Knowledge base

Debug logs

Configuration of logging and tips on how to file a good bug report.

Disk locking

Ensuring exclusive guest access to disks with virtlockd or Sanlock

Secure usage

Secure usage of the libvirt APIs

Protected virtualization on s390

Running secure s390 guests with IBM Secure Execution

Launch security

Securely launching VMs with AMD SEV

Domain state capture

Comparison between different methods of capturing domain state

RPM deployment

Explanation of the different RPM packages and illustration of which to pick for installation

Backing chain management

Explanation of how disk backing chain specification impacts libvirt's behaviour and basic troubleshooting steps of disk problems.

Security with QEMU passthrough

Examination of the security protections used for QEMU and how they need configuring to allow use of QEMU passthrough with host files/devices.


Explanation of how to use systemtap for libvirt tracing.


Share a filesystem between the guest and the host

KVM real time

Run real time workloads in guests on a KVM hypervisor

Incremental backup internals

Incremental backup implementation details relevant for users

VM migration internals

VM migration implementation details, complementing the info in migration