16 Xen to KVM migration guide #
As the KVM virtualization solution is becoming more and more popular among server administrators, many of them need a path to migrate their existing Xen based environments to KVM. As of now, there are no mature tools to automatically convert Xen VMs to KVM. There is, however, a technical solution that helps convert Xen virtual machines to KVM. The following information and procedures help you to perform such a migration.
The migration procedure described in this document is not fully supported by SUSE. We provide it as a guidance only.
16.1 Migration to KVM using virt-v2v #
   This section contains information to help you import virtual machines from
   foreign hypervisors (such as Xen) to KVM managed by libvirt.
  
    This section is focused on converting Linux guests. Converting Microsoft
    Windows guests using virt-v2v is the same as converting
    Linux guests, except with regard to handling the Virtual Machine Driver Pack
    (VMDP). Additional details on converting Windows guests with the VMDP can
    be found separately at
    Virtual
    Machine Driver Pack documentation.
   
16.1.1 Introduction to virt-v2v #
    virt-v2v is a command line tool to convert VM Guests
    from a foreign hypervisor to run on KVM managed by libvirt. It enables
    paravirtualized virtio drivers in the converted virtual machine if
    possible. A list of supported operating systems and hypervisors follows:
   
- SUSE Linux Enterprise Server 
- openSUSE 
- Red Hat Enterprise Linux 
- Fedora 
- Microsoft Windows Server 2003 and 2008 
- Xen 
- KVM (managed by - libvirt)
16.1.2 Installing virt-v2v #
    The installation of virt-v2v is simple:
   
>sudozypper install virt-v2v
    Remember that virt-v2v requires root privileges,
    so you need to run it either as root, or via sudo.
   
16.1.3 Preparing the virtual machine #
     If running virt-v2v on SLES 12 SP1 or earlier, this
     step can be safely skipped. This step can also be ignored if the virtual
     machine is fully virtualized or if it runs on SLES 12 SP2 or later.
    
    The Xen virtual machine must have the default kernel installed. To ensure
    this, run zypper in kernel-default on the virtual
    machine.
   
16.1.4 Converting virtual machines to run under KVM managed by libvirt #
    virt-v2v converts virtual machines from the Xen
    hypervisor to run under KVM managed by libvirt. To learn more about
    libvirt and virsh, see
    Part II, “Managing virtual machines with libvirt”. Additionally, all
    virt-v2v command line options are explained in the
    virt-v2v manual page (man 1
    virt-v2v).
   
Before converting a virtual machine, make sure to complete the following steps:
- Create a new local storage pool. - virt-v2vcopies the storage of the source virtual machine to a local storage pool managed by- libvirt(the original disk image remains unchanged). You can create the pool either with Virtual Machine Manager or- virsh. For more information, see Section 9.2.2, “Managing storage with Virtual Machine Manager” and Section 9.2.1, “Managing storage with- virsh”.
- Prepare the local network interface. - Check that the converted virtual machine can use a local network interface on the VM Host Server. It is usually a network bridge. If it is not defined yet, create it with › › › › . Note: Mappings of network devices- Network devices on the source Xen host can be mapped during the conversion process to corresponding network devices on the KVM target host. For example, the Xen bridge - br0can be mapped to the default KVM network device. Sample mappings can be found in- /etc/virt-v2v.conf. To enable these mappings, modify the XML rule as necessary and ensure the section is not commented out with- <!--and- -->markers. For example:- <network type='bridge' name='br0'> <network type='network' name='default'/> </network> Tip: No network bridge- If there is no network bridge available, Virtual Machine Manager can optionally create it. 
    virt-v2v has the following basic command syntax:
   
virt-v2v -i INPUT_METHOD -os STORAGE_POOL SOURCE_VM
- input_method
- There are two input methods: - libvirtor- libvirtxml. See the SOURCE_VM parameter for more information.
- storage_pool
- The storage pool you already prepared for the target virtual machine. 
- source_vm
- The source virtual machine to convert. It depends on the INPUT_METHOD parameter: For - libvirt, specify the name of a libvirt domain. For- libvirtxml, specify the path to an XML file containing a libvirt domain specification.
Conversion of a virtual machine takes a lot of system resources, mainly for copying the whole disk image for a virtual machine. Converting a single virtual machine typically takes up to 10 minutes, although virtual machines using very large disk images can take much longer.
16.1.4.1 Conversion based on the libvirt XML description file #
     This section describes how to convert a local Xen virtual machine using
     the libvirt XML configuration file. This method is suitable if the host
     is already running the KVM hypervisor. Make sure that the libvirt XML
     file of the source virtual machine, and the libvirt storage pool
     referenced from it are available on the local host.
    
- Obtain the - libvirtXML description of the source virtual machine.Tip: Obtaining the XML files- To obtain the - libvirtXML files of the source virtual machine, you must run the host OS under the Xen kernel. If you already rebooted the host to the KVM-enabled environment, reboot back to the Xen kernel, dump the- libvirtXML file, and then reboot back to the KVM environment.- First identify the source virtual machine under virsh: - #virsh list Id Name State ---------------------------------------------------- [...] 2 sles12_xen running [...]- sles12_xenis the source virtual machine to convert. Now export its XML and save it to- sles12_xen.xml:- #virsh dumpxml sles12_xen > sles12_xen.xml
- Verify that all disk image paths are correct from the KVM host's perspective. This is not a problem when converting on one machine, but might require manual changes when converting using an XML dump from another host. - <source file='/var/lib/libvirt/images/XenPool/SLES.qcow2'/> Tip: Copying images- To avoid copying an image twice, manually copy the disk image(s) directly to the - libvirtstorage pool. Update the source file entries in the XML description file. The- virt-v2vprocess will detect the existing disks and convert them in place.
- Run - virt-v2vto convert to KVM virtual machine:- #virt-v2v sles12_xen.xml1 \ -i LIBVIRTXML2 \ -os remote_host.example.com:/exported_dir3 \ --bridge br04 \ -on sles12_kvm5- The XML description of the source Xen-based virtual machine. - virt-v2vwill read the information about the source virtual machine from a- libvirtXML file.- Storage pool where the target virtual machine disk image will be placed. In this example, the image will be placed on an NFS share - /exported_diron the- remote_host.example.comserver.- The target KVM-based virtual machine will use the network bridge - br0on the host.- The target virtual machine will be renamed to - sles12_kvmto prevent name collision with the existing virtual machine of the same name.
16.1.4.2 Conversion based on the libvirt domain name #
     This method is useful if you are still running libvirt under Xen, and
     plan to reboot to the KVM hypervisor later.
    
- Find the - libvirtdomain name of the virtual machine you want to convert.- #virsh list Id Name State ---------------------------------------------------- [...] 2 sles12_xen running [...]- sles12_xenis the source virtual machine to convert.
- Run - virt-v2vto convert to KVM virtual machine:- #virt-v2v sles12_xen1 \ -i libvirt2 \ -os storage_pool3 \ --network eth04 \ -of qcow25 \ -oa sparse6 \ -on sles12_kvm- The domain name of the Xen-based virtual machine. - virt-v2vwill read the information about the source virtual machine directly from the active- libvirtconnection.- The target disk image will be placed in a local - libvirtstorage pool.- All guest bridges (or networks) will be connected to a locally managed network. - Format for the disk image of the target virtual machine. Supported options are - rawor- qcow2.- Whether the converted guest disk space will be - sparseor- preallocated.
16.1.4.3 Converting a remote Xen virtual machine #
     This method is useful if you need to convert a Xen virtual machine
     running on a remote host. As virt-v2v connects to the
     remote host via ssh, ensure the SSH service is running
     on the host.
    
      Starting with SLES 12 SP2, virt-v2v requires a
      passwordless SSH connection to the remote host. This means a connection
      using an SSH key added to the ssh-agent. See man
      ssh-keygen and man ssh-add for more details
      on this. More information is also available at Chapter 22, Securing network operations with OpenSSH.
     
     To connect to a remote libvirt connection, construct a valid connection
     URI relevant for your remote host. In the following example, the remote
     host name is remote_host.example.com, and the user name
     for the connection is root. The connection URI then looks as
     follows:
    
xen+ssh://root@remote_host.example.com/
     For more information on libvirt connection URIs, see
     https://libvirt.org/uri.html.
    
- Find the - libvirtdomain name of the remote virtual machine you want to convert.- #virsh -c xen+ssh://root@remote_host.example.com/ list Id Name State ---------------------------------------------------- 1 sles12_xen running [...]- sles12_xenis the source virtual machine to convert.
- The - virt-v2vcommand for the remote connection looks like this:- #virt-v2v sles12_xen \ -i libvirt \ -ic xen+ssh://root@remote_host.example.com/ \ -os local_storage_pool \ --bridge br0
16.1.5 Running converted virtual machines #
    After virt-v2v completes successfully, a new libvirt
    domain will be created with the name specified with the
    -on option. If you did not specify -on,
    the same name as the source virtual machine will be used. The new guest can
    be managed with standard libvirt tools, such as virsh
    or Virtual Machine Manager.
   
     If you completed the conversion under Xen as described in
     Section 16.1.4.2, “Conversion based on the libvirt domain name”, you may need to reboot the
     host machine and boot with the non-Xen kernel.
    
16.2 Xen to KVM manual migration #
16.2.1 General outline #
    The preferred solution to manage virtual machines is based on libvirt;
    for more information, see https://libvirt.org/. It
    has several advantages over the manual way of defining and running virtual
    machines—libvirt is cross-platform, supports many hypervisors, has
    secure remote management, has virtual networking, and, most of all,
    provides a unified abstract layer to manage virtual machines. Therefore the
    main focus of this article is on the libvirt solution.
   
Generally, the Xen to KVM migration consists of the following basic steps:
- Make a backup copy of the original Xen VM Guest. 
- OPTIONAL: Apply changes specific to paravirtualized guests. 
- Obtain information about the original Xen VM Guest and update it to KVM equivalents. 
- Shut down the guest on the Xen host, and run the new one under the KVM hypervisor. 
The Xen to KVM migration cannot be done live while the source VM Guest is running. Before running the new KVM-ready VM Guest, you are advised to shut down the original Xen VM Guest.
16.2.2 Back up the Xen VM Guest #
To back up your Xen VM Guest, follow these steps:
- Identify the relevant Xen guest you want to migrate, and remember its ID/name. - >- sudovirsh list --all Id Name State ---------------------------------- 0 Domain-0 running 1 SLES11SP3 running [...]
- Shut down the guest. You can do this either by shutting down the guest OS, or with - virsh:- >- sudovirsh shutdown SLES11SP3
- Back up its configuration to an XML file. - >- sudovirsh dumpxml SLES11SP3 > sles11sp3.xml
- Back up its disk image file. Use the - cpor- rsynccommands to create the backup copy. Remember that it is always a good idea to check the copy with the- md5sumcommand.
- After the image file is backed up, you can start the guest again with - >- sudovirsh start SLES11SP3
16.2.3 Changes specific to paravirtualized guests #
    Apply the following changes if you are migrating a paravirtualized Xen
    guest. You can do it either on the running guest, or on the stopped guest
    using guestfs-tools.
   
After applying the changes described in this section, the image file related to the migrated VM Guest will not be usable under Xen anymore.
16.2.3.1 Install the default kernel #
After you install the default kernel, do not try to boot the Xen guest with it, as the system will not boot.
Before cloning the Xen guest disk image for use under the KVM hypervisor, make sure it is bootable without the Xen hypervisor. This is very important for paravirtualized Xen guests as they usually contain a special Xen kernel, and often do not have a complete GRUB 2 boot loader installed.
- For SLES 11, update the - /etc/sysconfig/kernelfile. Change the- INITRD_MODULESparameter by removing all Xen drivers and replacing them with virtio drivers. Replace- INITRD_MODULES="xenblk xennet" - with - INITRD_MODULES="virtio_blk virtio_pci virtio_net virtio_balloon" - For SLES 12, search for - xenblk xennetin- /etc/dracut.conf.d/*.confand replace them with- virtio_blk virtio_pci virtio_net virtio_balloon
- Paravirtualized Xen guests run a specific Xen kernel. To run the guest under KVM, you need to install the default kernel. Note: Default kernel is already installed- You do not need to install the default kernel for a fully virtualized guest, as it is already installed. - Enter - rpm -q kernel-defaulton the Xen guest to find out whether the default kernel is installed. If not, install it with- zypper in kernel-default.- The kernel we are going to use to boot the guest under KVM must have virtio (paravirtualized) drivers available. Run the following command to find out. Do not forget to replace - 5.3.18-8with your kernel version:- >- sudosudo find /lib/modules/5.3.18-8-default/kernel/drivers/ -name virtio* /lib/modules/5.3.18-8-default/kernel/drivers/block/virtio_blk.ko /lib/modules/5.3.18-8-default/kernel/drivers/char/hw_random/virtio-rng.ko /lib/modules/5.3.18-8-default/kernel/drivers/char/virtio_console.ko /lib/modules/5.3.18-8-default/kernel/drivers/crypto/virtio ...
- Update - /etc/fstab. Change any storage devices from- xvdato- vda.
- Update the boot loader configuration. Enter - rpm -q grub2on the Xen guest to find out whether GRUB 2 is already installed. If not, install it with- zypper in grub2.- Now make the newly installed default kernel the default for booting the OS. Also remove/update the kernel command line options that may refer to Xen-specific devices. You can do it either with YaST ( › ), or manually: - Find the preferred Linux boot menu entry by listing them all: - >cat /boot/grub2/grub.cfg | grep 'menuentry '- Remember the order number (counted from zero) of the one you newly installed. 
- Set it as the default boot menu entry: - >- sudogrub2-set-default N- Replace N with the number of the boot menu entry you previously discovered. 
- Open - /etc/default/grubfor editing, and look for the- GRUB_CMDLINE_LINUX_DEFAULTand- GRUB_CMDLINE_LINUX_RECOVERYoptions. Remove or update any reference to Xen-specific devices. In the following example, you can replace- root=/dev/xvda1 disk=/dev/xvda console=xvc - with - root=/dev/vda1 disk=/dev/vda - Note that you need to remove all references to - xvc-type consoles (such as- xvc0).
 
- Update - device.mapin either the- /boot/grub2or- /boot/grub2-efidirectory, whichever that VM uses. Change any storage devices from- xvdato- vda.
- To import new default settings, run - grub2-mkconfig -o /boot/grub2/grub.cfg 
16.2.3.2 Update the guest for boot under KVM #
- Update the system to use the default serial console. List the configured consoles, and remove symbolic links to - xvc?ones.- >- sudols -l /etc/systemd/system/getty.target.wants/ getty@tty1.service -> /usr/lib/systemd/system/getty@.service getty@xvc0.service -> /usr/lib/systemd/system/getty@xvc0.service getty@xvc1.service -> /usr/lib/systemd/system/getty@xvc1.service # rm /etc/systemd/system/getty.target.wants/getty@xvc?.service
- Update the - /etc/securettyfile. Replace- xvc0with- ttyS0.
16.2.4 Update the Xen VM Guest configuration #
    This section describes how to export the configuration of the original
    Xen VM Guest, and what particular changes to apply to it so it can be
    imported as a KVM guest into libvirt.
   
16.2.4.1 Export the Xen VM Guest configuration #
First export the configuration of the guest and save it to a file. For example:
>sudovirsh dumpxml SLES11SP3 <domain type='xen'> <name>SLES11SP3</name> <uuid>fa9ea4d7-8f95-30c0-bce9-9e58ffcabeb2</uuid> <memory>524288</memory> <currentMemory>524288</currentMemory> <vcpu>1</vcpu> <bootloader>/usr/bin/pygrub</bootloader> <os> <type>linux</type> </os> <clock offset='utc'/> <on_poweroff>destroy</on_poweroff> <on_reboot>restart</on_reboot> <on_crash>restart</on_crash> <devices> <emulator>/usr/lib/xen/bin/qemu-dm</emulator> <disk type='file' device='disk'> <driver name='file'/> <source file='/var/lib/libvirt/images/SLES_11_SP2_JeOS.x86_64-0.0.2_para.raw'/> <target dev='xvda' bus='xen'/> </disk> <interface type='bridge'> <mac address='00:16:3e:2d:91:c3'/> <source bridge='br0'/> <script path='vif-bridge'/> </interface> <console type='pty'> <target type='xen' port='0'/> </console> <input type='mouse' bus='xen'/> <graphics type='vnc' port='-1' autoport='yes' keymap='en-us'/> </devices> </domain>
You can find detailed information on the libvirt XML format for VM Guest description at https://libvirt.org/formatdomain.html.
16.2.4.2 General changes to the guest configuration #
You need to make a few general changes to the exported Xen guest XML configuration to run it under the KVM hypervisor. The following applies to both fully virtualized and paravirtualized guests. Note that not all of the following XML elements need to be in your specific configuration.
      To refer to a node in the XML configuration file, an XPath syntax will be
      used throughout this document. For example, to refer to a
      <name> inside the
      <domain> tag
     
<domain> <name>sles11sp3</name> </domain>
      an XPath equivalent /domain/name will be used.
     
- Change the - typeattribute of the- /domainelement from- xento- kvm.
- Remove the - /domain/bootloaderelement section.
- Remove the - /domain/bootloader_argselement section.
- Change the - /domain/os/typeelement value from- linuxto- hvm.
- Add - <boot dev="hd"/>under the- /domain/oselement.
- Add the - archattribute to the- /domain/os/typeelement. Acceptable values are- arch=”x86_64”or- arch=”i686”
- Change the - /domain/devices/emulatorelement from- /usr/lib/xen/bin/qemu-dm'to- /usr/bin/qemu-kvm.
- For each disk associated with the paravirtualized (PV) guest, change the following: - Change the - nameattribute of the- /domain/devices/disk/driverelement from- fileto- qemu, and add a- typeattribute for the disk type. For example, valid options include- rawand- qcow2.
- Change the - devattribute of the- /domain/devices/disk/targetelement from- xvdato- vda.
- Change the - busattribute of the- /domain/devices/disk/targetelement from- xento- virtio.
 
- For each network interface card, make the following changes: - If there is a - modeldefined in- /domain/devices/interface, change its- typeattribute value to- virtio- <model type=”virtio”> 
- Delete all - /domain/devices/interface/scriptsections.
- Delete all - /domain/devices/interface/targetelements if the- devattribute starts with- vifor- vnetor- veth. If using a custom network then change the- devvalue to that target.
 
- Remove the - /domain/devices/consoleelement section if it exists.
- Remove the - /domain/devices/serialelement section if it exists.
- Change the - busattribute on the- /domain/devices/inputelement from- xento- ps2.
- Add the following element for memory ballooning features under the - /domain/deviceselement.- <memballoon model="virtio"/> 
      <target dev='hda' bus='ide'/> controls the
      device under which the disk is exposed to the guest OS. The
      dev attribute indicates the "logical" device name. The
      actual device name specified is not guaranteed to map to the device name
      in the guest OS. Therefore you may need to change the disk mapping on the
      boot loader command line. For example, if the boot loader expects a root
      disk to be hda2 but KVM still sees it as
      sda2, change the boot loader command line from
     
[...] root=/dev/hda2 resume=/dev/hda1 [...]
to
[...] root=/dev/sda2 resume=/dev/sda1 [...]
      In the case of paravirtualized xvda devices, change it
      to
     
[...] root=/dev/vda2 resume=/dev/vda1 [...]
Otherwise the VM Guest will refuse to boot in the KVM environment.
16.2.4.3 The target KVM guest configuration #
After having applied all the modifications mentioned above, you end up with the following configuration for your KVM guest:
<domain type='kvm'>
  <name>SLES11SP3</name>
  <uuid>fa9ea4d7-8f95-30c0-bce9-9e58ffcabeb2</uuid>
  <memory>524288</memory>
  <currentMemory>524288</currentMemory>
  <vcpu cpuset='0-3'>1</vcpu>
  <os>
    <type arch=”x86_64”>hvm</type>
    <boot dev="hd"/>
  </os>
  <clock offset='utc'/>
  <on_poweroff>destroy</on_poweroff>
  <on_reboot>restart</on_reboot>
  <on_crash>restart</on_crash>
  <devices>
    <emulator>/usr/bin/qemu-kvm</emulator>
    <disk type='file' device='disk'>
      <driver name='qemu' type="raw"/>
      <source file='/var/lib/libvirt/images/SLES_11_SP2_JeOS.x86_64-0.0.2_para.raw'/>
      <target dev='vda' bus='virtio'/>
    </disk>
    <interface type='bridge'>
      <mac address='00:16:3e:2d:91:c3'/>
      <source bridge='br0'/>
    </interface>
    <input type='mouse' bus='usb'/>
    <graphics type='vnc' port='5900' autoport='yes' keymap='en-us'/>
    <memballoon model="virtio"/>
  </devices>
</domain>
     Save the configuration to a file in your home directory, as
     SLES11SP3.xml, for example. After you import it, it will be
     copied to the default /etc/libvirt/qemu directory.
    
16.2.5 Migrate the VM Guest #
After you updated the VM Guest configuration, and applied necessary changes to the guest OS, shut down the original Xen guest, and run its clone under the KVM hypervisor.
- Shut down the guest on the Xen host by running - shutdown -h nowas- rootfrom the console.
- Copy the disk files associated with the VM Guest if needed. A default configuration will require the Xen disk files to be copied from - /var/lib/xen/imagesto- /var/lib/kvm/images. The- /var/lib/kvm/imagesdirectory may need to be created (as- root) if you have not previously created a VM Guest.
- Create the new domain, and register it with - libvirt:- >- sudovirsh define SLES11SP3.xml Domain SLES11SP3 defined from SLES11SP3.xml
- Verify that the new guest is seen in the KVM configuration: - >virsh list –all
- After the domain is created, you can start it: - >- sudovirsh start SLES11SP3 Domain SLES11SP3 started
16.3 More information #
For more information on libvirt, see https://libvirt.org.
   You can find more details on the libvirt XML format at
   https://libvirt.org/formatdomain.html.
  
For more information on virtualization with Xen and KVM, see the SUSE Linux Enterprise Server documentation at https://documentation.suse.com/.