Bug #883218: No documentation for installing OpenStack Compute with XenServer as hypervisor

Bug #938408: Possible typo in a relevant technical term

Added <?dbhtml stop-chunking?> processing instruction so the introduction appears as a single page.
Add an introduction to Xen, XCP, and XenServer, with explanation of the
variety of technical terms.  This is included as part of the Installing
OpenStack Compute and Image Service chapter in the installation manual, and
the Hypervisors chapter of the compute admin manual.

Change-Id: I381e9b8ec19638ba90a8436fdcb6b5059f3ff963
This commit is contained in:
Ewan Mellor 2012-03-15 01:44:35 +00:00 committed by annegentle
parent e150a117b4
commit 1c94ed77a6
5 changed files with 192 additions and 0 deletions

Binary file not shown.

After

(image error) Size: 57 KiB

Binary file not shown.

@ -0,0 +1,188 @@
<?xml version="1.0" encoding="UTF-8"?>
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xi="http://www.w3.org/2001/XInclude"
xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0"
xml:id="introduction-to-xen">
<title>Introduction to using Xen, XCP and XenServer with OpenStack</title>
<?dbhtml stop-chunking?>
<para>In this section we will describe Xen, XCP, and XenServer, the
differences between them, and how to use them with OpenStack. Xen's
architecture is different from KVM's in important ways, and we discuss those
differences and when each might make sense in your OpenStack cloud.</para>
<section xml:id="basic-terminology">
<title>Basic terminology</title>
<para><emphasis role="bold">Xen</emphasis> is a hypervisor. It provides the
fundamental isolation between virtual machines. Xen is open source (GPLv2)
and is managed by Xen.org, an cross-industry organization.</para>
<para>Xen is a component of many different products and projects. The
hypervisor itself is very similar across all these projects, but the way that
it is managed can be different, which can cause confusion if you're not clear
which toolstack you are using. Make sure you know what toolstack you want
before you get started.</para>
<para><emphasis role="bold">XCP</emphasis> is an open source (GPLv2) toolstack
for Xen. It is designed specifically as platform for enterprise and cloud
computing, and is well integrated with OpenStack.</para>
<para><emphasis role="bold">Citrix XenServer</emphasis> is a commercial
product. It is based on XCP, and exposes the same toolstack and managment
API. As an analogy, think of XenServer being based on XCP in the way that Red
Hat Enterprise Linux is based on Fedora. XenServer has a free version (which
is very similar to XCP) and paid-for versions with additional features
enabled.</para>
<para>Both XenServer and XCP include Xen, Linux, and the primary control
daemon known as <emphasis role="bold">xapi</emphasis>.</para>
<para>The API shared between XCP and XenServer is called <emphasis
role="bold">XenAPI</emphasis>. OpenStack usually refers to XenAPI, to
indicate that the integration works equally well on XCP and XenServer.
Sometimes, a careless person will refer to XenServer specifically, but you can
be reasonably confident that anything that works on XenServer will also work
on the latest version of XCP.</para>
</section>
<section xml:id="privileged-and-unprivileged-domains">
<title>Privileged and unprivileged domains</title>
<para>A Xen host will run a number of virtual machines, VMs, or domains (the
terms are synonymous on Xen). One of these is in charge of running the rest
of the system, and is known as "domain 0", or "dom0". It is the first domain
to boot after Xen, and owns the storage and networking hardware, the device
drivers, and the primary control software. Any other VM is unprivileged, and
are known as a "domU" or "guest". All customer VMs are unprivileged of
course, but you should note that on Xen the OpenStack control software
(nova-compute) also runs in a domU. This gives a level of security isolation
between the privileged system software and the OpenStack sofware (much of
which is customer-facing). This architecture is described in more detail
later.
</para>
<para>There is an ongoing project to split domain 0 into multiple privileged
domains known as <emphasis role="bold">driver domains</emphasis> and <emphasis
role="bold">stub domains</emphasis>. This would give even better separation
between critical components. This is an ongoing research project and you
shouldn't worry about it right now. The current architecture just has three
levels of separation: dom0, the OpenStack domU, and the completely
unprivileged customer VMs.</para>
</section>
<section xml:id="paravirtualized-vs-hvm-domains">
<title>Paravirtualized versus hardware virtualized domains</title>
<para>A Xen virtual machine can be <emphasis role="bold">paravirtualized
(PV)</emphasis> or <emphasis role="bold">hardware virtualized
(HVM)</emphasis>. This refers to the interaction between Xen, domain 0, and
the guest VM's kernel. PV guests are aware of the fact that they are
virtualized and will co-operate with Xen and domain 0; this gives them better
performance characteristics. HVM guests are not aware of their environment,
and the hardware has to pretend that they are running on an unvirtualized
machine. HVM guests have the advantage that there is no need to modify the
guest operating system, which is essential when running Windows.</para>
<para>In OpenStack, customer VMs may run in either PV or HVM mode. However,
the OpenStack domU (that's the one running nova-compute) <emphasis
role="bold">must</emphasis> be running in PV mode.</para>
</section>
<section xml:id="deployments">
<title>Deployment architecture</title>
<para>When you deploy OpenStack on XCP or XenServer you will get something
similar to this:
<informalfigure><mediaobject><imageobject><imagedata
fileref="figures/XenServer-dom0-domU.png"
/></imageobject></mediaobject></informalfigure>
</para>
<para>Key things to note:
<itemizedlist>
<listitem><para>The hypervisor: Xen</para></listitem>
<listitem><para>Domain 0: runs xapi and some small pieces from OpenStack
(some xapi plugins and network isolation rules). The majority of this is
provided by XenServer or XCP (or yourself using Kronos).</para></listitem>
<listitem><para>OpenStack domU: The nova-compute code runs in a
paravirtualized virtual machine, running on the host under management.
Each host runs a local instance of nova-compute. It will often also be
running nova-network (depending on your network mode). In this case,
nova-network is managing the addresses given to the tenant VMs through
DHCP.</para></listitem>
<listitem><para>Nova uses the XenAPI Python library to talk to xapi, and
it uses the Host Internal Management Network to reach from the domU to
dom0 without leaving the host.</para></listitem>
</itemizedlist>
</para>
<para>
Some notes on the networking:
<itemizedlist>
<listitem><para>The above diagram assumes FlatDHCP networking (the
DevStack default).</para></listitem>
<listitem><para>There are three main OpenStack networks: Management
traffic (RabbitMQ, MySQL, etc), Tenant network traffic (controlled by
nova-network) and Public traffic (floating IPs, public API end
points).</para></listitem>
<listitem><para>Each network that leaves the host has been put through
a separate physical network interface. This is the simplest model, but
it's not the only one possible. You may choose to isolate this traffic
using VLANs instead, for example.</para></listitem>
</itemizedlist>
</para>
</section>
<section xml:id="pools">
<title>XenServer pools</title>
<para>Before OpenStack 2012.1 ("Essex"), all XenServer machines used with
OpenStack are standalone machines, usually only using local storage.</para>
<para>However in 2012.1 and later, the host-aggregates feature allows you to
create pools of XenServer hosts (configuring shared storage is still an out of
band activity). This move will enable live migration when using shared
storage.</para>
</section>
<section xml:id="xen-and-libvirt">
<title>Xen and libvirt</title>
<para>It may possible to manage Xen using libvirt. This would be necessary
for any Xen-based system that isn't using the XCP toolstack, such as SUSE
Linux or Oracle Linux. Unfortunately, this is not well tested or supported
today, and using the XCP or XenServer toolstacks with the OpenStack XenAPI
backend is the only recommended method.</para>
</section>
<section xml:id="further-reading">
<title>Further reading</title>
<para>What is Xen? by Xen.org: <link
xlink:href="http://xen.org/files/Marketing/WhatisXen.pdf">
http://xen.org/files/Marketing/WhatisXen.pdf</link>.</para>
<para>Xen Hypervisor project: <link
xlink:href="http://xen.org/products/xenhyp.html">
http://xen.org/products/xenhyp.html</link>.</para>
<para>XCP project: <link xlink:href="http://xen.org/products/cloudxen.html">
http://xen.org/products/cloudxen.html</link>.</para>
</section>
</section>

@ -145,4 +145,7 @@
</tbody></table>
</section>
<xi:include href="../common/introduction-to-xen.xml" />
</chapter>

@ -5,6 +5,7 @@
xml:id="ch_installing-openstack-compute-image">
<title>Installing OpenStack Compute and Image Service</title>
<para>The OpenStack Compute and Image services work together to provide access to virtual servers and images through REST APIs.</para>
<xi:include href="../common/introduction-to-xen.xml" />
<xi:include href="install-config-glance.xml" />
<xi:include href="configure-creds.xml" />
<xi:include href="images-verifying-install.xml" />