Using KVM and libvirt with commands like virsh and virt-install.
I create two dirs in the file system; ‘vms’ and ‘iso’, and then create a directory based storage pool pointing to ‘vms’. I put the o/s iso files into the ‘iso’ dir.
When I create a guest using virt-install, it puts the vm into the ‘vms’ storage pool as expected, BUT it also creates a second storage pool called ‘iso’, which was unexpected. I can’t find anywhere in the docs saying the iso files should be in a pool, or that one will be created. Should I just create an ‘iso’ storage pool at the beginning?
Well deprecated by RHEL as in removed from the repos to force you to use cockpit. Which they use for ovirt etc.
For all other distros it is still relevant and all other distros still give you the option to choose virt-manager or cockpit depending on what you prefer. Sadly RHEL don’t let you make the choice on what you use but rather remove it forcing you to use something else.
The project is still alive just RHEL don’t want to let you use it.
Rather odd. RH bought the company that developed kvm, virt, etc. virt-manager was originally written in java. They paid to convert the code to python (if memory serves made correct) and make platform independent when they open sourced it. Originally virt-manager only ran on M$ Winders though kvm was linux. Seems to be wasted time and money for a decent tool. I’ll have to take a look at cockpit.
Does virt-manager, which depends on Python and GTK3, run anywhere but Linux platforms? That limits the clients that you can use to manage your servers.
The cockpit can be accessed with a browser from any client? Furthermore, cockpit attempts to configure everything of any server, not just manage KVM/Xen/LXC. Alas, like NetworkManager and FirewallD before it, cockpit’s feature set sounds to be lacking. Might become good in the future. Just might.
(I don’t use cockpit. Found Ansible for overall config management. RHEL  documentation has got sections about use of Ansible, so Red Hat seems to invest into it.)
With virt-manager you can (after setting up authentication) manage VMs on remote hosts. That feature is lacking from cockpit it seems. This means you have to install this cockpit webservice on every server running kvm. As a serveradmin I find that not so great, it’s another service running increasing the attack surface.