本站用于记录日常工作内容,虚拟化云计算,系统运维,数据库DBA,网络与安全。
 How to Disable Receive-Side Copy (RSC) on XenServer 6.x Document ID: CTX133199   /   Created On: 2012-6-29   /   Updated On: 2013-7-23 Average Rating: (2 ratings) <!-- -->View products this document applies to SummaryThis article describes how to disable the Receive-Side Copy on XenServer 6.xRequirementsAccess to Windows Virtual Machine and Registry EditorAccess to XenServer command line interface to monitor logsBackgroundIn XenServer 6.x, a new feature called Receive-Side Copy (RSC) is enabled by default in Windows virtual machines with XenTools installed.RSC moves the processing required for network traffic from Domain 0 (netback process) into the virtual machine (netfront process) thereby reducing the load on the control domain when you run large numbers of virtual machines.In some scenarios, you might have to disable this feature to improve the virtual machine performance.Known IssueWith RSC enabled, a virtual machine virtu...
 How to Disable Receive-Side Copy (RSC) in Dom0 Document ID: CTX136830   /   Created On: 2013-3-7   /   Updated On: 2013-7-23 Average Rating: (2 ratings) <!-- -->View products this document applies to SummaryThis article describes how to disable Receive-Side Copy in dom0.Receive-Side Copy (RSC) might cause exhaustion of dom0 pageref resources. This might lead to undesirable behavior under certain circumstances.RequirementsRSC as the default network back end.BackgroundBy default, xen_netback.netback_max_rx_protocol is set to 1, which enables RSC host wide.ProcedureRun the following command: #/opt/xensource/libexec/xen-cmdline --set-dom0 xen_netback.netback_max_rx_protocol=0Restart the server for the change to take effect.Confirm that the change has been implemented: # cat /proc/cmdlineroot=LABEL=root-cbscvkzh ro console=tty0 xencons=hvc console=hvc0 xen_netback.netback_max_rx_protocol=0Throughput should not be adversely affected ...
您所在的组无权查看该日志
您所在的组无权查看该日志
您所在的组无权查看该日志
先获取XenServer虚拟机uuid:1 2 3 4 #http://blog.onovps.com xe vm-list |grep -A 1 <vmname> #或 xe vm-list name-label=<vm-name> --minimal获取VIF参数:1 xe vm-param-list uuid=<vmuuid>|grep dom-id另一种方法:1 xe vm-list params=dom-id,resident-on name-label=<vmname>
XenServer可以在虚拟网络接口VIF上做带宽限制,设置如下:为特定VIF设置QOS算法类型为ratelimit(速率限制)1 xe vif-param-set uuid=<vif-uuid> qos_algorithm_type=ratelimit设置VIF带宽参数:1 2 xe vif-param-set uuid=<vif-uuid> qos_algorithm_params:kbps=5120 限制VM网络速率5120K,相当于带宽40M.
服务器端安装Host sFlow Agent代理客户端,用作发送sFlow数据到sFlowTrend分析端,支持多种Windows/Linux/Uinx系统。Host sFlow下载地址:http://host-sflow.sourceforge.net/sFlowTrend下载地址:http://www.inmon.com/products/sFlowTrend.phpXenServer6可直接安装Host sFlow,XenServer5要先配置为Open vSwitch模式支持sFlow。1 2 wget http://downloads.sourceforge.net/project/host-sflow/REL-1_22/hsflowd_XenServer_56FP2-1.22.2-1.i386.rpm rpm -ivh hsflowd_XenServer_56FP2-1.22.2-1.i386.rpm配置Host sFlow:1 2 3 4 5 6 7 8 9 10 11 cat /etc/hsflowd.conf #http://www.onovps.com sflow { DNSSD = off polling = 20 sampling = 512 collector { ip = 192.168.1.155 udpport = 6343 } }启动Host sFlow Agent:1 /etc/init.d/hsflowd start然后在sFlowTrend配置代理端,不久即可看到监控的数据:分析XenServer虚拟交换机sFlow数据:1 2 ovs-vsctl -- --id=@sflow create sflow agent=xenbr0 targe=\"192.168.1.155:6343\" header=128 sampling=512 polling=30 \ -- set bridge eth0 sflow=@sflow
  XenServer5.6下编写,用于获取所有VM虚拟机IP和对应MAC地址,Shell脚本如下:1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 #!/bin/bash #http://www.onovps.com if [[ ! -e mac-ip.txt ]]; then touch mac-ip.txt else > mac-ip.txt fi for vps in `xe vm-list |awk '/name/ {print $4}'` do case $vps in *"Control"* ) continue ;; esac writeline=`xe vif-list vm-name-label=$vps params=MAC|awk '/MAC/ {print $5}'` writeline+=" " writeline+=`xe vm-list name-label=$vps params=networks|awk '/network/ {print $5}'` echo $writeline >> mac-ip.txt done
您所在的组无权查看该日志
    总共58页,当前第37页 | 页数:
  1. 27
  2. 28
  3. 29
  4. 30
  5. 31
  6. 32
  7. 33
  8. 34
  9. 35
  10. 36
  11. 37
  12. 38
  13. 39
  14. 40
  15. 41
  16. 42
  17. 43
  18. 44
  19. 45
  20. 46
  21. 47