Red Hat Enterprise Virtualization 3.0 Offers Performance and Scalability Improvements

Red Hat has released a new version of its open-source enterprise virtualization platform, Red Hat Enterprise Virtualization (RHEV) 3.0. This version introduces new enterprise virtualization management features and improved performance and scalability for Linux and Windows workloads.

The core product, RHEV for Servers, provides server virtualization, and the optional RHEV for Desktops add-on provides virtual desktop infrastructure. RHEV for Servers includes the oVirt open virtualization management system, RHEV Manager, and the kernel-based virtual machine (KVM) hypervisor, RHEV Hypervisor. It supports server operating systems as virtual guests.

The Red Hat Enterprise Virtualization Manager platform is now built on Red Hat Enterprise Linux 6 and JBoss Enterprise Application Platform. Red Hat claims that this new platform provides performance and scalability improvements.

Key features of Red Hat Enterprise Virtualization 3.0 include:

  • Power user portal for self-service provisioning;
  • Exposure of all RHEV commands through an open-source, community-driven RESTful API;
  • New text-based GUI for RHEV Hypervisor;
  • Reduced latency as a result of moving the kernel-based virtual machine (KVM) networking stack from the userspace into the Linux kernel;
  • Kernel samepage merging (KSM) memory overcommitment to enable users to define more RAM in their virtual machines than is present in the physical host;
  • Support for SELinux and new sVirt capabilities, including Mandatory Access Control (MAC) for enhanced virtual machine and hypervisor security;
  • Support for VM-level "Do Not Migrate" option and VM-host pinning;
  • Integration with Cisco's Virtual Machine Fabric Extender (VM-FEX) technology; and
  • User interface enhancements.

Red Hat Enterprise Virtualization 3.0 is now available worldwide. Additional information and a fully supported 60-day trial version are available on the Red Hat site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • AI microchip, a cybersecurity shield with a lock, a dollar coin, and a laptop with financial graphs connected by dotted lines

    Survey: Generative AI Surpasses Cybersecurity in 2025 Tech Budgets

    Global IT leaders are placing bigger bets on generative artificial intelligence than cybersecurity in 2025, according to new research by Amazon Web Services (AWS).

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.

  • glowing digital document floats above a laptop, surrounded by soft, flowing tech-inspired lines and geometric shapes in shades of blue and white

    Boston U Expands AllCampus Partnership with New Non-Credit Certificate Programs

    Boston University Metropolitan College's Center for Professional Education has expanded its relationship with online program management provider AllCampus. The agreement will extend support for BU's existing online Paralegal Studies Program and add new non-credit certificates in financial planning, professional fundraising, and genealogical studies.