HP Integrity Virtual Machines 4.3: Installation, Configuration, Administration
8.7 Using the Virtual Console.............................................................................................................155
8.8 Using the virtual iLO Remote Console..........................................................................................157
8.8.1 Configuring, Deleting, and Obtaining Status of a virtual iLO Remote Console..................157
8.8.2 Integrity VM virtual iLO Remote Console Limitations........................................................158
8.9 Guest Configuration Files..............................................................................................................159
8.10 Dynamic Memory........................................................................................................................159
8.10.1 Managing Dynamic Memory from the VM Host................................................................159
8.10.1.1 Configuring a Virtual Machine to Use Dynamic Memory..........................................161
8.10.1.2 Viewing Dynamic Memory on the VM Host..............................................................161
8.10.1.3 Modifying a Virtual Machine's Memory Size on the VM Host...................................163
8.10.2 Managing Dynamic Memory from the Guest.....................................................................163
8.10.2.1 Viewing Dynamic Memory Information from the Guest............................................163
8.10.2.2 Modifying a Virtual Machine's Memory Size from the Guest....................................164
8.10.3 Troubleshooting Dynamic Memory Problems....................................................................165
8.10.3.1 Dynamic Memory Restrictions....................................................................................165
8.10.3.2 VM Host Resource Considerations.............................................................................165
8.10.3.3 Guest Resource Considerations...................................................................................165
8.10.3.4 Specify Sufficient Guest Memory................................................................................165
8.10.3.5 Actual Memory Allocations Might Differ...................................................................166
8.10.3.6 Enable Dynamic Memory on the Guest and on the VM Host....................................166
8.10.3.7 Upgrade the Guest Kit When Upgrading Integrity VM.............................................167
8.10.4 Automatic Memory Reallocation........................................................................................167
8.10.4.1 Enabling Automatic Memory Reallocation on the VM Host......................................167
8.10.4.2 Managing Automatic Memory Reallocation from the VM Host................................167
8.10.4.2.1 Enabling Automatic Memory Reallocation on a VM..........................................168
8.10.4.2.2 Managing Automatic Memory Reallocation on a VM........................................168
8.10.4.3 Viewing Automatic Memory Reallocation..................................................................169
8.11 Integrity VM Log Files.................................................................................................................169
8.12 Managing the Device Database...................................................................................................169
8.12.1 The Device Database File.....................................................................................................170
8.12.2 Using the hpvmdevmgmt Command.................................................................................170
8.12.2.1 Sharing Devices...........................................................................................................171
8.12.2.2 Replacing Devices........................................................................................................172
8.12.2.3 Deleting Devices..........................................................................................................172
8.12.2.4 Restricting VM Host Devices.......................................................................................172
8.12.3 Inspect and Edit the Repair Script.......................................................................................172
8.13 HP AVIO Stor EFI Driver Enumeration Policy............................................................................173
9 Migrating Virtual Machines......................................................................................175
9.1 Introduction to Virtual Machine Migration..................................................................................175
9.1.1 Reasons for Migrating an Online Guest................................................................................177
9.1.2 Reasons for Migrating Virtual Machines Offline..................................................................178
9.2 Command Line Interface for Online and Offline Migration.........................................................179
9.2.1 Using the hpvmmigrate Command....................................................................................179
9.2.2 Examples of the hpvmmigrate Command..........................................................................183
9.2.3 Using the hpvmstatus Command to See Migration Details.............................................184
9.2.4 Options to hpvmmodify Command for Online Migration..................................................184
9.2.5 Using the hpvminfo Command in the Guest......................................................................185
9.3 VM Host and Virtual Machine Configuration Considerations.....................................................185
9.3.1 Using Network Time Protocol (NTP) in Integrity VM Environments..................................186
9.3.2 VM Host Requirements and Setup........................................................................................187
9.3.2.1 VM Host Processors for Online Migration....................................................................187
9.3.2.2 Private Network Setup..................................................................................................188
9.3.2.3 Conventions for Using target-hpvm-migr Names for Private Networks...............189
Table of Contents 7