Using RHV with KVM is fantastic.
March 12, 2022

Using RHV with KVM is fantastic.

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Red Hat Virtualization (RHV) (formerly RHEV)

Due to its inclusion in RedHat, RHV is utilized as a one-stop solution for virtual environments. The installation expenses of such a system pose a significant challenge for businesses. We're utilizing RHV instead of VSphere since it's more cost-effective and easier to integrate with KVM.
  • RHV issues/bugs can be reported via Bugzilla to RH support. The service is great and typically responds soon.
  • Red Hat distribution integration is seamless as it is integrated into the kernel.
  • OpenStack support enables more customized VM templates and network configuration control.
  • If the aforementioned can't be done, additional open-source tool compatibility or support.
  • Improved compatibility with KVM.
  • Testing on oVirt before acquiring RedHat service contracts has a positive influence.
Compared to oVirt, RHEV is more stable but has fewer capabilities. ESX is far more difficult to automate.

Do you think Red Hat Virtualization delivers good value for the price?


Are you happy with Red Hat Virtualization's feature set?


Did Red Hat Virtualization live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Red Hat Virtualization go as expected?


Would you buy Red Hat Virtualization again?


When it comes to managing virtual machines, RHV is the best choice. RHV is a good option if you deal with OpenStack, as it has built-in support for it. In this case, you may not be able to justify the expense. However, adopting something like oVirt (which is related to but not identical to RHV) might be preferable despite the fact that oVirt is not built into the kernel.

Red Hat Virtualization (RHV) Feature Ratings

Virtual machine automated provisioning
Management console
Live virtual machine backup
Live virtual machine migration
Hypervisor-level security