WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] High Load in Dom0

To: Josef Liška <jl@xxxxxx>
Subject: Re: [Xen-users] High Load in Dom0
From: Rus Foster <twattycake@xxxxxxxxx>
Date: Wed, 10 Nov 2010 13:32:43 +0000
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Wed, 10 Nov 2010 05:33:41 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=HjhU8coOnnY/k6UWxTxVFL/Ts7XaPAmWe/K34Om1ZO0=; b=g/2q4PQXKqPk4ES3Ub9nqqq9AtrRv7AtNsVJEsnjB5RTHCbatIvjnOS4dkBb2sGPD9 C+hql89dyx40HmWdso9ZBXHMflJhq51c0VukAyKBPFlUocKuxaP2GAXd+DPPm9fQXXAw UePKCgNG82k1XPhERBqfOU0SJuGL+Rm6/wark=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=d0hFHKQ6x8C5r2dw3WxSiGx1Sy7sjb14Lrnt+TeZD95OKGmLcEJ5ql3NvASZKX0VsQ lIRWqK5jpdzBAIKaC1ceAF+U+J/InMF1GJFVBTooT6vN2XaqytXpZ1Z1H/VPJ5u/3EBe 1cQLky86VIWTsDBEfBgPekgjP/KpMT/rnYeLM=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4CDA431E.20904@xxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <AANLkTincj2JsFxyP=wtgHK6ccs4KHFBYBUktGC5Q3=Ji@xxxxxxxxxxxxxx> <4CDA431E.20904@xxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
2010/11/10 Josef Liška <jl@xxxxxx>:
> Hi,
> I'd suggest inspecting netflows. We had similar problem, which was caused by
> several virtual servers hacked (customer created accont test with password
> test) and used for DoS attacks to china with small udp packets.
> Packet rate caused by single hacked virtual was more than 100k/s
>

Thanks. Tried that but still seeing it (updated to use our interface
names). We are seeing about 190 kbits/s to the server so virtually
nothing

Using stock centos 5.x kernel but going to try downgrading incase its
something silly like a 3ware driver issue

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>