Reading Time: 2 minutes

As written in the previous posts, in the ESXi installation there are two copy of the system image located in two different partitions (see Partitions layout of system disk and More on partitions posts).

The actual system image is located on the first 250 MB partition, formatted with plain old FAT16 filesystem, but using a special pseudo-filesystem on it (see VisorFS: A Special-purpose File System for Efficient Handling of System Images). The image itself, s.v00, is a 124 MB compressed file, which is decompressed on boot and contains the hypervisor operating system. Note that the compressed image is larger in 5.0 than in 4.1, (where the image was 70 MB), but still a very small disk foot print with about 124 MB in 5.0.

continue reading…

Reading Time: 2 minutes

In a previous post I’ve described the partitions used by a ESXi installation (see ESXi – Partitions layout of system disk).

Partitions are formatted with a FAT16 filesystem, but the ESXi files are stored into the banks partitions with a specific system that consist in some compressed archives containing the required files or more archives (as also described in the yesterday’s post about the reset of the root password). More details on the filesystem used is on the first number of the VMware Technical Journal, in the paper: VisorFS: A Special-purpose File System for Efficient Handling of System Images.

But for a installation on small disks or on a USB keys/flash card more considerations are needed about ESXi partitions, expecially for the missing scratch partition.

continue reading…

Reading Time: 2 minutes

Reset the root password with ESX 3.x was quite simple, just because the service console was a partition writable a live CD… With ESX 4.x it was a little more complicated (the service console was basically a vmdk).

But with ESXi things are more complicated, due to the partition layout, that ESXi works in RAM and that all configurations files are stored in the banks it special archive files. The file containing the password hashes is called “shadow” and it is is contained in  a nested structure of archives inside the state.tgz file.

continue reading…

Reading Time: 3 minutes

As most people know, Intel adopt a Tick Tock model for processors development: a tick advances manufacturing technology, a tock delivers new microarchitecture. Usually this mean that a tick means processors with more frequency speed (sometimes also more cores and/or more cache) and a tock means usually new features (but not necessary more frequency speed and/or more cache/cores).

But when a new generation (tick or tock) as been introduced, after some months, this usually means cheaper processors (or at similar price) compared to previous generation.

Now a possible confusion could be generated by the Westmere family (the tick evolution of the Nehalem) that was probably much articulated with at least two big Xeon branch: the Westmere-EP (really simple to understand a just an evolution in speed of the previous models) and the Westmere-EX (the Xeon E7 series) that was much similar as a tock evolution.

To make things more complicated the tock evolution as been called Xeon E5, making diffult a comparison with the E7 (the old model) series, for several reasons: numbers does not help (E5 seems a system with lower feature compared to E7), cache is bigger on E7 (24 MB compared to 20MB), memory speed is limited on E7 (also compared with old Westmere-EP).

But price comparison is much interesting: if we compared a E5-2670 (Recommended Customer Price: $1552 – $1556) with a E7-4830 (Recommended Customer Price: $2059) price make the E5 solution much valuable (considering that also are mounted on new servers generations). With the only (little) disadvantage of the cache size. For a complate feature comparison see the datasheets at Intel web site:

Product Name Intel® Xeon® Processor E5-2670 (20M Cache, 2.60 GHz, 8.00 GT/s Intel® QPI) Intel® Xeon® Processor E7-4830 (24M Cache, 2.13 GHz, 6.40 GT/s Intel® QPI)
Code Name Sandy Bridge-EP Westmere EX
Essentials
Status Launched Launched
Launch Date Q1’12 Q2’11
Processor Number E5-2670 E7-4830
# of Cores 8 8
# of Threads 16 16
Clock Speed 2.6 GHz 2.13 GHz
Max Turbo Frequency 3.3 GHz 2.4 GHz
Cache 20 MB 24 MB Intel® Smart Cache
Bus/Core Ratio 33 16
Bus Type QPI QPI
System Bus 8 GT/s 6.4 GT/s
# of QPI Links 2
Instruction Set 64-bit 64-bit
Instruction Set Extensions AVX SSE4.1/4.2
Embedded Options Available No No
Lithography 32 nm 32 nm
Scalability 2S Only S4S
Max TDP 115 W 105 W
VID Voltage Range 0.60V-1.35V
Recommended Customer Price 2059.00
Memory Specifications
Max Memory Size (dependent on memory type) 750 GB 2048 GB
Memory Types DDR3-800/1066/1333/1600 DDR-3 800/978/1066/1333 (Max Speed 1066 MHz)
# of Memory Channels 4 4
Max Memory Bandwidth 51.2 GB/s
ECC Memory Supported Yes Yes
Expansion Options
PCI Express Revision 3.0
Package Specifications
Max CPU Configuration 2 4
TCASE 81.8°C 64°C
Package Size 52.5mm x 45.0mm 49.17mm x 56.47mm
Sockets Supported FCLGA2011 LGA1567
Low Halogen Options Available See MDDS See MDDS
Advanced Technologies
Intel® Turbo Boost Technology 2.0 Yes
Intel® vPro Technology Yes
Intel® Hyper-Threading Technology Yes Yes
Intel® Virtualization Technology (VT-x) Yes Yes
Intel® Virtualization Technology for Directed I/O (VT-d) Yes
Intel® Trusted Execution Technology Yes Yes
AES New Instructions Yes Yes
Intel® 64 Yes Yes
Idle States Yes
Enhanced Intel SpeedStep® Technology Yes Yes
Intel® Demand Based Switching Yes
Thermal Monitoring Technologies Yes Yes
Intel® Flex Memory Access Yes
Execute Disable Bit Yes Yes

For new processors (actually only for the desktop market) see also: Unofficial Intel Ivy Bridge CPU Datasheet.

Reading Time: 2 minutes

Microsoft has recently made some changed in certifications and also has introduced new paths, like the new MCSE: Private Cloud certification. The path has the following requirements:

  • become a MCSA: Windows Server 2008
  • pass the Exam 247: Configuring and Deploying a Private Cloud with System Center 2012 (Until January 31, 2013, Exam 70-659 may be taken in place of 70-247)
  • pass the Exam 246: Monitoring and Operating a Private Cloud with System Center 2012

Note The Private Cloud certification requires candidates to show continued ability to perform in this technology area by completing a recertification exam every three years.

As you can notice Microsoft has reintroduce some old certification names, now new meaning, but still with similar skill as in the past: MCSA and MCSE. For more information see the certification page on Microsoft site.

continue reading…

Reading Time: 2 minutes

Although the official confirmation has yet arrived via email, it seems that (also) this year I was confirmed as a vExpert. Or at least they appear on the list published on the site: Announcing vExpert 2012 title holders.

Considering the changes in the vExpert program and that I’ve tried the “Evangelist” path (probably the most “wanted” or at least desired… and where there are some really great evangelists) I be enormously honored by this confirmation. It ‘s been less than a year since the last vExpert 2011, but I seems that were only few days.

continue reading…

Reading Time: 4 minutes

As written in the previous post, the management web interface is build around at the load balancer features. But most terms and concepts are the same of other solutions and at least we have:

  • Virtual Services (VS): a virtual IP or VIP (or a pair of IP and port) for a specific virtual service that will me managed by the load balancer
  • Real Servers (RS): the servers (physical or virtual) that hosts the services
  • Forwarding methods: how packets are delivered to the real servers. VLM support NAT or Direct Server Route (DSR) al L4 and NAT at L7.
  • Scheduling methods or algorithms: how the different connections are distributed to the different real servers. VLM has really a large number of methods (LoadMaster Installation & Configuration Guide pag. 18-19), with some really interesting (like Agent Based Adaptive Balancing). Not the the methods of LVS are only a limited sub-set
  • Persistence: how to be keep sessions and states (when needed, for example in https connections). This is usually a pain in most load balancer (for example in LVS you have only a time option). VLM has different methods (LoadMaster Installation & Configuration Guide pag. 21-25) included Layer 7 Persistence Methods

The setup of a new virtual service is really simple and the defaults are usually good enough: just add an IP and a port. You can also specify the type of service (HTTP/HTTPS, generic, STARTTLS or Terminal Server), but usually VLM will find the right one automatically. At this point you can add the real servers by choosing the IP, port, forward methods and weight (used in some scheduling methods). Note that the server check part is common for all the real server and can use also specific application level tests.

SSL Offload is just an option, as also L7 features. Note that persistence and the scheduler options are common both in L7 and L4 (enabled when L7 is disabled) mode.

Very interesting that you can configure the load balancer in a one-armed configuration without any specific configuration on the Real Servers (with Linux Virtual Server and Direct Route you need some tweaks on the the RS…). For example, I’ve tried a configuration with a load balancer in the same network of the real servers, and also with VIP in the same network: all was fine with L7, both when clients where in the same network and also when client where outside and an external NAT was used to reach the VPI (in this second case the option “L7 Transparency” has to be un-flagged).

To be honest, if you use L4 and DSR you still need to modify the configuration of the real servers (exactly as in Linux Virtual Server with Direct Route): The VIP address on a Real Servers must be configured so that the server does not respond to arp requests on the VIP address (see LoadMaster Installation & Configuration Guide at pages 137-147).

Conclusions

The KEMP product is complete and powerful, but also quite simple to be deployed and used in few minutes. Probably is one of the best solution for load balancing features. Really interesting the limited footprint and the speed of the appliance. It’s a pitty the missing integration with VMware Tools (or Integration Services in Hyper-V).

Although it include also some other features like filtering and proxy-cache, those are still related only with load balancing features, so it does not replace firewall or proxy server.

Previous posts

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright