Funtoo - How to virt-manager: Difference between revisions
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
Note: Some extra video driver are needed and iptables is mandatory! If under Gentoo, you will need rebuild or check if already build modules in the kernel, see [https://wiki.gentoo.org/wiki/QEMU QEMU documentation] | Note: Some extra video driver are needed and iptables is mandatory! If under Gentoo, you will need rebuild or check if already build modules in the kernel, see [https://wiki.gentoo.org/wiki/QEMU QEMU documentation] | ||
# emerge --ask virt-manager xf86-video-qxl app-emulation/spice spice-gtk spice-protocol net-firewall/iptables | # emerge --ask virt-manager qemu xf86-video-qxl app-emulation/spice spice-gtk spice-protocol net-firewall/iptables | ||
# dispatch-conf | # dispatch-conf | ||
# emerge --ask virt-manager xf86-video-qxl app-emulation/spice spice-gtk spice-protocol net-firewall/iptables | # emerge --ask virt-manager qemu xf86-video-qxl app-emulation/spice spice-gtk spice-protocol net-firewall/iptables | ||
* Take a cup of coffee ^^ | * Take a cup of coffee ^^ |
Revision as of 15:05, 26 May 2018
'Help to install Virt-manager on Funtoo and Gentoo.'
Installing virt-manager
In order to user the power of virtualization under Funtoo / Gentoo, you will need to install the following packets:
Note: Some extra video driver are needed and iptables is mandatory! If under Gentoo, you will need rebuild or check if already build modules in the kernel, see QEMU documentation
# emerge --ask virt-manager qemu xf86-video-qxl app-emulation/spice spice-gtk spice-protocol net-firewall/iptables # dispatch-conf # emerge --ask virt-manager qemu xf86-video-qxl app-emulation/spice spice-gtk spice-protocol net-firewall/iptables
- Take a cup of coffee ^^
After the installation please add you user to kvm & libvirt group (or create it) and start libvirt daemon as follow and add it as default to start after reboot:
# gpasswd -a USER kvm ## groupadd kvm # gpasswd -a USER libvirt ## groupadd libvirt # /etc/init.d/libvirtd start # rc-update add libvirtd default
Configure polkit
Then we will add some changes of the default configuration, so that your user can use virt-manager without password and without to be root:
# mkdir -p /etc/polkit-l/localauthority/50-local.d # vim /etc/polkit-l/localauthority/50-local.d/org.libvirt.unix.manage.pkla [Allow group libvirt management permissions] Identity=unix-group:libvirt Action=org.libvirt.unix.manage ResultAny=yes ResultInactive=yes ResultActive=yes
Creating TUN/TAP device
This allows the guest to communicate with the bridge. QEMU's default group is kvm, ensure that the correct group is given permissions to control the TAP. Enabling promiscuous mode (promisc) for the adapter might be unnecessary.
# modprobe tun ## or reboot your computer!
Test your installation
Now you should ready to go, just try to start virt-manager and see if ask you for a password or not ^^
$ virt-manager