虚机资源的分配---CPU、内存
CPU分配原则:
尽量使用最少的vCPUs,如果是单线程应用,不支持多线程处理,请不要使用virtual SMP
虚拟CPU数量不要等于或超过物理CPU核数,如双路双核服务器配置的虚机最多使用两个虚拟CPU
当配置虚拟机的时候须了解ESX服务器本身也有一些overhead。需注意不要超过所有虚拟机使用率和所有vCPU汇总数目。
观察”idle loop spin”功能参数,某些操作系统当它们闲置时,并不会真正的释放virtual CPU。
确认配置了单一处理器的虚拟机为”UP HAL/kernel”,多处理器的虚拟机必须设定为”SMP HAL/kernel”。
内存分配原则:
内存总量为在资源评估后,计算虚拟机评估结果所需实际物理内存的总和,其他由于应用程序而产生的更多内存需要可以用ESX的磁盘内存来解决
关键应用可考虑固定内存的方法以保证性能的稳定性
Key Points:
[Slide purp操作系统e: to relate the challenges on previous slide to important consequences of th操作系统e challenges]
Result of these challenges is:
Increasing c操作系统ts related to desktop infrastructure
Decreasing manageability
Increasing security risks
Additional Notes:
Increasing c操作系统ts:
Only about 30% of TCO of PC’s is the c操作系统t of hardware; the remaining 70% is the c操作系统t of deployment, management, and support
Backup, recovery, and remote access require additional spending and continuous updating
A distributed desktop environment complicates management and tasks like backup, leading to these higher c操作系统ts
Decreasing manageability:
Continuous stream of patches and updates that need to be tested against all 操作系统 images in environment
Complexity of migrating to new PC hardware because new PC hardware often requires new 操作系统 image or even new 操作系统 version
Growing security risks:
Cases involving theft of proprietary information were twice as common in 2005 as in previous year (Computer Security Institute survey)
Average c操作系统t of a security breach was $204,000 per survey respondent (Computer Security Institute survey)
1