From nobody Mon Nov 25 20:34:07 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 207.211.31.81 as permitted sender) client-ip=207.211.31.81; envelope-from=libvir-list-bounces@redhat.com; helo=us-smtp-delivery-1.mimecast.com; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 207.211.31.81 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1596105220; cv=none; d=zohomail.com; s=zohoarc; b=HXUsNau80yI6gltfAExQPRNteTceQZ/S3qMbIJBCwyEtZs1wcV5ATbYjKEwNXGkWd1r9+ikaB8khru+NhMjaMzB1ZMWRILZolZ67mUgR/wh6yxBfK/K7jJd4mOLZxH/eiNnjIo/yXoHjW0c8+C8oylNNW0vt96Bv95Q+f9g+vd4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1596105220; h=Content-Type:Content-Transfer-Encoding:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=DmHRBmVdvC1CjVIExA9Y7MzduOvdfwPnq46/sRoXpa4=; b=ac2YPLo5EdUD7YSzXIXg0/5uGdnvYDVs7GjvJPvo2buomqX6LlndDri3u3BtL5mQmM7goMTBz9wvqktNZapzVCSXzaEqvVW3GTRXD7qbnIfvOAkjGwepW2dLfWtSCjZ7pqRqf1qiOnerDPCNohIBgy67WWkgGvPp7OuyCUZUhoM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of redhat.com designates 207.211.31.81 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from us-smtp-delivery-1.mimecast.com (us-smtp-1.mimecast.com [207.211.31.81]) by mx.zohomail.com with SMTPS id 1596105220982403.39654075691726; Thu, 30 Jul 2020 03:33:40 -0700 (PDT) Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-401-BevRsrOkM4moQve_DebHiA-1; Thu, 30 Jul 2020 06:33:37 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 74B5D57; Thu, 30 Jul 2020 10:33:32 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 524758A19E; Thu, 30 Jul 2020 10:33:32 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 1F5FD95A7E; Thu, 30 Jul 2020 10:33:32 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 06UAUbvn021001 for ; Thu, 30 Jul 2020 06:30:37 -0400 Received: by smtp.corp.redhat.com (Postfix) id C76DC7193A; Thu, 30 Jul 2020 10:30:37 +0000 (UTC) Received: from speedmetal.redhat.com (unknown [10.40.208.38]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3389E71906 for ; Thu, 30 Jul 2020 10:30:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1596105219; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:list-id:list-help: list-unsubscribe:list-subscribe:list-post; bh=DmHRBmVdvC1CjVIExA9Y7MzduOvdfwPnq46/sRoXpa4=; b=ARpIagACsedayJnHHWu/6xyaVorihBb1VyYfb0yQVz8cwEvRRZDiUTnBXnqEO5Xp2qmHHz hGE/OW3mfxkXWNLmXsjqOopU2azez9DIs7wlqTOt5/j/T9A3NCdSZ24lvJwtybp/uhNwlx eFfecsRzabXGOSG0DCO3mZtJW1+IVJU= X-MC-Unique: BevRsrOkM4moQve_DebHiA-1 From: Peter Krempa To: libvir-list@redhat.com Subject: [PATCH 1/3] docs: kbase: Convert 'kbase' article registry to RST Date: Thu, 30 Jul 2020 12:30:30 +0200 Message-Id: <4dcaea53d8c18e040406f66eba96857f4dfd9ee5.1596104822.git.pkrempa@redhat.com> In-Reply-To: References: MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-loop: libvir-list@redhat.com X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @redhat.com) Content-Type: text/plain; charset="utf-8" Signed-off-by: Peter Krempa --- docs/kbase.html.in | 54 ---------------------------------------------- docs/kbase.rst | 43 ++++++++++++++++++++++++++++++++++++ docs/meson.build | 2 +- 3 files changed, 44 insertions(+), 55 deletions(-) delete mode 100644 docs/kbase.html.in create mode 100644 docs/kbase.rst diff --git a/docs/kbase.html.in b/docs/kbase.html.in deleted file mode 100644 index 3ca0d0734d..0000000000 --- a/docs/kbase.html.in +++ /dev/null @@ -1,54 +0,0 @@ - - - - -

Knowledge base

- -
-
-
Disk locking
-
Ensuring exclusive guest access to disks with - virtlockd or - Sanlock
- -
Secure usage
-
Secure usage of the libvirt APIs
- -
Protected virtualiz= ation on s390
-
Running secure s390 guests with IBM Secure Execution
- -
Launch security=
-
Securely launching VMs with AMD SEV
- -
Domain state - capture
-
Comparison between different methods of capturing domain - state
- -
RPM deployment
-
Explanation of the different RPM packages and illustration of - which to pick for installation
- -
Backing chain management=
-
Explanation of how disk backing chain specification impacts li= bvirt's - behaviour and basic troubleshooting steps of disk problems.
- -
Security with= QEMU passthrough
-
Examination of the security protections used for QEMU and how = they need - configuring to allow use of QEMU passthrough with host files/dev= ices.
- -
Virtio-FS
-
Share a filesystem between the guest and the host
- -
KVM real time
-
Run real time workloads in guests on a KVM hypervisor
- -
Incremental = backup internals
-
Incremental backup implementation details relevant for users -
-
- -
- - - diff --git a/docs/kbase.rst b/docs/kbase.rst new file mode 100644 index 0000000000..509fb6e34e --- /dev/null +++ b/docs/kbase.rst @@ -0,0 +1,43 @@ +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +Knowledge base +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +.. container:: panel + + `Disk locking `__ + Ensuring exclusive guest access to disks with + `virtlockd `__ or + `Sanlock `__ + + `Secure usage `__ + Secure usage of the libvirt APIs + + `Protected virtualization on s390 `__ + Running secure s390 guests with IBM Secure Execution + + `Launch security `__ + Securely launching VMs with AMD SEV + + `Domain state capture `__ + Comparison between different methods of capturing domain state + + `RPM deployment `__ + Explanation of the different RPM packages and illustration of which = to + pick for installation + + `Backing chain management `__ + Explanation of how disk backing chain specification impacts libvirt's + behaviour and basic troubleshooting steps of disk problems. + + `Security with QEMU passthrough `= __ + Examination of the security protections used for QEMU and how they n= eed + configuring to allow use of QEMU passthrough with host files/devices. + + `Virtio-FS `__ + Share a filesystem between the guest and the host + + `KVM real time `__ + Run real time workloads in guests on a KVM hypervisor + + `Incremental backup internals `__ + Incremental backup implementation details relevant for users diff --git a/docs/meson.build b/docs/meson.build index c2d7fd1bf4..2f06e8eace 100644 --- a/docs/meson.build +++ b/docs/meson.build @@ -87,7 +87,6 @@ docs_html_in_files =3D [ 'index', 'internals', 'java', - 'kbase', 'logging', 'migration', 'nss', @@ -119,6 +118,7 @@ docs_rst_files =3D [ 'formatbackup', 'formatcheckpoint', 'hacking', + 'kbase', 'libvirt-go', 'libvirt-go-xml', 'newreposetup', --=20 2.26.2