没有合适的资源?快使用搜索试试~ 我知道了~
libvirt_Application_Development_Guide
需积分: 9 15 下载量 104 浏览量
2011-06-06
14:45:29
上传
评论 1
收藏 632KB PDF 举报
温馨提示
试读
96页
libvirt Application Development Guide
资源推荐
资源详情
资源评论
libvirt 0.7.5
Application
Development Guide
A guide to application development with libvirt
Application Development Guide Draft
Dani Coulson
Daniel Berrange
Daniel Veillard
Chris Lalancette
Laine Stump
David Jorm
Draft
libvirt 0.7.5 Application Development Guide
A guide to application development with libvirt
Edition 1
Author Dani Coulson
Author Daniel Berrange
Author Daniel Veillard
Author Chris Lalancette
Author Laine Stump
Author David Jorm
Copyright © 2009-2010 Red Hat, Inc.
Copyright © 2009-2010 Red Hat, Inc.
Copyright © 2009-2010 Red Hat, Inc. and others.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons
Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available
at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat,
designate the libvirt Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with
CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the
original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity
Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
All other trademarks are the property of their respective owners.
This document provides a guide for application developers using libvirt.
Draft Draft
v
Preface ix
1. Document Conventions ................................................................................................... ix
1.1. Typographic Conventions ..................................................................................... ix
1.2. Pull-quote Conventions ......................................................................................... x
1.3. Notes and Warnings ............................................................................................ xi
2. We Need Feedback! ....................................................................................................... xi
1. Introduction 1
1.1. Overview ..................................................................................................................... 1
1.2. Glossary of terms ......................................................................................................... 1
2. Architecture 3
2.1. Object model ............................................................................................................... 3
2.1.1. Hypervisor connections ...................................................................................... 3
2.1.2. Guest domains .................................................................................................. 3
2.1.3. Virtual networks ................................................................................................. 4
2.1.4. Storage pools .................................................................................................... 4
2.1.5. Storage volumes ............................................................................................... 5
2.1.6. Host devices ..................................................................................................... 5
2.2. Driver model ................................................................................................................ 6
2.3. Remote management ................................................................................................... 7
2.3.1. Basic usage ...................................................................................................... 8
2.3.2. Data Transports ................................................................................................. 8
2.3.3. Authentication schemes ..................................................................................... 9
2.4. Generating TLS certificates ......................................................................................... 10
2.4.1. Public Key Infrastructure setup ......................................................................... 10
3. Connections 13
3.1. Overview .................................................................................................................... 13
3.1.1. virConnectOpen ............................................................................................... 13
3.1.2. virConnectOpenReadOnly ................................................................................ 14
3.1.3. virConnectOpenAuth ........................................................................................ 14
3.1.4. virConnectClose .............................................................................................. 17
3.2. URI formats ............................................................................................................... 18
3.2.1. Local URIs ...................................................................................................... 18
3.2.2. Remote URIs .................................................................................................. 19
3.3. Capability information ................................................................................................. 23
3.4. Host information ......................................................................................................... 26
3.4.1. virConnectGetHostname ................................................................................... 27
3.4.2. virConnectGetMaxVcpus .................................................................................. 27
3.4.3. virNodeGetFreeMemory ................................................................................... 28
3.4.4. virNodeGetInfo ................................................................................................ 28
3.4.5. virNodeGetCellsFreeMemory ............................................................................ 29
3.4.6. virConnectGetType .......................................................................................... 30
3.4.7. virConnectGetVersion ....................................................................................... 31
3.4.8. virConnectGetLibVersion .................................................................................. 31
3.4.9. virConnectGetURI ............................................................................................ 32
3.4.10. virConnectIsEncrypted .................................................................................... 32
3.4.11. virConnectIsSecure ........................................................................................ 33
3.5. Event loop integration ................................................................................................. 33
3.6. Security model ........................................................................................................... 34
3.7. Error handling ............................................................................................................ 34
3.7.1. virSetErrorFunc ................................................................................................ 38
剩余95页未读,继续阅读
资源评论
yty08576aa
- 粉丝: 0
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功