like to compress the images while they
  477. # are being saved to disk, you can also set "lzop", "gzip", "bzip2", or "xz"
  478. # for save_image_format. Note that this means you slow down the process of
  479. # saving a domain in order to save disk space; the list above is in descending
  480. # order by performance and ascending order by compression ratio.
  481. #
  482. # save_image_format is used when you use 'virsh save' or 'virsh managedsave'
  483. # at scheduled saving, and it is an error if the specified save_image_format
  484. # is not valid, or the requested compression program can't be found.
  485. #
  486. # dump_image_format is used when you use 'virsh dump' at emergency
  487. # crashdump, and if the specified dump_image_format is not valid, or
  488. # the requested compression program can't be found, this falls
  489. # back to "raw" compression.
  490. #
  491. # snapshot_image_format specifies the compression algorithm of the memory save
  492. # image when an external snapshot of a domain is taken. This does not apply
  493. # on disk image format. It is an error if the specified format isn't valid,
  494. # or the requested compression program can't be found.
  495. #
  496. #save_image_format = "raw"
  497. #dump_image_format = "raw"
  498. #snapshot_image_format = "raw"
  499.  
  500. # When a domain is configured to be auto-dumped when libvirtd receives a
  501. # watchdog event from qemu guest, libvirtd will save dump files in directory
  502. # specified by auto_dump_path. Default value is /var/lib/libvirt/qemu/dump
  503. #
  504. #auto_dump_path = "/var/lib/libvirt/qemu/dump"
  505.  
  506. # When a domain is configured to be auto-dumped, enabling this flag
  507. # has the same effect as using the VIR_DUMP_BYPASS_CACHE flag with the
  508. # virDomainCoreDump API. That is, the system will avoid using the
  509. # file system cache while writing the dump file, but may cause
  510. # slower operation.
  511. #
  512. #auto_dump_bypass_cache = 0
  513.  
  514. # When a domain is configured to be auto-started, enabling this flag
  515. # has the same effect as using the VIR_DOMAIN_START_BYPASS_CACHE flag
  516. # with the virDomainCreateWithFlags API. That is, the system will
  517. # avoid using the file system cache when restoring any managed state
  518. # file, but may cause slower operation.
  519. #
  520. #auto_start_bypass_cache = 0
  521.  
  522. # If provided by the host and a hugetlbfs mount point is configured,
  523. # a guest may request huge page backing. When this mount point is
  524. # unspecified here, determination of a host mount point in /proc/mounts
  525. # will be attempted. Specifying an explicit mount overrides detection
  526. # of the same in /proc/mounts. Setting the mount point to "" will
  527. # disable guest hugepage backing. If desired, multiple mount points can
  528. # be specified at once, separated by comma and enclosed in square
  529. # brackets, for example:
  530. #
  531. # hugetlbfs_mount = ["/dev/hugepages2M", "/dev/hugepages1G"]
  532. #
  533. # The size of huge page served by specific mount point is determined by
  534. # libvirt at the daemon startup.
  535. #
  536. # NB, within these mount points, guests will create memory backing
  537. # files in a location of $MOUNTPOINT/libvirt/qemu
  538. #
  539. #hugetlbfs_mount = "/dev/hugepages"
  540.  
  541.  
  542. # Path to the setuid helper for creating tap devices. This executable
  543. # is used to create <source type='bridge'> interfaces when libvirtd is
  544. # running unprivileged. libvirt invokes the helper directly, instead
  545. # of using "-netdev bridge", for security reasons.
  546. #bridge_helper = "/usr/lib/qemu/qemu-bridge-helper"
  547.  
  548.  
  549.  
  550. # If clear_emulator_capabilities is enabled, libvirt will drop all
  551. # privileged capabilities of the QEmu/KVM emulator. This is enabled by
  552. # default.
  553. #
  554. # Warning: Disabling this option means that a compromised guest can
  555. # exploit the privileges and possibly do damage to the host.
  556. #
  557. #clear_emulator_capabilities = 1
  558.  
  559.  
  560. # If enabled, libvirt will have QEMU set its process name to
  561. # "qemu:VM_NAME", where VM_NAME is the name of the VM. The QEMU
  562. # process will appear as "qemu:VM_NAME" in process listings and
  563. # other system monitoring tools. By default, QEMU does not set
  564. # its process title, so the complete QEMU command (emulator and
  565. # its arguments) appear in process listings.
  566. #
  567. #set_process_name = 1
  568.  
  569.  
  570. # If max_processes is set to a positive integer, libvirt will use
  571. # it to set the maximum number of processes that can be run by qemu
  572. # user. This can be used to override default value set by host OS.
  573. # The same applies to max_files which sets the limit on the maximum
  574. # number of opened files.
  575. #
  576. #max_processes = 0
  577. #max_files = 0
  578.  
  579. # If max_core is set to a non-zero integer, then QEMU will be
  580. # permitted to create core dumps when it crashes, provided its
  581. # RAM size is smaller than the limit set.
  582. #
  583. # Be warned that the core dump will include a full copy of the
  584. # guest RAM, if the 'dump_guest_core' setting has been enabled,
  585. # or if the guest XML contains
  586. #
  587. # <memory dumpcore="on">...guest ram...</memory>
  588. #
  589. # If guest RAM is to be included, ensure the max_core limit
  590. # is set to at least the size of the largest expected guest
  591. # plus another 1GB for any QEMU host side memory mappings.
  592. #
  593. # As a special case it can be set to the string "unlimited" to
  594. # to allow arbitrarily sized core dumps.
  595. #
  596. # By default the core dump size is set to 0 disabling all dumps
  597. #
  598. # Size is a positive integer specifying bytes or the
  599. # string "unlimited"
  600. #
  601. #max_core = "unlimited"
  602.  
  603. # Determine if guest RAM is included in QEMU core dumps. By
  604. # default guest RAM will be excluded if a new enough QEMU is
  605. # present. Setting this to '1' will force guest RAM to always
  606. # be included in QEMU core dumps.
  607. #
  608. # This setting will be ignored if the guest XML has set the
  609. # dumpcore attribute on the <memory> element.
  610. #
  611. #dump_guest_core = 1
  612.  
  613. # mac_filter enables MAC addressed based filtering on bridge ports.
  614. # This currently requires ebtables to be installed.
  615. #
  616. #mac_filter = 1
  617.  
  618.  
  619. # By default, PCI devices below non-ACS switch are not allowed to be assigned
  620. # to guests. By setting relaxed_acs_check to 1 such devices will be allowed to
  621. # be assigned to guests.
  622. #
  623. #relaxed_acs_check = 1
  624.  
  625.  
  626. # If allow_disk_format_probing is enabled, libvirt will probe disk
  627. # images to attempt to identify their format, when not otherwise
  628. # specified in the XML. This is disabled by default.
  629. #
  630. # WARNING: Enabling probing is a security hole in almost all
  631. # deployments. It is strongly recommended that users update their
  632. # guest XML <disk> elements to include <driver type='XXXX'/>
  633. # elements instead of enabling this option.
  634. #
  635. #allow_disk_format_probing = 1
  636.  
  637.  
  638. # In order to prevent accidentally starting two domains that
  639. # share one writable disk, libvirt offers two approaches for
  640. # locking files. The first one is sanlock, the other one,
  641. # virtlockd, is then our own implementation. Accepted values
  642. # are "sanlock" and "lockd".
  643. #
  644. #lock_manager = "lockd"
  645.  
  646.  
  647.  
  648. # Set limit of maximum APIs queued on one domain. All other APIs
  649. # over this threshold will fail on acquiring job lock. Specially,
  650. # setting to zero turns this feature off.
  651. # Note, that job lock is per domain.
  652. #
  653. #max_queued = 0
  654.  
  655. ###################################################################
  656. # Keepalive protocol:
  657. # This allows qemu driver to detect broken connections to remote
  658. # libvirtd during peer-to-peer migration. A keepalive message is
  659. # sent to the daemon after keepalive_interval seconds of inactivity
  660. # to check if the daemon is still responding; keepalive_count is a
  661. # maximum number of keepalive messages that are allowed to be sent
  662. # to the daemon without getting any response before the connection
  663. # is considered broken. In other words, the connection is
  664. # automatically closed approximately after
  665. # keepalive_interval * (keepalive_count + 1) seconds since the last
  666. # message received from the daemon. If keepalive_interval is set to
  667. # -1, qemu driver will not send keepalive requests during
  668. # peer-to-peer migration; however, the remote libvirtd can still
  669. # send them and source libvirtd will send responses. When
  670. # keepalive_count is set to 0, connections will be automatically
  671. # closed after keepalive_interval seconds of inactivity without
  672. # sending any keepalive messages.
  673. #
  674. #keepalive_interval = 5
  675. #keepalive_count = 5
  676.  
  677.  
  678.  
  679. # Use seccomp syscall whitelisting in QEMU.
  680. # 1 = on, 0 = off, -1 = use QEMU default
  681. # Defaults to -1.
  682. #
  683. #seccomp_sandbox = 1
  684.  
  685.  
  686. # Override the listen address for all incoming migrations. Defaults to
  687. # 0.0.0.0, or :: if both host and qemu are capable of IPv6.
  688. #migration_address = "0.0.0.0"
  689.  
  690.  
  691. # The default hostname or IP address which will be used by a migration
  692. # source for transferring migration data to this host. The migration
  693. # source has to be able to resolve this hostname and connect to it so
  694. # setting "localhost" will not work. By default, the host's configured
  695. # hostname is used.
  696. #migration_host = "host.example.com"
  697.  
  698.  
  699. # Override the port range used for incoming migrations.
  700. #
  701. # Minimum must be greater than 0, however when QEMU is not running as root,
  702. # setting the minimum to be lower than 1024 will not work.
  703. #
  704. # Maximum must not be greater than 65535.
  705. #
  706. #migration_port_min = 49152
  707. #migration_port_max = 49215
  708.  
  709.  
  710.  
  711. # Timestamp QEMU's log messages (if QEMU supports it)
  712. #
  713. # Defaults to 1.
  714. #
  715. #log_timestamp = 0
  716.  
  717.  
  718. # Location of master nvram file
  719. #
  720. # When a domain is configured to use UEFI instead of standard
  721. # BIOS it may use a separate storage for UEFI variables. If
  722. # that's the case libvirt creates the variable store per domain
  723. # using this master file as image. Each UEFI firmware can,
  724. # however, have different variables store. Therefore the nvram is
  725. # a list of strings when a single item is in form of:
  726. # ${PATH_TO_UEFI_FW}:${PATH_TO_UEFI_VARS}.
  727. # Later, when libvirt creates per domain variable store, this list is
  728. # searched for the master image. The UEFI firmware can be called
  729. # differently for different guest architectures. For instance, it's OVMF
  730. # for x86_64 and i686, but it's AAVMF for aarch64. The libvirt default
  731. # follows this scheme.
  732. #nvram = [
  733. # "/usr/share/OVMF/OVMF_CODE.fd:/usr/share/OVMF/OVMF_VARS.fd",
  734. # "/usr/share/OVMF/OVMF_CODE.secboot.fd:/usr/share/OVMF/OVMF_VARS.fd",
  735. # "/usr/share/AAVMF/AAVMF_CODE.fd:/usr/share/AAVMF/AAVMF_VARS.fd",
  736. # "/usr/share/AAVMF/AAVMF32_CODE.fd:/usr/share/AAVMF/AAVMF32_VARS.fd"
  737. #]
  738.  
  739. # The backend to use for handling stdout/stderr output from
  740. # QEMU processes.
  741. #
  742. # 'file': QEMU writes directly to a plain file. This is the
  743. # historical default, but allows QEMU to inflict a
  744. # denial of service attack on the host by exhausting
  745. # filesystem space
  746. #
  747. # 'logd': QEMU writes to a pipe provided by virtlogd daemon.
  748. # This is the current default, providing protection
  749. # against denial of service by performing log file
  750. # rollover when a size limit is hit.
  751. #
  752. #stdio_handler = "logd"
  753.  
  754. # QEMU gluster libgfapi log level, debug levels are 0-9, with 9 being the
  755. # most verbose, and 0 representing no debugging output.
  756. #
  757. # The current logging levels defined in the gluster GFAPI are:
  758. #
  759. # 0 - None
  760. # 1 - Emergency
  761. # 2 - Alert
  762. # 3 - Critical
  763. # 4 - Error
  764. # 5 - Warning
  765. # 6 - Notice
  766. # 7 - Info
  767. # 8 - Debug
  768. # 9 - Trace
  769. #
  770. # Defaults to 4
  771. #
  772. #gluster_debug_level = 9
  773.  
  774. # To enhance security, QEMU driver is capable of creating private namespaces
  775. # for each domain started. Well, so far only "mount" namespace is supported. If
  776. # enabled it means qemu process is unable to see all the devices on the system,
  777. # only those configured for the domain in question. Libvirt then manages
  778. # devices entries throughout the domain lifetime. This namespace is turned on
  779. # by default.
  780. #namespaces = [ "mount" ]
  781.  
  782. # This directory is used for memoryBacking source if configured as file.
  783. # NOTE: big files will be stored here
  784. #memory_backing_dir = "/var/lib/libvirt/qemu/ram"
  785. [root@darkstar ~]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement