Thanks, I'll take a look at this later. Have to head off to do some other stuff just now....
Hmmm. I kind of wonder what'd happen if you reinitialised your boot partition using the instructions here?
...
Thanks, I'll take a look at this later. Have to head off to do some other stuff just now....
Hmmm. I kind of wonder what'd happen if you reinitialised your boot partition using the instructions here?
...
Not familiar with 7zzcan you run small 7zip single thread benchmark within your Ubuntu VM on ESXi then PVE ?
7zz b -mmt1
Any idea if it was cpu bound, io bound, or something else?A VM there was taking about 2 times as long to do the same task
I tried many drivers including VirtIO. Never figured it out. Finally gave up and concluded that Proxmox is just plain slower than ESXi. Too slow for my uses unfortunately. Proxmox has a lot of great features I'd like to use and ESXi licensing isn't very friendly for small companies now it's part of BroadcomAny idea if it was cpu bound, io bound, or something else?
Also, did you use the VirtIO drivers for everything?
Again, do you remember if it was cpu bound, io bound, or something else?Never figured it out.
No idea. My standard test is a task that is regularly performed by my server. It reads a lot of data from a database, processes it and puts the results back. The task itself is typically cpu limited when using SSD drive and a reasonable bus because it's single threaded. I use it as a benchmark test and know how long it should take on different machines.Again, do you remember if it was cpu bound, io bound, or something else?
A good point to bring up, but depending upon what the VM is doing it can vary. I've tried all caching options and found 'direct sync' to be fastest.afaik, you need set cache=none in PVE to be closer to baremetal and esxi
This round of testing is being done on a Dell R730 with 2 x E5-2630 v3 @ 2.40GHz@GuyInCorner Awesome, thanks for getting around to this. Would you also be ok to screenshot the "Options" for the VM as well, as it's probably easier to do that rather than a bunch of back and forth questions to get the info.
With that host box, and the VM running on it, were any kind of cpu mitigations enabled?
If not, what's the approach you used for disabling them and verifying they're disabled? Asking because this thread has a decent chance of becoming solid reference information if we can get a fairly complete set of answers and drill into testing things out to figure what's going wrong.
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: KVM: Mitigation: Split huge pages
L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Mds: Mitigation; Clear CPU buffers; SMT vulnerable
Meltdown: Mitigation; PTI
Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable
Reg file data sampling: Not affected
Retbleed: Not affected
Spec rstack overflow: Not affected
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Retpolines; IBPB conditional; IBRS_FW; STIBP conditional; RSB filling; PBRSB-eIBRS Not affected; BHI Not affected
Srbds: Not affected
Tsx async abort: Not affected
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: Not affected
L1tf: Mitigation; PTE Inversion; VMX flush not necessary, SMT disabled
Mds: Mitigation; Clear CPU buffers; SMT Host state unknown
Meltdown: Mitigation; PTI
Mmio stale data: Mitigation; Clear CPU buffers; SMT Host state unknown
Reg file data sampling: Not affected
Retbleed: Not affected
Spec rstack overflow: Not affected
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Retpolines; IBPB conditional; IBRS_FW; STIBP disabled; RSB filling; PBRSB-eIBRS Not affected; BHI Retpoline
Srbds: Not affected
Tsx async abort: Not affected
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: KVM: Mitigation: VMX disabled
L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Mds: Mitigation; Clear CPU buffers; SMT vulnerable
Meltdown: Mitigation; PTI
Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable
Reg file data sampling: Not affected
Retbleed: Not affected
Spec rstack overflow: Not affected
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Retpolines; IBPB conditional; IBRS_FW; STIBP conditional; RSB filling; PBRSB-eIBRS Not affected; BHI Not affected
Srbds: Not affected
Tsx async abort: Not affected
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: KVM: Mitigation: VMX unsupported
L1tf: Mitigation; PTE Inversion
Mds: Mitigation; Clear CPU buffers; SMT Host state unknown
Meltdown: Mitigation; PTI
Mmio stale data: Mitigation; Clear CPU buffers; SMT Host state unknown
Reg file data sampling: Not affected
Retbleed: Mitigation; IBRS
Spec rstack overflow: Not affected
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; IBRS; IBPB conditional; STIBP disabled; RSB filling; PBRSB-eIBRS Not affected; BHI SW loop, KVM SW loop
Srbds: Not affected
Tsx async abort: Not affected