[FUG-BR] Valor aconselhavel para variável HZ
Paulo Henrique - BSDs
paulo.rddck em bsd.com.br
Quarta Novembro 5 15:58:38 BRST 2014
Saudações,
Gostaria de saber se alguém trabalha com a variável HZ com o valor
superior a 2000, caso sim o ambiente fica estável, há uma melhora no
desempenho do sistema e da rede ?
Sei que a mesma interfere quanto ao uso da bateria em portáteis contudo
a duvida é restrita a servidores.
Aumentar o valor da mesma em um servidor com 12 Cores / 24 Threads com
32Gbytes de ram melhorará o desempenho.
Abaixo tem os dados do sistema atualmente.
O HZ do sistema está em 2000.
uname -a
FreeBSD xxxxx 10.0-STABLE FreeBSD 10.0-STABLE #0 r269344: Thu Jul 31
14:39:46 BRT 2014
netstat -m
yyyyyyy em xxxxx:/usr/obj/usr/src/sys/XXXXXXXXXXX amd64
11204/15571/26775 mbufs in use (current/cache/total)
1023/9825/10848/2036062 mbuf clusters in use (current/cache/total/max)
1023/9512 mbuf+clusters out of packet secondary zone in use (current/cache)
0/548/548/1018031 4k (page size) jumbo clusters in use
(current/cache/total/max)
0/0/0/301638 9k jumbo clusters in use (current/cache/total/max)
0/0/0/169671 16k jumbo clusters in use (current/cache/total/max)
4847K/25734K/30581K bytes allocated to network (current/cache/total)
0/0/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters)
0/0/0 requests for mbufs delayed (mbufs/clusters/mbuf+clusters)
0/0/0 requests for jumbo clusters delayed (4k/9k/16k)
0/0/0 requests for jumbo clusters denied (4k/9k/16k)
0 requests for sfbufs denied
0 requests for sfbufs delayed
9966280 requests for I/O initiated by sendfile
uptime
15:47 up 86 days, 19:40, 1 user, load averages: 8,15 8,86 9,27
Alguns tunnings que já foi feito no sistema.
# $FreeBSD: stable/10/etc/sysctl.conf 112200 2003-03-13 18:43:50Z mux $
#
# This file is read when going to multi-user and its contents piped thru
# ``sysctl'' to adjust kernel values. ``man 5 sysctl.conf'' for details.
#
# Uncomment this to prevent users from seeing information about
processes that
# are being run under another UID.
#security.bsd.see_other_uids=0
kern.maxfiles=1000000
# Otimizacoes de rede.
#kern.ipc.nmbclusters=131072 # 128Mb para buffer de rede - Ficou
instavel valor definido pelo sistema.
kern.ipc.maxsockbuf=33554432
net.inet.tcp.sendbuf_max=33554432
net.inet.tcp.recvbuf_max=33554432
net.inet.tcp.sendspace=1048576 # default 65536
net.inet.tcp.recvspace=1048576 # default 32768
net.inet.tcp.sendbuf_inc=1048576 # 8192 default
net.inet.tcp.recvbuf_inc=1048576 # 16384 default
kern.ipc.somaxconn=4096 # 128 default
net.inet.tcp.syncache.rexmtlimit=1
net.inet.tcp.syncookies=1
# COnfigura▒▒es de Seguran▒a
# General Security and DoS mitigation.
net.inet.ip.check_interface=1 # verify packet arrives on correct interface
net.inet.ip.portrange.randomized=1 # randomize outgoing upper ports
net.inet.ip.process_options=0 # IP options in the incoming packets will
be ignored
net.inet.ip.random_id=1 # assign a random IP_ID to each packet leaving
the system
net.inet.ip.redirect=0 # do not send IP redirects
net.inet.ip.accept_sourceroute=0 # drop source routed packets since they
can not be trusted
net.inet.ip.sourceroute=0 # if source routed packets are accepted the
route data is ignored
#net.inet.ip.stealth=1 # do not reduce the TTL by one(1) when a packets
goes through the firewall
net.inet.icmp.bmcastecho=0 # do not respond to ICMP packets sent to IP
broadcast addresses
net.inet.icmp.maskfake=0 # do not fake reply to ICMP Address Mask
Request packets
net.inet.icmp.maskrepl=0 # replies are not sent for ICMP address mask
requests
net.inet.icmp.log_redirect=0 # do not log redirected ICMP packet attempts
net.inet.icmp.drop_redirect=1 # no redirected ICMP packets
#net.inet.icmp.icmplim=50 # 50 ICMP packets per second. a reasonable
number for a small office.
#net.inet.tcp.delayed_ack=1 # always employ delayed ack, 6 packets get 1
ack to increase bandwidth
net.inet.tcp.drop_synfin=1 # SYN/FIN packets get dropped on initial
connection
net.inet.tcp.ecn.enable=1 # explicit congestion notification (ecn)
warning: some ISP routers abuse it
net.inet.tcp.fast_finwait2_recycle=1 # recycle FIN/WAIT states quickly
(helps against DoS, but may cause false RST)
net.inet.tcp.icmp_may_rst=0 # icmp may not send RST to avoid spoofed
icmp/udp floods
net.inet.tcp.maxtcptw=15000 # max number of tcp time_wait states for
closing connections
net.inet.tcp.msl=5000 # 5 second maximum segment life waiting for an ACK
in reply to a SYN-ACK or FIN-ACK
net.inet.tcp.path_mtu_discovery=0 # disable MTU discovery since most
ICMP packets are dropped by others
net.inet.tcp.rfc3042=0 # disable the limited transmit mechanism which
can slow burst transmissions
#net.inet.tcp.sack.enable=1 # sack disabled?
http://www.ibm.com/developerworks/linux/library/l-tcp-sack/index.html
net.inet.udp.blackhole=1 # drop udp packets destined for closed sockets
net.inet.tcp.blackhole=2 # drop tcp packets destined for closed ports
#net.route.netisr_maxqlen=4096 # route queue length defaults 4096
(rtsock using "netstat -Q")
security.bsd.see_other_uids=0 # hide processes for root from user uid's
## Configuracoes de envio
net.local.stream.sendspace=164240
net.local.stream.recvspace=164240
## Configuracoes contra spoof
net.inet.ip.rtexpire=60 # 3600 secs
net.inet.ip.rtminexpire=2 # 10 secs
net.inet.ip.rtmaxcache=1024 # 128 entries
Qualquer orientação é bem vinda.
Att.
--
Paulo Henrique.
Grupo de Usuários de Sistemas BSDs no Brasil.
Fone: +55 21 96713-5042
Não importa o que faça, sempre haverá alguém em algum lugar do mundo que será sempre melhor do que você.
Mais detalhes sobre a lista de discussão freebsd