[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] High Load in Dom0


  • To: Josef Liška <jl@xxxxxx>
  • From: Rus Foster <twattycake@xxxxxxxxx>
  • Date: Wed, 10 Nov 2010 13:32:43 +0000
  • Cc: xen-users@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 10 Nov 2010 05:33:41 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=d0hFHKQ6x8C5r2dw3WxSiGx1Sy7sjb14Lrnt+TeZD95OKGmLcEJ5ql3NvASZKX0VsQ lIRWqK5jpdzBAIKaC1ceAF+U+J/InMF1GJFVBTooT6vN2XaqytXpZ1Z1H/VPJ5u/3EBe 1cQLky86VIWTsDBEfBgPekgjP/KpMT/rnYeLM=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

2010/11/10 Josef LiÅka <jl@xxxxxx>:
> Hi,
> I'd suggest inspecting netflows. We had similar problem, which was caused by
> several virtual servers hacked (customer created accont test with password
> test) and used for DoS attacks to china with small udp packets.
> Packet rate caused by single hacked virtual was more than 100k/s
>

Thanks. Tried that but still seeing it (updated to use our interface
names). We are seeing about 190 kbits/s to the server so virtually
nothing

Using stock centos 5.x kernel but going to try downgrading incase its
something silly like a 3ware driver issue

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.