Top
Virtual Machine Basic Concepts
Important Information on Virtual Machines
Top
RAM and SSD Sizes
Description | Possible Values |
---|---|
RAM size 1 |
|
SSD size 2 |
|
Top
RAM Allocation to Virtual Machines
To reduce the wear-and-tear of the Solid State Drive, make sure to allocate the maximum amount of RAM possible to the virtual machine.
Installed RAM on Mediatrix Units | Available RAM for Virtual Machine |
---|---|
2 Gb | 1.5 Gb |
4 Gb | 3.5 Gb |
8 Gb | 7 Gb ( 87.5% of available RAM) |
16 Gb | 10 Gb |
Top
VM name
The name is set when adding a new virtual machine with the CreateVm command. The user cannot modify the name after.
When the CreateVm command is called without a name, the index is used to generate a unique name such as VM_Index.
Top
VM Memory
When adding a VM with the CreateVm command, the amount of allocated memory is set; this amount cannot be modified after adding the VM.
When the CreateVm command is called without an amount of allocated memory, a minimal value of 128 MB is set.
- a minimum of 512 MB, or
- 12.5% of the total volatile memory capacity if more than 512 MB is available
Top
USB Usage
The VM config allows the user to associate none or all USB Ports to a virtual machine.
A USB port can be associated with one VM. The first VM that is configured with USB can use all available USB ports.
If an another VM tries to use a USB port already in use, the Vm service ignores this config and starts the VM as if it was configured with NONE, and sets its configuration status (ConfigStatus) to USBNotAvailable.
Top
Virtual Switch
Enabling the Virtual Switch with the Eth.Links.VirtualSwitch parameter grants network access to the VM. Once enabled, the virtual switch creates a bridge between the VM and the associated Ethernet link.
When the Virtual Switch is enabled, the Vm.Vm.NetworkAdapter parameter configures its virtualised network adapter.
Top
Behaviour on Factory Reset
The unit can be preinstalled with a factory-installed VM stored in the vm/images/factory folder. This folder can only be created in factory and must have the factory-installed VM files.
- When one or more factory-installed VM is present, VM images and configurations are returned to their original factory state.
- When no factory-installed VM is present, the VM images and configurations stay unchanged, i.e. the files present in vm/images/ are not erased.
- The files in the vm/images/ folder are erased, which removes the VM snapshots and all VMs created, modified, or installed by users.
- Note: this is done even if the vm/images/factory folder exists and is empty.
- For each factory-installed VM (visible in the vm/images/factory folder), the configuration file (.cfg) is copied in the vm/images folder and a snapshot of the VM image is also created in the vm/images folder. The snapshot file is given the .snapshot extension and is always in a QCOW2 format. When this VM is used, the snapshot file changes over time but the base image (located in vm/images/factory) is never modified, allowing the next factory reset to restore the factory VMs to their original state again.
- The admin can use, configure, convert, and delete a VM with a snapshot image like any other VM, but after a factory reset, the snapshot image is deleted and a new one is created.
- When a snapshot file is converted into a VM image file, the resulting file is a new image file combining the base VM plus the history contained in the snapshot file.
- Users cannot add or delete files on the vm/images/factory folder. This can only be done in factory.
- The VM images under vm/images/factory can have either the RAW or QCOW2 format.
- The RestoreAfterFactory parameter in the VM configuration file is ignored. The factory-installed VMs are always restored.
In all cases, the content of /vm/drives is erased.
Top
How to Protect my VM against Spectre
There are different mitigation techniques against Spectre:
- Mitigation #1: A microcode update from the CPU vendor for better control over the branch speculation. Also need an updated kernel to enable these new features (IBRS and IBPB).
- Mitigation #2: Different techniques (like "retpoline" and "LFENCE") that require recompiling the kernel, packages and applications.
As the time this document was written, Mitigation #1 could not be applied, as Intel had not yet released a microcode update for the CPU of the Sentinel 400.
Top
How to Protect my VM against Meltdown
Linux kernels have a new feature called KPTI (previously known as KAISER) that protects against Meltdown.
If your Virtual Machine is vulnerable, Media5 recommends that you upgrade your kernel to a version that supports KPTI, and enable it.
Top
Basic Virtual Machine Tasks
Stopping the Virtual Machine
- Go to System/VM.
- In the Virtual Machine Configuration table, click located on the same row as the VM you wish to stop.
Top
Stopping the Virtual Machine - Graceful Stop
Top
Rebooting a VM
- Go to System/VM.
- Click .
Top
Rebooting a VM - Graceful Reboot
Although the virtual machine can be rebooted via the Web page, rebooting the virtual machine using a VNC Client is the preferred way to reboot the virtual machine.
Top
Deleting a VM
- Go to System/VM.
- In the Virtual Machine Configuration table, click located on the same row as the virtual machine you wish to delete.
Top
Setting the Virtual Machine to Automatic Start
If the virtual machine you wish to start requires resources equivalent to the available resources on the unit, then it will not be possible to start another virtual machine. It is only possible to start a virtual if there are enough resources on the unit.
- Go to System/VM.
- In the Virtual Machine Configuration table, from the Startup dropdown list, select Auto.
- Click Apply.
Top
Setting the Virtual Machine to Manual Start
- Go to System/VM.
- In the Virtual Machine Configuration table, from the Startup dropdown list, select Manual.
- Click Apply.
Top
Deleting a VM
- Go to System/VM.
- In the Virtual Machine Configuration table, click located on the same row as the virtual machine you wish to delete.
Top
Virtual Machine Installation
Adding a Virtual Machine
You must have a virtual machine licence and the VM service must be started.
Top
Configuring a Link as a Virtual Switch
- Go to Network/Interfaces.
- In the Ethernet Link Configuration table, from the Virtual Switch selection list, select Enable located on the same row as the link you wish to enable for the virtual switch.
- Click Apply.
Top
Importing an ISO Image Larger than 10mb to the Unit File Management System
Top
Importing an ISO image to the Unit File Management System
If the ISO Image is larger than 10mb, use the Importing an ISO Image Larger than 10mb to the Unit File Management System.
Top
Configuring the VM Network Adapter (VirtIO)
The virtual machine Network Adapter will be set to VirtIO.
Top
Installing the OS on the Virtual Machine Using an ISO image
Top
Installing the Virtual Machine OS using a USB External Device
The virtual machine will be started only if it is started manually
Top
Importing an ISO image to the Unit File Management System
If the ISO Image is larger than 10mb, use the Importing an ISO Image Larger than 10mb to the Unit File Management System.
Top
Disabling Swap on Linux
Top
Virtual Machine Modification
Modifying the Virtual Machine Configuration
- Go to System/VM.
- In the Virtual Machine Configuration table, modify the fields as required.
- Click Apply.
Top
Parameters
- using a MIB browser, such as the Mediatrix Unit Manager Network (UMN);
- using the CLI;
- creating a configuration script containing the configuration parameters.
Top
System/VM Parameters
Min Severity
For more details on the following parameters, refer to the DGW Configuration Guide - Reference Guide published on the Media5 Documentation Portal Refer to Vm.Min Severity.Need Restart Info
Refer to Vm.NeedRestartInfo.Top
Configuration notes
These documents are created to facilitate the configuration of a specific use case. They address a configuration aspect we consider that most users will need to perform. However, in some cases, a configuration note is created after receiving a question from a customer. They provide standard step by step procedures detailing the values of the parameters to use. They provide a means of validation and present some conceptual information. The configuration notes are specifically created to guide the user through an aspect of the configuration.
Top
Virtual Machine Configuration Notes
Top
Online Help
If you are not familiar with the meaning of the fields and buttons, click Show Help, located at the upper right corner of the Web page. When activated, the fields and buttons that offer online help will change to green and if you hover over them, the description will bedisplayed.
Top
DGW Documentation
Mediatrix devices are supplied with an exhaustive set of documentation.
Mediatrix user documentation is available on the Media5 Documentation Portal.
- Release notes: Generated at each GA release, this document includes the known and solved issues of the software. It also outlines the changes and the new features the release includes.
- Configuration notes: These documents are created to facilitate the configuration of a specific use case. They address a configuration aspect we consider that most users will need to perform. However, in some cases, a configuration note is created after receiving a question from a customer. They provide standard step-by-step procedures detailing the values of the parameters to use. They provide a means of validation and present some conceptual information. The configuration notes are specifically created to guide the user through an aspect of the configuration.
- Technical bulletins: These documents are created to facilitate the configuration of a specific technical action, such as performing a firmware upgrade.
- Hardware installation guide: They provide the detailed procedure on how to safely and adequately install the unit. It provides information on card installation, cable connections, and how to access for the first time the Management interface.
- User guide: The user guide explains how to customise to your needs the configuration of the unit. Although this document is task oriented, it provides conceptual information to help the user understand the purpose and impact of each task. The User Guide will provide information such as where and how TR-069 can be configured in the Management Interface, how to set firewalls, or how to use the CLI to configure parameters that are not available in the Management Interface.
- Reference guide: This exhaustive document has been created for advanced users. It includes a description of all the parameters used by all the services of the Mediatrix units. You will find, for example, scripts to configure a specific parameter, notification messages sent by a service, or an action description used to create Rulesets. This document includes reference information such as a dictionary, and it does not include any step-by-step procedures.
Top
Copyright Notice
Copyright © 2023 Media5 Corporation.
This document contains information that is proprietary to Media5 Corporation.
Media5 Corporation reserves all rights to this document as well as to the Intellectual Property of the document and the technology and know-how that it includes and represents.
This publication cannot be reproduced, neither in whole nor in part, in any form whatsoever, without written prior approval by Media5 Corporation.
Media5 Corporation reserves the right to revise this publication and make changes at any time and without the obligation to notify any person and/or entity of such revisions and/or changes.