admin 发表于 2023-1-15 10:00:00

从openstack上导出系统,到kvm环境启动虚机过程

找到对应的卷:
# rbd ls -p hdd-volumes |grep 45c2ff86-644d-4a7e-a9a8-e2d2b882cc2b
volume-45c2ff86-644d-4a7e-a9a8-e2d2b882cc2b

export       export-diff
# rbd export hdd-volumes/volume-45c2ff86-644d-4a7e-a9a8-e2d2b882cc2b windows2019.raw
Exporting image: 100% complete...done.
# ls

windows2019.raw
# scp windows2019.raw 192.168.10.43:/kvm
The authenticity of host '192.168.10.43 (192.168.10.43)' can't be established.
ECDSA key fingerprint is SHA256:cv23P6291ltGHfoUgYqs3vLkLyWOJySxy81kFdOIRHw.
ECDSA key fingerprint is MD5:b0:51:06:9f:a4:80:0e:a9:c1:15:25:c8:45:33:b7:4b.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.10.43' (ECDSA) to the list of known hosts.

Authorized users only. All activities may be monitored and reported.
root@192.168.10.43's password:
windows2019.raw                                                 100%   50GB 109.9MB/s   07:46   

启动虚机:
virt-install --name vpnserver-windows2019 --ram 16384 --vcpus=6 --disk path=/kvm2/windows2019.raw,bus=ide,format=raw --vnc --vncport=5916 --vnclisten=0.0.0.0 --network=bridge:br0--force --import--autostart --noautoconsole
编辑虚机:
# virsh edit vpnserver-windows2019
Domain vpnserver-windows2019 XML configuration edited.

如果要修改mac地址:
找到mac 项,改成需要的mac地址,重启虚机即可

# virsh destroy vpnserver-windows2019
Domain vpnserver-windows2019 destroyed

# virsh start vpnserver-windows2019
Domain vpnserver-windows2019 started

# virsh domiflist vpnserver-windows2019
Interface   Type   Source   Model   MAC
----------------------------------------------------------
vnet18      bridge   br0      e1000   60:f6:77:4b:ea:f1

页: [1]
查看完整版本: 从openstack上导出系统,到kvm环境启动虚机过程