The Host Side Linking pattern for KVM is designed to establish relationships between:
Below you can see virtual Disk Drive on the KVM virtual host and its connection to the physical devices (Storage Volumes):
The Host Side Linking for KVM pattern is triggered when a Red Hat KVM Server Software Instance is detected on a host.
First, the pattern identifies and lists the different virtual machines running on this KVM server, and then parses the list of VMs to collect virtual disks parameters (from the process arguments of the Contributor Process for the SI).
Then, by processing the virtual disks parameters and the information from the actual virtual drives detected on the virtual hosts, the pattern identifies the physical storage devices related to the virtual disk drives.
Note that the KVM Storage pattern does not create local disk drives on the virtual hosts nor links from the file systems to the storage devices. These operations are performed by each OS-related HSL pattern (Linux, Windows, Solaris…).
The Host Side Linking Pattern for KVM creates the following relationships:
The pattern may stop its execution if:
Linux Storage and KVM patterns must be uploaded and activated on the BMC Discovery appliance. The KVM Storage pattern is closely dependent on the Linux Storage pattern (the list of commands to run is imported from the Linux Storage pattern).
The current version of the Host Side Linking for KVM pattern requires the following scanning order to be strictly followed to ensure collection of all available information in a single pass:
The Host Side Linking Pattern for KVM launches commands that may require specific execution privileges. The pattern first run commands as the normal user that discovery is using. In case of failure, commands are rerun using PRIV_RUNCMD. In that case, PRIV_RUNCMD will need to be configured to use an appropriate privilege elevation mechanism (see Adding privileged execution to commands for detailed information).
The list of commands that the KVM Storage pattern may run includes:
Note: Depending on the host’s configuration, some commands may remain unused.