Overview of the XenServer API¶
This chapter introduces the XenServer API (after here referred to as the "API") and its associated object model. The API has the following key features:
Management of all aspects of the XenServer Host.
The API allows you to manage VMs, storage, networking, host configuration, and pools. Performance and status metrics can also be queried from the API.
Persistent Object Model.
The results of all side-effecting operations (for example: object creation, deletion, and parameter changes) are persisted in a server-side database that is managed by XenServer.
An event mechanism.
Through the API, clients can register to be notified when persistent (server-side) objects are changed. This enables applications to track datamodel changes performed by concurrently executing clients.
Synchronous and asynchronous invocation.
All API calls can be invoked synchronously (that is, block until completion). Any API call that might be long-running can also be invoked asynchronously. Asynchronous calls return immediately with a reference to a task object. This task object can be queried (through the API) for progress and status information. When an asynchronously invoked operation completes, the result (or error code) is available from the task object.
Remotable and Cross-Platform.
The client issuing the API calls doesn't have to be resident on the host being managed. The client also does not have to be connected to the host over ssh to execute the API. API calls use the RPC protocol to transmit requests and responses over the network.
Secure and Authenticated Access.
The RPC API backend executing on the host accepts secure socket connections. This allows a client to execute the APIs over the https protocol. Further, all the API calls execute in the context of a login session generated through user name and password validation at the server. This provides secure and authenticated access to the XenServer installation.
XenServer API Deprecation Policy¶
Items that will be removed in a future release are marked as deprecated.
By default, Citrix will continue to support deprecated APIs and product functionality up to and including the next XenServer Long Term Service Release (LTSR). Deprecated items will usually be removed in a Current Release following that LTSR.
In exceptional cases, an item might be deprecated and removed before the next LTSR. For example, a change might be required to improve security. If this happens, Citrix will make customers aware of the change to the API or the product functionality.
This deprecation policy applies only to APIs and functionality that are documented at the following locations:
Getting Started with the API¶
Let's start our tour of the API by describing the calls required to create a VM on a XenServer installation, and take it through a start/suspend/resume/stop cycle. This section does not reference code in any specific language. At this stage we just describe the informal sequence of RPC invocations that do our "install and start" task.
We recommend strongly against using the
VM.createcall, which might be removed or changed in a future version of the API. Read on to learn other ways to make a new VM.
Authentication: acquiring a session reference¶
The first step is to call
Session.login_with_password(username, password, client_API_version, originator). The API is session based, so before you can make other calls you must authenticate with the server. Assuming the user name and password are authenticated correctly, the result of this
call is a session reference. Subsequent API calls take the session
reference as a parameter. In this way, we ensure that only API users who
are suitably authorized can perform operations on a XenServer
installation. You can continue to use the same session for any number of
API calls. When you have finished the session,
recommends that you call
Session.logout(session) to clean up: see
Acquiring a list of templates to base a new VM installation on¶
The next step is to query the list of "templates" on the host. Templates
are specially marked VM objects that specify suitable default parameters
for various supported guest types. (If you want to see a quick
enumeration of the templates on a XenServer installation for
yourself, you can execute the
xe template-list CLI command.) To
get a list of templates from the API, find the VM objects on
the server that have their
is_a_template field set to true. One way to
do find these objects is by calling
VM.get_all_records(session) where the session parameter is the reference we acquired
Session.login_with_password call earlier. This call queries the server, returning a
snapshot (taken at the time of the call) containing all the VM object
references and their field values.
(Remember that at this stage we are not concerned with how the returned object references and field values can be manipulated in any particular client language: that detail is dealt with by each language-specific SDK and described concretely in the following chapter. For now, assume the existence of an abstract mechanism for reading and manipulating objects and field values returned by API calls.)
Now we have a snapshot of the VM objects' field values in the
memory of our client application, iterate through them and
find the VMs that have their
is_a_template value set to
true. At this
stage, let's assume that our example application further iterates through
the template objects and remembers the reference corresponding to the
one that has its "
name_label" set to "Debian Etch 4.0" (one of the
default Linux templates supplied with XenServer).
Installing the VM based on a template¶
Continuing through our example, we must now install a new VM based on the template we selected. The installation process requires two API calls:
First we must now invoke the API call
VM.clone(session, t_ref, "my first VM"). This call tells the server to clone the VM object referenced by
t_refto make a new VM object. The return value of this call is the VM reference corresponding to the newly created VM. Let's call this
At this stage, the object referred to by
new_vm_refis still a template (like the VM object referred to by
t_ref, from which it was cloned). To make
new_vm_refinto a VM object, we must call
VM.provision(session, new_vm_ref). When this call returns the
new_vm_refobject will have had its
is_a_templatefield set to false, indicating that
new_vm_refnow refers to a regular VM ready for starting.
The provision operation can take a few minutes, as it is as during this call that the template's disk images are created. For the Debian template, the newly created disks are also at this stage populated with a Debian root filesystem.
Taking the VM through a start/suspend/resume/stop cycle¶
Now we have an object reference representing our newly installed VM, it is trivial to take it through a few lifecycle operations:
To start our VM, we can call
After it's running, we can suspend it by calling
We can resume it by calling
We can call
VM.shutdown(session, new_vm_ref)to shut down the VM cleanly.
When an application is finished interacting with a XenServer Host,
it is good practice to call
Session.logout(session). This call invalidates
the session reference (so it cannot be used in subsequent API calls) and
deallocates server-side memory used to store the session object.
Although inactive sessions eventually time out, the server has a
hardcoded limit of 500 concurrent sessions for each
originator. After this limit has been reached, fresh logins evict
the session objects that have been used least recently. The session
references of these evicted session objects become invalid. For successful
interoperability with other applications, concurrently accessing the
server, the best policy is:
Choose a string that identifies your application and its version.
Create a single session at start-of-day, using that identifying string for the
Use this session throughout the application and then explicitly logout when possible.
Note: Sessions can be used across multiple separate client-server network connections.
If a poorly written client leaks sessions or otherwise exceeds the
limit, then as long as the client uses an appropriate
argument, it is easily identifiable from the XenServer logs.
XenServer destroys the longest-idle sessions of the rogue
client only. This behavior might cause problems for that client but not for other
clients. If the misbehaving client doesn't specify an
originator, it is harder to identify and causes
the premature destruction of other client sessions that also didn't
Install and start example: summary¶
We have seen how the API can be used to install a VM from a XenServer template and perform various lifecycle operations on it. Note that the number of calls we had to make to affect these operations was small:
One call to acquire a session:
One call to query the VM (and template) objects present on the XenServer installation:
VM.get_all_records(). Recall that we used the information returned from this call to select a suitable template to install from.
Two calls to install a VM from our chosen template:
VM.clone(), followed by
One call to start the resultant VM:
VM.start()(and similarly other single calls to suspend, resume, and shut down accordingly)
And then one call to log out
Although the API as a whole is complex and fully featured, common tasks (such as VM lifecycle operations) are straightforward, requiring only a few simple API calls. Keep this fact in mind as you study the next section which might, on first reading, appear a little daunting!
Object Model Overview¶
This section gives a high-level overview of the object model of the API. For a more detailed description of the parameters and methods of each class, see the XenServer API Reference document.
We start by giving a brief outline of some of the core classes that make up the API. (Don't worry if these definitions seem abstract in their initial presentation. The textual description in the following sections, and the code-sample walk through in the next Chapter make these concepts concrete.)
A VM object represents a particular virtual machine instance on a XenServer Host or Resource Pool. Example
pool_migrate; example parameters include
name_label. (In the previous section we saw how the VM class is used to represent both templates and regular VMs)
A host object represents a physical host in a XenServer pool. Example methods include
shutdown. Example parameters include
hostname, and [IP]
A VDI object represents a Virtual Disk Image. Virtual Disk Images can be attached to VMs. A
block device appears inside the VM through which the bits encapsulated by the attached Virtual Disk Image can be read
and written. Example methods of the VDI class include
clone. Example fields include
When we called
VM.provision on the VM template in our previous example, some VDI objects were automatically created to
represent the newly created disks. These VDIs were attached to the VM object.
An SR (Storage Repository) aggregates a collection of VDIs, It encapsulates the properties of physical storage on which the VDIs' bits reside. Example parameters include:
typewhich determines the storage-specific driver a XenServer installation uses to read/write the SR's VDIs
Example methods include
scanwhich invokes the storage-specific driver to acquire a list of the VDIs contained with the SR and the properties of these VDIs
createwhich initializes a block of physical storage so it is ready to store VDIs
A network object represents a layer-2 network that exists in the environment in which the XenServer Host instance lives. Since XenServer does not manage networks directly, network is a lightweight class that models physical and virtual network topology. VM and Host objects that are attached to a particular Network object can send network packets to each other. The objects are attached through VIF and PIF instances. For more information, see the following section.
If you are finding this enumeration of classes rather terse, you can skip to the code walk-throughs of the next chapter. There are plenty of useful applications that can be written using only a subset of the classes already described. If you want to continue this description of classes in the abstract, read on.
In addition to the classes listed in the previous section, there are four more that act as connectors. These connectors specify relationships between VMs and Hosts and Storage and Networks. The first two of these classes that we consider, VBD and VIF, determine how VMs are attached to virtual disks and network objects respectively.
A VBD (Virtual Block Device) object represents an attachment between a VM and a VDI. When a VM is booted, its VBD objects are queried to determine which disk images (VDIs) to attach. Example methods of the VBD class include:
plugwhich hot plugs a disk device into a running VM, making the specified VDI accessible therein
unplugwhich hot unplugs a disk device from a running guest
Example fields include:
devicewhich determines the device name inside the guest under which the specified VDI is made accessible
A VIF (Virtual Network Interface) object represents an attachment between a VM and a Network object. When a VM is booted, its VIF objects are queried to determine which network devices to create. Example methods of the VIF class include:
plugwhich hot plugs a network device into a running VM
unplugwhich hot unplugs a network device from a running guest
The second set of "connector classes" that we consider determine how Hosts are attached to Networks and Storage.
A PIF (Physical Interface) object represents an attachment between a Host and a Network object. If a host is connected to a Network over a PIF, packets from the specified host can be transmitted/received by the corresponding host. Example fields of the PIF class include:
devicewhich specifies the device name to which the PIF corresponds. For example, eth0
MACwhich specifies the MAC address of the underlying NIC that a PIF represents
PIFs abstract both physical interfaces and VLANs (the latter distinguished by the existence of a positive integer in the "VLAN" field).
A PBD (Physical Block Device) object represents an attachment between a Host and an SR (Storage Repository) object. Fields include:
currently-attachedwhich specifies whether the chunk of storage represented by the specified SR object is available to the host
device_configwhich specifies storage-driver specific parameters that determine how the low-level storage devices are configured on the specified host. For example, when an SR rendered on an NFS filer, device_config can specify the host-name of the filer and the path on the filer in which the SR files live.
This figure presents a graphical overview of the API classes involved in managing VMs, Hosts, Storage, and Networking. From this diagram, the symmetry between storage and network configuration, and also the symmetry between virtual machine and host configuration is plain to see.
Working with VIFs and VBDs¶
In this section we walk through a few more complex scenarios. These scenarios describe how various tasks involving virtual storage and network devices can be done using the API.
Creating disks and attaching them to VMs¶
Let's start by considering how to make a new blank disk image and attach
it to a running VM. We assume that we already have a
running VM, and we know its corresponding API object reference. For example, we
might have created this VM using the procedure described in the previous
section and had the server return its reference to us.
We also assume that we have authenticated with the XenServer installation
and have a corresponding
session reference. Indeed in the rest of this
chapter, for the sake of brevity, does not mention sessions
Creating a new blank disk image¶
First, instantiate the disk image on physical storage by calling
VDI.create call takes a number of parameters, including:
name_description: a human-readable name/description for the disk (for example, for convenient display in the UI). These fields can be left blank if desired.
SR: the object reference of the Storage Repository representing the physical storage in which the VDI's bits are placed.
read_only: setting this field to true indicates that the VDI can only be attached to VMs in a read-only fashion. (Attempting to attach a VDI with its
read_onlyfield set to true in a read/write fashion results in error.)
VDI.create call causes the XenServer installation to
create a blank disk image on physical storage, create an associated VDI
object (the datamodel instance that refers to the disk image on physical
storage) and return a reference to this newly created VDI object.
The way in which the disk image is represented on physical storage
depends on the type of the SR in which the created VDI resides. For
example, if the SR is of type "lvm" then the new disk image will be
rendered as an LVM volume; if the SR is of type "nfs" then the new disk
image will be a sparse VHD file created on an NFS filer. (You can query
the SR type through the API using the
Some SR types might round up the
virtual-sizevalue to make it divisible by a configured block size.
Attaching the disk image to a VM¶
So far we have a running VM (that we assumed the existence of at the start of this example) and a fresh VDI that we just created. Right now, these are both independent objects that exist on the XenServer Host, but there is nothing linking them together. So our next step is to create such a link, associating the VDI with our VM.
The attachment is formed by creating a new "connector" object called a
VBD (Virtual Block Device). To create our VBD we invoke the
VBD.create() call. The
VBD.create() call takes a number of parameters including:
VM- the object reference of the VM to which the VDI is to be attached
VDI- the object reference of the VDI that is to be attached
mode- specifies whether the VDI is to be attached in a read-only or a read-write fashion
userdevice- specifies the block device inside the guest through which applications running inside the VM will be able to read/write the VDI's bits.
type- specifies whether the VDI should be presented inside the VM as a regular disk or as a CD. (Note that this particular field has more meaning for Windows VMs than it does for Linux VMs, but we will not explore this level of detail in this chapter.)
VBD.create makes a VBD object on the XenServer
installation and returns its object reference. However, this call in
itself does not have any side-effects on the running VM (that is, if you
go and look inside the running VM you will see that the block device has
not been created). The fact that the VBD object exists but that the
block device in the guest is not active, is reflected by the fact that
the VBD object's
currently_attached field is set to false.
For expository purposes, this figure presents a graphical example that shows the relationship between VMs, VBDs, VDIs and SRs. In this instance a VM object has 2 attached VDIs: there are two VBD objects that form the connections between the VM object and its VDIs; and the VDIs reside within the same SR.
Hotplugging the VBD¶
If we rebooted the VM at this stage then, after rebooting, the block device corresponding to the VBD would appear: on boot, XenServer queries all VBDs of a VM and actively attaches each of the corresponding VDIs.
Rebooting the VM is all very well, but recall that we wanted to attach a
newly created blank disk to a running VM. This can be achieved by
plug method on the newly created VBD object. When the
plug call returns successfully, the block device to which the VBD
relates will have appeared inside the running VM -- i.e. from the
perspective of the running VM, the guest operating system is led to
believe that a new disk device has just been hot plugged. Mirroring
this fact in the managed world of the API, the
currently_attached field of the VBD is set to true.
Unsurprisingly, the VBD
plug method has a dual called "
unplug method on a VBD object causes the associated block
device to be hot unplugged from a running VM, setting the
currently_attached field of the VBD object to false accordingly.
Creating and attaching Network Devices to VMs¶
The API calls involved in configuring virtual network interfaces in VMs are similar in many respects to the calls involved in configuring virtual disk devices. For this reason we will not run through a full example of how one can create network interfaces using the API object-model; instead we will use this section just to outline briefly the symmetry between virtual networking device and virtual storage device configuration.
The networking analogue of the VBD class is the VIF class. Just as a VBD
is the API representation of a block device inside a VM, a VIF (Virtual
network InterFace) is the API representation of a network device inside
a VM. Whereas VBDs associate VM objects with VDI objects, VIFs associate
VM objects with Network objects. Just like VBDs, VIFs have a
currently_attached field that determines whether or not the network
device (inside the guest) associated with the VIF is currently active or
not. And as we saw with VBDs, at VM boot-time the VIFs of the VM are
queried and a corresponding network device for each created inside the
booting VM. Similarly, VIFs also have
unplug methods for hot plugging/unplugging network devices in/out of
Host configuration for networking and storage¶
We have seen that the VBD and VIF classes are used to manage configuration of block devices and network devices (respectively) inside VMs. To manage host configuration of storage and networking there are two analogous classes: PBD (Physical Block Device) and PIF (Physical [network] InterFace).
Host storage configuration: PBDs¶
Let us start by considering the PBD class. A
PBD_create() call takes a
number of parameters including:
|host||physical machine on which the PBD is available|
|SR||the Storage Repository that the PBD connects to|
|device_config||a string-to-string map that is provided to the host's SR-backend-driver, containing the low-level parameters required to configure the physical storage device(s) on which the SR is to be realized. The specific contents of the
For example, imagine we have an SR object s of type "nfs"
(representing a directory on an NFS filer within which VDIs are stored
as VHD files); and let's say that we want a host, h, to be able to
access s. In this case we invoke
PBD.create() specifying host h, SR s, and a value for the
device_config parameter that is the following map:
("server", "my_nfs_server.example.com"), ("serverpath", "/scratch/mysrs/sr1")
This tells the XenServer Host that SR s is accessible on host
h, and further that to access SR s, the host needs to mount the
/scratch/mysrs/sr1 on the NFS server named
Like VBD objects, PBD objects also have a field called
currently_attached. Storage repositories can be attached
and detached from a given host by invoking
Host networking configuration: PIFs¶
Host network configuration is specified by virtue of PIF objects. If a PIF object connects a network object, n, to a host object h, then the network corresponding to n is bridged onto a physical interface (or a physical interface plus a VLAN tag) specified by the fields of the PIF object.
For example, imagine a PIF object exists connecting host h to a
network n, and that
device field of the PIF object is set to
This means that all packets on network n are bridged to the NIC in the
host corresponding to host network device
Exporting and Importing VMs¶
VMs can be exported to a file and later imported to any XenServer host. The export protocol is a simple HTTP(S) GET, which should be performed on the master if the VM is on a pool member. Authorization is either standard HTTP basic authentication, or if a session has already been obtained, this can be used. The VM to export is specified either by UUID or by reference. To keep track of the export, a task can be created and passed in using its reference. The request might result in a redirect if the VM's disks are only accessible on a pool member.
The following arguments are passed on the command line:
|session_id||the reference of the session being used to authenticate; required only when not using HTTP basic authentication|
|task_id||the reference of the task object with which to keep track of the operation; optional, required only if you have created a task object to keep track of the export|
|ref||the reference of the VM; required only if not using the UUID|
|uuid||the UUID of the VM; required only if not using the reference|
For example, using the Linux command line tool cURL:
curl http://root:foo@myxenserver1/export?uuid=<vm_uuid> -o <exportfile>
This command will export the specified VM to the file
To export just the metadata, use the URI
The import protocol is similar, using HTTP(S) PUT. The
task_id arguments are as for the export. The
uuid are not used; a new reference and uuid will be generated for the
VM. There are some additional parameters:
|restore||if true, the import is treated as replacing the original VM - the implication of this currently is that the MAC addresses on the VIFs are exactly as the export was, which will lead to conflicts if the original VM is still being run.|
|force||if true, any checksum failures will be ignored (the default is to destroy the VM if a checksum error is detected)|
|sr_id||the reference of an SR into which the VM should be imported. The default behavior is to import into the Pool.default_SR.|
For example, again using cURL:
curl -T <exportfile> http://root:foo@myxenserver2/import
This command will import the VM to the default SR on the server.
Note that if no default SR has been set, and no sr_uuid is specified, the error message "DEFAULT_SR_NOT_FOUND" is returned.
curl -T <exportfile> http://root:foo@myxenserver2/import?sr_id=<opaque_ref_of_sr>
This command will import the VM to the specified SR on the server.
To import just the metadata, use the URI
Xen Virtual Appliance (XVA) VM Import Format¶
XenServer supports a human-readable legacy VM input format called XVA. This section describes the syntax and structure of XVA.
An XVA consists of a directory containing XML metadata and a set of disk images. A VM represented by an XVA is not intended to be directly executable. Data within an XVA package is compressed and intended for either archiving on permanent storage or for being transmitted to a VM server - such as a XenServer host - where it can be decompressed and executed.
XVA is a hypervisor-neutral packaging format; it should be possible to create simple tools to instantiate an XVA VM on any other platform. XVA does not specify any particular runtime format; for example disks may be instantiated as file images, LVM volumes, QCoW images, VMDK or VHD images. An XVA VM may be instantiated any number of times, each instantiation may have a different runtime format.
XVA does not:
specify any particular serialization or transport format
provide any mechanism for customizing VMs (or templates) on install
address how a VM may be upgraded post-install
define how multiple VMs, acting as an appliance, may communicate
These issues are all addressed by the related Open Virtual Appliance specification.
An XVA is a directory containing, at a minimum, a file called
This file describes the VM contained within the XVA and is described in
Section 3.2. Disks are stored within sub-directories and are referenced
from the ova.xml. The format of disk data is described later in Section
The following terms will be used in the rest of the chapter:
HVM: a mode in which unmodified OS kernels run with the help of virtualization support in the hardware.
PV: a mode in which specially modified "paravirtualized" kernels run explicitly on top of a hypervisor without requiring hardware support for virtualization.
The "ova.xml" file contains the following elements:
The number in the attribute "version" indicates the version of this specification to which the XVA is constructed; in this case version 0.1. Inside the <appliance> there is exactly one <vm>: (in the OVA specification, multiple <vm>s are permitted)
Each <vm> element describes one VM. The "name" attribute is for future internal use only and must be unique within the ova.xml file. The "name" attribute is permitted to be any valid UTF-8 string. Inside each <vm> tag are the following compulsory elements:
<label>... text ... </label>
A short name for the VM to be displayed in a UI.
<shortdesc> ... description ... </shortdesc>
A description for the VM to be displayed in the UI. Note that for both <label> and <shortdesc> contents, leading and trailing whitespace will be ignored.
<config mem_set="268435456" vcpus="1"/>
<config> element has attributes which describe the amount of
memory in bytes (mem_set) and number of CPUs (VCPUs) the VM should
<vm> has zero or more <vbd> elements representing block
devices which look like the following:
<vbd device="sda" function="root" mode="w" vdi="vdi_sda"/>
The attributes have the following meanings:
- name of the physical device to expose to the VM. For linux guests we use "sd[a-z]" and for windows guests we use "hd[a-d]".
- if marked as "root", this disk will be used to boot the guest. (NB this does not imply the existence of the Linux root i.e. / filesystem) Only one device should be marked as "root". See Section 3.4 describing VM booting. Any other string is ignored.
- either "w" or "ro" if the device is to be read/write or read-only
- the name of the disk image (represented by a <vdi> element) to which this block device is connected
Each <vm> may have an optional <hacks> section like the following: <hacks is_hvm="false" kernel_boot_cmdline="root=/dev/sda1 ro"/> The <hacks> element is present in the XVA files generated by XenServer but will be removed in future. The attribute "is_hvm" is either "true" or "false", depending on whether the VM should be booted in HVM or not. The "kernel_boot_cmdline" contains additional kernel commandline arguments when booting a guest using pygrub.
In addition to a <vm> element, the <appliance> will contain zero or more <vdi> elements like the following:
<vdi name="vdi_sda" size="5368709120" source="file://sda" type="dir-gzipped-chunks">
Each <vdi> corresponds to a disk image. The attributes have the following meanings:
name: name of the VDI, referenced by the vdi attribute of <vbd> elements. Any valid UTF-8 string is permitted.
size: size of the required image in bytes
source: a URI describing where to find the data for the image, only file:// URIs are currently permitted and must describe paths relative to the directory containing the ova.xml
type: describes the format of the disk data
A single disk image encoding is specified in which has type "dir-gzipped-chunks": Each image is represented by a directory containing a sequence of files as follows:
-rw-r--r-- 1 dscott xendev 458286013 Sep 18 09:51 chunk000000000.gz -rw-r--r-- 1 dscott xendev 422271283 Sep 18 09:52 chunk000000001.gz -rw-r--r-- 1 dscott xendev 395914244 Sep 18 09:53 chunk000000002.gz -rw-r--r-- 1 dscott xendev 9452401 Sep 18 09:53 chunk000000003.gz -rw-r--r-- 1 dscott xendev 1096066 Sep 18 09:53 chunk000000004.gz -rw-r--r-- 1 dscott xendev 971976 Sep 18 09:53 chunk000000005.gz -rw-r--r-- 1 dscott xendev 971976 Sep 18 09:53 chunk000000006.gz -rw-r--r-- 1 dscott xendev 971976 Sep 18 09:53 chunk000000007.gz -rw-r--r-- 1 dscott xendev 573930 Sep 18 09:53 chunk000000008.gz
Each file (named "chunk-XXXXXXXXX.gz") is a gzipped file containing exactly 1e9 bytes (1GB, not 1GiB) of raw block data. The small size was chosen to be safely under the maximum file size limits of several filesystems. If the files are gunzipped and then concatenated together, the original image is recovered.
XenServer provides two mechanisms for booting a VM: (i) using a paravirtualized kernel extracted through pygrub; and (ii) using HVM. The current implementation uses the "is_hvm" flag within the <hacks> section to decide which mechanism to use.
This rest of this section describes a very simple Debian VM packaged as an XVA. The VM has two disks, one with size 5120MiB and used for the root filesystem and used to boot the guest using pygrub and the other of size 512MiB which is used for swap. The VM has 512MiB of memory and uses one virtual CPU.
At the topmost level the simple Debian VM is represented by a single directory:
$ ls -l total 4 drwxr-xr-x 3 dscott xendev 4096 Oct 24 09:42 very simple Debian VM
Inside the main XVA directory are two sub-directories - one per disk - and the single file: ova.xml:
$ ls -l very\ simple\ Debian\ VM/ total 8 -rw-r--r-- 1 dscott xendev 1016 Oct 24 09:42 ova.xml drwxr-xr-x 2 dscott xendev 4096 Oct 24 09:42 sda drwxr-xr-x 2 dscott xendev 4096 Oct 24 09:53 sdb
Inside each disk sub-directory are a set of files, each file contains 1GB of raw disk block data compressed using gzip:
$ ls -l very\ simple\ Debian\ VM/sda/ total 2053480 -rw-r--r-- 1 dscott xendev 202121645 Oct 24 09:43 chunk-000000000.gz -rw-r--r-- 1 dscott xendev 332739042 Oct 24 09:45 chunk-000000001.gz -rw-r--r-- 1 dscott xendev 401299288 Oct 24 09:48 chunk-000000002.gz -rw-r--r-- 1 dscott xendev 389585534 Oct 24 09:50 chunk-000000003.gz -rw-r--r-- 1 dscott xendev 624567877 Oct 24 09:53 chunk-000000004.gz -rw-r--r-- 1 dscott xendev 150351797 Oct 24 09:54 chunk-000000005.gz
$ ls -l very\ simple\ Debian\ VM/sdb total 516 -rw-r--r-- 1 dscott xendev 521937 Oct 24 09:54 chunk-000000000.gz
The example simple Debian VM would have an XVA file like the following:
<?xml version="1.0" ?> <appliance version="0.1"> <vm name="vm"> <label>very simple Debian VM</label> <shortdesc>the description field can contain any valid UTF-8</shortdesc> <config mem_set="536870912" vcpus="1"/> <hacks is_hvm="false" kernel_boot_cmdline="root=/dev/sda1 ro "> <!--This section is temporary and will be ignored in future. Attribute is_hvm ("true" or "false") indicates whether the VM will be booted in HVM mode. In future this will be autodetected. Attribute kernel_boot_cmdline contains the kernel commandline for the case where a proper grub menu.lst is not present. In future booting shall only use pygrub.--> </hacks> <vbd device="sda" function="root" mode="w" vdi="vdi_sda"/> <vbd device="sdb" function="swap" mode="w" vdi="vdi_sdb"/> </vm> <vdi name="vdi_sda" size="5368709120" source="file://sda" type="dir-gzippedchunks"/> <vdi name="vdi_sdb" size="536870912" source="file://sdb" type="dir-gzippedchunks"/> </appliance>
The API deviates from the RPC specification in handling of datetimes. The API appends a "Z" to the end of datetime strings, which is meant to indicate that the time is expressed in UTC.
Where to look next¶
In this chapter we have presented a brief high-level overview of the API and its object-model. The aim here is not to present the detailed semantics of the API, but just to provide enough background for you to start reading the code samples of the next chapter and to find your way around the more detailed XenServer API Reference document.
There are a number of places you can find more information:
The XenServer Administrators Guide contains an overview of the
xeCLI. Since a good deal of
xecommands are a thin veneer over the API, playing with
xeis a good way to start finding your way around the API object model described in this chapter.
The code samples in the next chapter provide some concrete instances of API coding in a variety of client languages.
The XenServer API Reference document provides a more detailed description of the API semantics as well as the wire protocol of the RPC messages.
There are a few scripts that use the API in the XenServer Host dom0 itself. For example, "/opt/xensource/libexec/shutdown" is a python program that cleanly shuts VMs down. This script is invoked when the host itself is shut down.