cloudstack/patches/systemvm/debian/config/etc
Edison Su a13be45f7b bug 8350:
haproxy tunning:
0. Test case:
   httpd running in 5 user VMs, all of them created on a xenserver host(16 core, 42G memroy, 10G network)
   domR running on an anther host with same hardware configuration.
   test application, ab, running on anther host behind an anther seperate switch
1.haproxy is not a memory intensive app. I can get 4625.96 connection/s with 1G memory. While it's really a CPU intensive app, domR always uses around 100% CPU on the host.
2.By default, you can't get better connection/s rate, because ip_conntrack_max and tw_bucket are too small, you will see the error in domR like:
   "TCP: time wait bucket table overflow" or "nf_conntrack: table full, dropping packet".
  So I increase these numbers to 1000000 from 65536, then I can steadly get around 4600 connection/s when memory is >= 1G.

  Here is the connection per second, tested by "ab -n 1000000 -c 100 http://192.168.170.152:880/test.html"
  domR memory   conn/s
  128M:         3545.55
  256M:         4081.38
  512M:         4318.18
  1G:           4625.96
  7G:           4745.53

3. If I enable notrack for both connections between domr/user vm, and public network, that tell iptable in domR don't track the connection during my test, then I can get better number, around
5800 connections/s. But we can't enable notrack, as iptables is used to track throughput in domR.

4. In a word, with this commit, the connection rate of haproxy can be increased from 1000-2000/s to 4700/s when domR's memory is larger than 1G.

5. How many CPU need to assign to domR to get this number?  Haven't finished yet, as CPU is shared by all the VMs on the host, if other VMs are busy, it will impact the performance of haproxy.
2011-05-21 21:05:28 -04:00
..
apache2 remove patches/systemv, and mv tools/systemvm into patches 2010-10-05 20:41:39 -07:00
cron.daily bug 7141: cleanup cloudstack logs older than 7 days 2011-01-13 12:36:38 -08:00
default remove patches/systemv, and mv tools/systemvm into patches 2010-10-05 20:41:39 -07:00
haproxy remove patches/systemv, and mv tools/systemvm into patches 2010-10-05 20:41:39 -07:00
httpd/conf remove patches/systemv, and mv tools/systemvm into patches 2010-10-05 20:41:39 -07:00
init.d bug 8959: 1. rp_filter prevents connections that span eth2 and eth3 because of default route 2011-04-04 18:59:40 -07:00
iptables bug 7519 : Opening eth2 for public traffic on ssvm. Implementing the ip firewall for zone to zone copy in the Apache layer. Disabling directory listing for extract server root. 2011-01-11 20:05:35 +05:30
logrotate.d bug 7141: rotate standard logs more aggressively 2011-01-13 12:36:38 -08:00
profile.d Add license header to files 2011-04-14 11:23:14 -07:00
ssh remove patches/systemv, and mv tools/systemvm into patches 2010-10-05 20:41:39 -07:00
dnsmasq.conf Fix DomR reply to windows's periodical DNS requirement 2011-04-21 11:23:23 -07:00
logrotate.conf bug 7141: rotate logs 2011-01-12 17:31:39 -08:00
rc.local remove patches/systemv, and mv tools/systemvm into patches 2010-10-05 20:41:39 -07:00
rsyslog.conf bug 7141: rotate logs 2011-01-12 17:31:39 -08:00
sysctl.conf bug 8350: 2011-05-21 21:05:28 -04:00