cleanup previous patch: improve grammer

This commit is contained in:
Dietmar Maurer 2016-11-30 08:55:00 +01:00
parent 082ea7d907
commit 054a7e7d52

View File

@ -880,13 +880,16 @@ When you turn on nodes, or when power comes back after power failure,
it is likely that some nodes boots faster than others. Please keep in it is likely that some nodes boots faster than others. Please keep in
mind that guest startup is delayed until you reach quorum. mind that guest startup is delayed until you reach quorum.
Guest Migration Guest Migration
--------------- ---------------
Migrating Virtual Guests (live) to other nodes is a useful feature in a Migrating virtual guests to other nodes is a useful feature in a
cluster. There exist settings to control the behavior of such migrations. cluster. There are settings to control the behavior of such
This can be done cluster wide via the 'datacenter.cfg' configuration file or migrations. This can be done via the configuration file
also for a single migration through API or command line tool parameters. `datacenter.cfg` or for a specific migration via API or command line
parameters.
Migration Type Migration Type
~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~
@ -895,19 +898,22 @@ The migration type defines if the migration data should be sent over a
encrypted ('secure') channel or an unencrypted ('insecure') one. encrypted ('secure') channel or an unencrypted ('insecure') one.
Setting the migration type to insecure means that the RAM content of a Setting the migration type to insecure means that the RAM content of a
Virtual Guest gets also transfered unencrypted, which can lead to Virtual Guest gets also transfered unencrypted, which can lead to
information disclosure of critical data from inside the guest for example information disclosure of critical data from inside the guest for
passwords or encryption keys. example passwords or encryption keys.
Thus we strongly recommend to use the secure channel if you have not full
control over the network and cannot guarantee that no one is eavesdropping
on it.
Note that storage migration do not obey this setting, they will always send Therefore, we strongly recommend using the secure channel if you do
the content over an secure channel currently. not have full control over the network and can not guarantee that no
one is eavesdropping to it.
NOTE: Storage migration does not follow this setting. Currently, it
always sends the storage content over a secure channel.
Encryption requires a lot of computing power, so this setting is often
changed to "unsafe" to achieve better performance. The impact on
modern systems is lower because they implement AES encryption in
hardware. But the influence is greater on fast networks, where you can
transfer 10Gbps or more.
While this setting is often changed to 'insecure' in favor of gaining better
performance on migrations it may actually have an small impact on systems
with AES encryption hardware support in the CPU. This impact can get bigger
if the network link can transmit 10Gbps or more.
Migration Network Migration Network
~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~
@ -916,6 +922,7 @@ By default {pve} uses the network where the cluster communication happens
for sending the migration traffic. This is may be suboptimal, for one the for sending the migration traffic. This is may be suboptimal, for one the
sensible cluster traffic can be disturbed and on the other hand it may not sensible cluster traffic can be disturbed and on the other hand it may not
have the best bandwidth available from all network interfaces on the node. have the best bandwidth available from all network interfaces on the node.
Setting the migration network parameter allows using a dedicated network for Setting the migration network parameter allows using a dedicated network for
sending all the migration traffic when migrating a guest system. This sending all the migration traffic when migrating a guest system. This
includes the traffic for offline storage migrations. includes the traffic for offline storage migrations.