]> git.proxmox.com Git - pve-docs.git/blob - qm.adoc
update auto generated docs
[pve-docs.git] / qm.adoc
1 [[chapter_virtual_machines]]
2 ifdef::manvolnum[]
3 qm(1)
4 =====
5 include::attributes.txt[]
6 :pve-toplevel:
7
8 NAME
9 ----
10
11 qm - Qemu/KVM Virtual Machine Manager
12
13
14 SYNOPSIS
15 --------
16
17 include::qm.1-synopsis.adoc[]
18
19 DESCRIPTION
20 -----------
21 endif::manvolnum[]
22 ifndef::manvolnum[]
23 Qemu/KVM Virtual Machines
24 =========================
25 include::attributes.txt[]
26 :pve-toplevel:
27 endif::manvolnum[]
28
29 // deprecates
30 // http://pve.proxmox.com/wiki/Container_and_Full_Virtualization
31 // http://pve.proxmox.com/wiki/KVM
32 // http://pve.proxmox.com/wiki/Qemu_Server
33
34 Qemu (short form for Quick Emulator) is an open source hypervisor that emulates a
35 physical computer. From the perspective of the host system where Qemu is
36 running, Qemu is a user program which has access to a number of local resources
37 like partitions, files, network cards which are then passed to an
38 emulated computer which sees them as if they were real devices.
39
40 A guest operating system running in the emulated computer accesses these
41 devices, and runs as it were running on real hardware. For instance you can pass
42 an iso image as a parameter to Qemu, and the OS running in the emulated computer
43 will see a real CDROM inserted in a CD drive.
44
45 Qemu can emulates a great variety of hardware from ARM to Sparc, but {pve} is
46 only concerned with 32 and 64 bits PC clone emulation, since it represents the
47 overwhelming majority of server hardware. The emulation of PC clones is also one
48 of the fastest due to the availability of processor extensions which greatly
49 speed up Qemu when the emulated architecture is the same as the host
50 architecture.
51
52 NOTE: You may sometimes encounter the term _KVM_ (Kernel-based Virtual Machine).
53 It means that Qemu is running with the support of the virtualization processor
54 extensions, via the Linux kvm module. In the context of {pve} _Qemu_ and
55 _KVM_ can be use interchangeably as Qemu in {pve} will always try to load the kvm
56 module.
57
58 Qemu inside {pve} runs as a root process, since this is required to access block
59 and PCI devices.
60
61
62 Emulated devices and paravirtualized devices
63 --------------------------------------------
64
65 The PC hardware emulated by Qemu includes a mainboard, network controllers,
66 scsi, ide and sata controllers, serial ports (the complete list can be seen in
67 the `kvm(1)` man page) all of them emulated in software. All these devices
68 are the exact software equivalent of existing hardware devices, and if the OS
69 running in the guest has the proper drivers it will use the devices as if it
70 were running on real hardware. This allows Qemu to runs _unmodified_ operating
71 systems.
72
73 This however has a performance cost, as running in software what was meant to
74 run in hardware involves a lot of extra work for the host CPU. To mitigate this,
75 Qemu can present to the guest operating system _paravirtualized devices_, where
76 the guest OS recognizes it is running inside Qemu and cooperates with the
77 hypervisor.
78
79 Qemu relies on the virtio virtualization standard, and is thus able to presente
80 paravirtualized virtio devices, which includes a paravirtualized generic disk
81 controller, a paravirtualized network card, a paravirtualized serial port,
82 a paravirtualized SCSI controller, etc ...
83
84 It is highly recommended to use the virtio devices whenever you can, as they
85 provide a big performance improvement. Using the virtio generic disk controller
86 versus an emulated IDE controller will double the sequential write throughput,
87 as measured with `bonnie++(8)`. Using the virtio network interface can deliver
88 up to three times the throughput of an emulated Intel E1000 network card, as
89 measured with `iperf(1)`. footnote:[See this benchmark on the KVM wiki
90 http://www.linux-kvm.org/page/Using_VirtIO_NIC]
91
92
93 [[qm_virtual_machines_settings]]
94 Virtual Machines Settings
95 -------------------------
96
97 Generally speaking {pve} tries to choose sane defaults for virtual machines
98 (VM). Make sure you understand the meaning of the settings you change, as it
99 could incur a performance slowdown, or putting your data at risk.
100
101
102 [[qm_general_settings]]
103 General Settings
104 ~~~~~~~~~~~~~~~~
105
106 General settings of a VM include
107
108 * the *Node* : the physical server on which the VM will run
109 * the *VM ID*: a unique number in this {pve} installation used to identify your VM
110 * *Name*: a free form text string you can use to describe the VM
111 * *Resource Pool*: a logical group of VMs
112
113
114 [[qm_os_settings]]
115 OS Settings
116 ~~~~~~~~~~~
117
118 When creating a VM, setting the proper Operating System(OS) allows {pve} to
119 optimize some low level parameters. For instance Windows OS expect the BIOS
120 clock to use the local time, while Unix based OS expect the BIOS clock to have
121 the UTC time.
122
123
124 [[qm_hard_disk]]
125 Hard Disk
126 ~~~~~~~~~
127
128 Qemu can emulate a number of storage controllers:
129
130 * the *IDE* controller, has a design which goes back to the 1984 PC/AT disk
131 controller. Even if this controller has been superseded by more more designs,
132 each and every OS you can think has support for it, making it a great choice
133 if you want to run an OS released before 2003. You can connect up to 4 devices
134 on this controller.
135
136 * the *SATA* (Serial ATA) controller, dating from 2003, has a more modern
137 design, allowing higher throughput and a greater number of devices to be
138 connected. You can connect up to 6 devices on this controller.
139
140 * the *SCSI* controller, designed in 1985, is commonly found on server grade
141 hardware, and can connect up to 14 storage devices. {pve} emulates by default a
142 LSI 53C895A controller.
143 +
144 A SCSI controller of type _Virtio_ is the recommended setting if you aim for
145 performance and is automatically selected for newly created Linux VMs since
146 {pve} 4.3. Linux distributions have support for this controller since 2012, and
147 FreeBSD since 2014. For Windows OSes, you need to provide an extra iso
148 containing the drivers during the installation.
149 // https://pve.proxmox.com/wiki/Paravirtualized_Block_Drivers_for_Windows#During_windows_installation.
150
151 * The *Virtio* controller, also called virtio-blk to distinguish from
152 the Virtio SCSI controller, is an older type of paravirtualized controller
153 which has been superseded in features by the Virtio SCSI Controller.
154
155 On each controller you attach a number of emulated hard disks, which are backed
156 by a file or a block device residing in the configured storage. The choice of
157 a storage type will determine the format of the hard disk image. Storages which
158 present block devices (LVM, ZFS, Ceph) will require the *raw disk image format*,
159 whereas files based storages (Ext4, NFS, GlusterFS) will let you to choose
160 either the *raw disk image format* or the *QEMU image format*.
161
162 * the *QEMU image format* is a copy on write format which allows snapshots, and
163 thin provisioning of the disk image.
164 * the *raw disk image* is a bit-to-bit image of a hard disk, similar to what
165 you would get when executing the `dd` command on a block device in Linux. This
166 format do not support thin provisioning or snapshotting by itself, requiring
167 cooperation from the storage layer for these tasks. It is however 10% faster
168 than the *QEMU image format*. footnote:[See this benchmark for details
169 http://events.linuxfoundation.org/sites/events/files/slides/CloudOpen2013_Khoa_Huynh_v3.pdf]
170 * the *VMware image format* only makes sense if you intend to import/export the
171 disk image to other hypervisors.
172
173 Setting the *Cache* mode of the hard drive will impact how the host system will
174 notify the guest systems of block write completions. The *No cache* default
175 means that the guest system will be notified that a write is complete when each
176 block reaches the physical storage write queue, ignoring the host page cache.
177 This provides a good balance between safety and speed.
178
179 If you want the {pve} backup manager to skip a disk when doing a backup of a VM,
180 you can set the *No backup* option on that disk.
181
182 If your storage supports _thin provisioning_ (see the storage chapter in the
183 {pve} guide), and your VM has a *SCSI* controller you can activate the *Discard*
184 option on the hard disks connected to that controller. With *Discard* enabled,
185 when the filesystem of a VM marks blocks as unused after removing files, the
186 emulated SCSI controller will relay this information to the storage, which will
187 then shrink the disk image accordingly.
188
189 .IO Thread
190 The option *IO Thread* can only be enabled when using a disk with the *VirtIO* controller,
191 or with the *SCSI* controller, when the emulated controller type is *VirtIO SCSI*.
192 With this enabled, Qemu uses one thread per disk, instead of one thread for all,
193 so it should increase performance when using multiple disks.
194 Note that backups do not currently work with *IO Thread* enabled.
195
196
197 [[qm_cpu]]
198 CPU
199 ~~~
200
201 A *CPU socket* is a physical slot on a PC motherboard where you can plug a CPU.
202 This CPU can then contain one or many *cores*, which are independent
203 processing units. Whether you have a single CPU socket with 4 cores, or two CPU
204 sockets with two cores is mostly irrelevant from a performance point of view.
205 However some software is licensed depending on the number of sockets you have in
206 your machine, in that case it makes sense to set the number of of sockets to
207 what the license allows you, and increase the number of cores.
208
209 Increasing the number of virtual cpus (cores and sockets) will usually provide a
210 performance improvement though that is heavily dependent on the use of the VM.
211 Multithreaded applications will of course benefit from a large number of
212 virtual cpus, as for each virtual cpu you add, Qemu will create a new thread of
213 execution on the host system. If you're not sure about the workload of your VM,
214 it is usually a safe bet to set the number of *Total cores* to 2.
215
216 NOTE: It is perfectly safe to set the _overall_ number of total cores in all
217 your VMs to be greater than the number of of cores you have on your server (ie.
218 4 VMs with each 4 Total cores running in a 8 core machine is OK) In that case
219 the host system will balance the Qemu execution threads between your server
220 cores just like if you were running a standard multithreaded application.
221 However {pve} will prevent you to allocate on a _single_ machine more vcpus than
222 physically available, as this will only bring the performance down due to the
223 cost of context switches.
224
225 Qemu can emulate a number different of *CPU types* from 486 to the latest Xeon
226 processors. Each new processor generation adds new features, like hardware
227 assisted 3d rendering, random number generation, memory protection, etc ...
228 Usually you should select for your VM a processor type which closely matches the
229 CPU of the host system, as it means that the host CPU features (also called _CPU
230 flags_ ) will be available in your VMs. If you want an exact match, you can set
231 the CPU type to *host* in which case the VM will have exactly the same CPU flags
232 as your host system.
233
234 This has a downside though. If you want to do a live migration of VMs between
235 different hosts, your VM might end up on a new system with a different CPU type.
236 If the CPU flags passed to the guest are missing, the qemu process will stop. To
237 remedy this Qemu has also its own CPU type *kvm64*, that {pve} uses by defaults.
238 kvm64 is a Pentium 4 look a like CPU type, which has a reduced CPU flags set,
239 but is guaranteed to work everywhere.
240
241 In short, if you care about live migration and moving VMs between nodes, leave
242 the kvm64 default. If you don’t care about live migration, set the CPU type to
243 host, as in theory this will give your guests maximum performance.
244
245 You can also optionally emulate a *NUMA* architecture in your VMs. The basics of
246 the NUMA architecture mean that instead of having a global memory pool available
247 to all your cores, the memory is spread into local banks close to each socket.
248 This can bring speed improvements as the memory bus is not a bottleneck
249 anymore. If your system has a NUMA architecture footnote:[if the command
250 `numactl --hardware | grep available` returns more than one node, then your host
251 system has a NUMA architecture] we recommend to activate the option, as this
252 will allow proper distribution of the VM resources on the host system. This
253 option is also required in {pve} to allow hotplugging of cores and RAM to a VM.
254
255 If the NUMA option is used, it is recommended to set the number of sockets to
256 the number of sockets of the host system.
257
258
259 [[qm_memory]]
260 Memory
261 ~~~~~~
262
263 For each VM you have the option to set a fixed size memory or asking
264 {pve} to dynamically allocate memory based on the current RAM usage of the
265 host.
266
267 When choosing a *fixed size memory* {pve} will simply allocate what you
268 specify to your VM.
269
270 // see autoballoon() in pvestatd.pm
271 When choosing to *automatically allocate memory*, {pve} will make sure that the
272 minimum amount you specified is always available to the VM, and if RAM usage on
273 the host is below 80%, will dynamically add memory to the guest up to the
274 maximum memory specified.
275
276 When the host is becoming short on RAM, the VM will then release some memory
277 back to the host, swapping running processes if needed and starting the oom
278 killer in last resort. The passing around of memory between host and guest is
279 done via a special `balloon` kernel driver running inside the guest, which will
280 grab or release memory pages from the host.
281 footnote:[A good explanation of the inner workings of the balloon driver can be found here https://rwmj.wordpress.com/2010/07/17/virtio-balloon/]
282
283 When multiple VMs use the autoallocate facility, it is possible to set a
284 *Shares* coefficient which indicates the relative amount of the free host memory
285 that each VM shoud take. Suppose for instance you have four VMs, three of them
286 running a HTTP server and the last one is a database server. To cache more
287 database blocks in the database server RAM, you would like to prioritize the
288 database VM when spare RAM is available. For this you assign a Shares property
289 of 3000 to the database VM, leaving the other VMs to the Shares default setting
290 of 1000. The host server has 32GB of RAM, and is curring using 16GB, leaving 32
291 * 80/100 - 16 = 9GB RAM to be allocated to the VMs. The database VM will get 9 *
292 3000 / (3000 + 1000 + 1000 + 1000) = 4.5 GB extra RAM and each HTTP server will
293 get 1/5 GB.
294
295 All Linux distributions released after 2010 have the balloon kernel driver
296 included. For Windows OSes, the balloon driver needs to be added manually and can
297 incur a slowdown of the guest, so we don't recommend using it on critical
298 systems.
299 // see https://forum.proxmox.com/threads/solved-hyper-threading-vs-no-hyper-threading-fixed-vs-variable-memory.20265/
300
301 When allocating RAMs to your VMs, a good rule of thumb is always to leave 1GB
302 of RAM available to the host.
303
304
305 [[qm_network_device]]
306 Network Device
307 ~~~~~~~~~~~~~~
308
309 Each VM can have many _Network interface controllers_ (NIC), of four different
310 types:
311
312 * *Intel E1000* is the default, and emulates an Intel Gigabit network card.
313 * the *VirtIO* paravirtualized NIC should be used if you aim for maximum
314 performance. Like all VirtIO devices, the guest OS should have the proper driver
315 installed.
316 * the *Realtek 8139* emulates an older 100 MB/s network card, and should
317 only be used when emulating older operating systems ( released before 2002 )
318 * the *vmxnet3* is another paravirtualized device, which should only be used
319 when importing a VM from another hypervisor.
320
321 {pve} will generate for each NIC a random *MAC address*, so that your VM is
322 addressable on Ethernet networks.
323
324 The NIC you added to the VM can follow one of two differents models:
325
326 * in the default *Bridged mode* each virtual NIC is backed on the host by a
327 _tap device_, ( a software loopback device simulating an Ethernet NIC ). This
328 tap device is added to a bridge, by default vmbr0 in {pve}. In this mode, VMs
329 have direct access to the Ethernet LAN on which the host is located.
330 * in the alternative *NAT mode*, each virtual NIC will only communicate with
331 the Qemu user networking stack, where a builting router and DHCP server can
332 provide network access. This built-in DHCP will serve adresses in the private
333 10.0.2.0/24 range. The NAT mode is much slower than the bridged mode, and
334 should only be used for testing.
335
336 You can also skip adding a network device when creating a VM by selecting *No
337 network device*.
338
339 .Multiqueue
340 If you are using the VirtIO driver, you can optionally activate the
341 *Multiqueue* option. This option allows the guest OS to process networking
342 packets using multiple virtual CPUs, providing an increase in the total number
343 of packets transfered.
344
345 //http://blog.vmsplice.net/2011/09/qemu-internals-vhost-architecture.html
346 When using the VirtIO driver with {pve}, each NIC network queue is passed to the
347 host kernel, where the queue will be processed by a kernel thread spawn by the
348 vhost driver. With this option activated, it is possible to pass _multiple_
349 network queues to the host kernel for each NIC.
350
351 //https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Virtualization_Tuning_and_Optimization_Guide/sect-Virtualization_Tuning_Optimization_Guide-Networking-Techniques.html#sect-Virtualization_Tuning_Optimization_Guide-Networking-Multi-queue_virtio-net
352 When using Multiqueue, it is recommended to set it to a value equal
353 to the number of Total Cores of your guest. You also need to set in
354 the VM the number of multi-purpose channels on each VirtIO NIC with the ethtool
355 command:
356
357 `ethtool -L eth0 combined X`
358
359 where X is the number of the number of vcpus of the VM.
360
361 You should note that setting the Multiqueue parameter to a value greater
362 than one will increase the CPU load on the host and guest systems as the
363 traffic increases. We recommend to set this option only when the VM has to
364 process a great number of incoming connections, such as when the VM is running
365 as a router, reverse proxy or a busy HTTP server doing long polling.
366
367
368 USB Passthrough
369 ~~~~~~~~~~~~~~~
370
371 There are two different types of USB passthrough devices:
372
373 * Host USB passtrough
374 * SPICE USB passthrough
375
376 Host USB passthrough works by giving a VM a USB device of the host.
377 This can either be done via the vendor- and product-id, or
378 via the host bus and port.
379
380 The vendor/product-id looks like this: *0123:abcd*,
381 where *0123* is the id of the vendor, and *abcd* is the id
382 of the product, meaning two pieces of the same usb device
383 have the same id.
384
385 The bus/port looks like this: *1-2.3.4*, where *1* is the bus
386 and *2.3.4* is the port path. This represents the physical
387 ports of your host (depending of the internal order of the
388 usb controllers).
389
390 If a device is present in a VM configuration when the VM starts up,
391 but the device is not present in the host, the VM can boot without problems.
392 As soon as the device/port ist available in the host, it gets passed through.
393
394 WARNING: Using this kind of USB passthrough, means that you cannot move
395 a VM online to another host, since the hardware is only available
396 on the host the VM is currently residing.
397
398 The second type of passthrough is SPICE USB passthrough. This is useful
399 if you use a SPICE client which supports it. If you add a SPICE USB port
400 to your VM, you can passthrough a USB device from where your SPICE client is,
401 directly to the VM (for example an input device or hardware dongle).
402
403
404 [[qm_bios_and_uefi]]
405 BIOS and UEFI
406 ~~~~~~~~~~~~~
407
408 In order to properly emulate a computer, QEMU needs to use a firmware.
409 By default QEMU uses *SeaBIOS* for this, which is an open-source, x86 BIOS
410 implementation. SeaBIOS is a good choice for most standard setups.
411
412 There are, however, some scenarios in which a BIOS is not a good firmware
413 to boot from, e.g. if you want to do VGA passthrough. footnote:[Alex Williamson has a very good blog entry about this.
414 http://vfio.blogspot.co.at/2014/08/primary-graphics-assignment-without-vga.html]
415 In such cases, you should rather use *OVMF*, which is an open-source UEFI implemenation. footnote:[See the OVMF Project http://www.tianocore.org/ovmf/]
416
417 If you want to use OVMF, there are several things to consider:
418
419 In order to save things like the *boot order*, there needs to be an EFI Disk.
420 This disk will be included in backups and snapshots, and there can only be one.
421
422 You can create such a disk with the following command:
423
424 qm set <vmid> -efidisk0 <storage>:1,format=<format>
425
426 Where *<storage>* is the storage where you want to have the disk, and
427 *<format>* is a format which the storage supports. Alternatively, you can
428 create such a disk through the web interface with 'Add' -> 'EFI Disk' in the
429 hardware section of a VM.
430
431 When using OVMF with a virtual display (without VGA passthrough),
432 you need to set the client resolution in the OVMF menu(which you can reach
433 with a press of the ESC button during boot), or you have to choose
434 SPICE as the display type.
435
436 [[qm_startup_and_shutdown]]
437 Automatic Start and Shutdown of Virtual Machines
438 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
439
440 After creating your VMs, you probably want them to start automatically
441 when the host system boots. For this you need to select the option 'Start at
442 boot' from the 'Options' Tab of your VM in the web interface, or set it with
443 the following command:
444
445 qm set <vmid> -onboot 1
446
447 In some case you want to be able to fine tune the boot order of your VMs, for
448 instance if one of your VM is providing firewalling or DHCP to other guest
449 systems.
450 For this you can use the following parameters:
451
452 * *Start/Shutdown order*: Defines the start order priority. E.g. set it to 1 if
453 you want the VM to be the first to be started. (We use the reverse startup
454 order for shutdown, so a machine with a start order of 1 would be the last to
455 be shut down)
456 * *Startup delay*: Defines the interval between this VM start and subsequent
457 VMs starts . E.g. set it to 240 if you want to wait 240 seconds before starting
458 other VMs.
459 * *Shutdown timeout*: Defines the duration in seconds {pve} should wait
460 for the VM to be offline after issuing a shutdown command.
461 By default this value is set to 60, which means that {pve} will issue a
462 shutdown request, wait 60s for the machine to be offline, and if after 60s
463 the machine is still online will notify that the shutdown action failed.
464
465 Please note that machines without a Start/Shutdown order parameter will always
466 start after those where the parameter is set, and this parameter only
467 makes sense between the machines running locally on a host, and not
468 cluster-wide.
469
470 Managing Virtual Machines with `qm`
471 ------------------------------------
472
473 qm is the tool to manage Qemu/Kvm virtual machines on {pve}. You can
474 create and destroy virtual machines, and control execution
475 (start/stop/suspend/resume). Besides that, you can use qm to set
476 parameters in the associated config file. It is also possible to
477 create and delete virtual disks.
478
479 CLI Usage Examples
480 ~~~~~~~~~~~~~~~~~~
481
482 Create a new VM with 4 GB IDE disk.
483
484 qm create 300 -ide0 4 -net0 e1000 -cdrom proxmox-mailgateway_2.1.iso
485
486 Start the new VM
487
488 qm start 300
489
490 Send a shutdown request, then wait until the VM is stopped.
491
492 qm shutdown 300 && qm wait 300
493
494 Same as above, but only wait for 40 seconds.
495
496 qm shutdown 300 && qm wait 300 -timeout 40
497
498
499 [[qm_configuration]]
500 Configuration
501 -------------
502
503 VM configuration files are stored inside the Proxmox cluster file
504 system, and can be accessed at `/etc/pve/qemu-server/<VMID>.conf`.
505 Like other files stored inside `/etc/pve/`, they get automatically
506 replicated to all other cluster nodes.
507
508 NOTE: VMIDs < 100 are reserved for internal purposes, and VMIDs need to be
509 unique cluster wide.
510
511 .Example VM Configuration
512 ----
513 cores: 1
514 sockets: 1
515 memory: 512
516 name: webmail
517 ostype: l26
518 bootdisk: virtio0
519 net0: e1000=EE:D2:28:5F:B6:3E,bridge=vmbr0
520 virtio0: local:vm-100-disk-1,size=32G
521 ----
522
523 Those configuration files are simple text files, and you can edit them
524 using a normal text editor (`vi`, `nano`, ...). This is sometimes
525 useful to do small corrections, but keep in mind that you need to
526 restart the VM to apply such changes.
527
528 For that reason, it is usually better to use the `qm` command to
529 generate and modify those files, or do the whole thing using the GUI.
530 Our toolkit is smart enough to instantaneously apply most changes to
531 running VM. This feature is called "hot plug", and there is no
532 need to restart the VM in that case.
533
534
535 File Format
536 ~~~~~~~~~~~
537
538 VM configuration files use a simple colon separated key/value
539 format. Each line has the following format:
540
541 -----
542 # this is a comment
543 OPTION: value
544 -----
545
546 Blank lines in those files are ignored, and lines starting with a `#`
547 character are treated as comments and are also ignored.
548
549
550 [[qm_snapshots]]
551 Snapshots
552 ~~~~~~~~~
553
554 When you create a snapshot, `qm` stores the configuration at snapshot
555 time into a separate snapshot section within the same configuration
556 file. For example, after creating a snapshot called ``testsnapshot'',
557 your configuration file will look like this:
558
559 .VM configuration with snapshot
560 ----
561 memory: 512
562 swap: 512
563 parent: testsnaphot
564 ...
565
566 [testsnaphot]
567 memory: 512
568 swap: 512
569 snaptime: 1457170803
570 ...
571 ----
572
573 There are a few snapshot related properties like `parent` and
574 `snaptime`. The `parent` property is used to store the parent/child
575 relationship between snapshots. `snaptime` is the snapshot creation
576 time stamp (Unix epoch).
577
578
579 [[qm_options]]
580 Options
581 ~~~~~~~
582
583 include::qm.conf.5-opts.adoc[]
584
585
586 Locks
587 -----
588
589 Online migrations, snapshots and backups (`vzdump`) set a lock to
590 prevent incompatible concurrent actions on the affected VMs. Sometimes
591 you need to remove such a lock manually (e.g., after a power failure).
592
593 qm unlock <vmid>
594
595 CAUTION: Only do that if you are sure the action which set the lock is
596 no longer running.
597
598
599 ifdef::manvolnum[]
600
601 Files
602 ------
603
604 `/etc/pve/qemu-server/<VMID>.conf`::
605
606 Configuration file for the VM '<VMID>'.
607
608
609 include::pve-copyright.adoc[]
610 endif::manvolnum[]