Nested Virtualization

Nested virtualization refers to virtualization that runs inside an already virtualized environment. In other words, it’s the ability to run a hypervisor inside of a virtual machine (VM), which itself runs on a hypervisor.

With nested virtualization, you’re effectively nesting a hypervisor within a hypervisor. The hypervisor running the main virtual machine is considered a level 0, or LO hypervisor, and the initial hypervisor running inside the virtual machine is referred to as a level 1 or L1 hypervisor. Further nested virtualization would result in a level 2 (L2) hypervisor inside the nested VM, then a level 3 (L3) hypervisor within that nested VM, and so forth.

Which Hypervisors Support Nested Virtualization and Use Cases for Nested Virtualization

Not all hypervisors and operating systems support nested virtualization. Hypervisors that do support nested virtualization include KVM and VMware ESXi hypervisors (called Nested ESXi). Nested ESXi also supports Hyper-V, Xen and KVM guest hypervisors as of ESXi version 6.0.

Microsoft introduced support for nested virtualization with Hyper-V in Windows Server 2016.

Nested Virtualization
Nested virtualization can be used for development and testing purposes, virtualization training, providing guest virtualization to end users, deployment testing of “virtual clouds,” testing configurations and other cases where running multiple hypervisors on the same host server might be needed.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...