What are the primary differences between RHEV 3.1 and oVirt 3.1? Can I use the two interchangeably?
Sander van Vugt: Both oVirt 3.1 and RHEV 3.1 enable server virtualization. In fact, Red Hat based RHEV on the oVirt software. Nevertheless, the two do have some key differences that dictate how you should deploy each.
Red Hat Inc. developed oVirt as a Web-based, open source data center virtualization platform. A standard oVirt setup requires a hypervisor and a management server. Red Hat Enterprise Virtualization (RHEV), on the other hand, is a server virtualization platform where the underlying KVM hypervisor is integrated into the Linux kernel.
Red Hat released its collection of open source software as oVirt before going commercial with it as RHEV with the purpose of testing features in the community. As a result, oVirt contains features that RHEV will never include simply because it did not meet expectations.
Another factor in the oVirt vs. RHEV discussion is that unlike RHEV 3.1, oVirt 3.1 has no enterprise-level support. Furthermore, RHEV requires Red Hat Enterprise Linux as host operating system, but oVirt could theoretically be made available for any platform. At the moment, however, oVirt 3.1 only runs on Fedora.
Bottom line: You can configure an enterprise-scale virtualization environment with either oVirt 3.1 or RHEV 3.1, but for adequate support and advanced features, RHEV 3.1 beats oVirt 3.1.
Submit your own "Ask the Expert" question! Email firstname.lastname@example.org and we'll get our experts working on an answer.
Dig Deeper on Open source virtualization
Related Q&A from Sander van Vugt
Containers in the data center can help maximize server capacity, but there are a few things to consider before a Docker or Kubernetes implementation. Continue Reading
File management is an essential part of working within Linux. Knowing a few basic commands makes it easier to move content and avoid file ... Continue Reading
Linux has a security framework with multiple layers, which makes it hard to maintain permissions and privileges. User-based profiles and whitelisting... Continue Reading