[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How to benchmark disk/CPU performance in VMs

Posted on 2012-03-21
2
Medium Priority
?
723 Views
Last Modified: 2012-04-03
All, i need to find a way to benchmark disk/CPU performance in VMs. We re evaluation a few hosting providers but need to figure out a way to measure these resources first.

Thanks
0
Comment
Question by:cheto06
2 Comments
 
LVL 22

Accepted Solution

by:
Joseph Moody earned 1500 total points
ID: 37752054
http://technet.microsoft.com/en-us/library/dd744567(v=WS.10).aspx

We use the performance monitor to benchmark and test our VMware machines.

Check out ask the performance team blog. They have a lot of articles on disk benchmarking and generating daily benchmark tests
0
 
LVL 2

Expert Comment

by:papalala
ID: 37752241
I would recommend to benchmark your application on real machine first so you get some data for comparison.

Best tool to benchmark disk is IOmeter. You can find expected IOP values on wiki - http://en.wikipedia.org/wiki/IOPS

Regarding the CPU - if your company runs any kind of stress tests, it should be enough to compare results from real and virtual machine.
0

Featured Post

NEW Veeam Backup for Microsoft Office 365 1.5

With Office 365, it’s your data and your responsibility to protect it. NEW Veeam Backup for Microsoft Office 365 eliminates the risk of losing access to your Office 365 data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question