?
Solved

Question in Linux and Siege

Posted on 2013-06-20
2
Medium Priority
?
290 Views
Last Modified: 2013-07-01
I have a customer who has the following issue

We're seeing some really strange results as we benchmark our new dedicated servers before putting them into full production.

In essence, we have conducted a series of siege tests from Server3 , through the public network to a Gateway to Server2.

Notice that the ability of Server1 to generate requests seems to fluctuate DRAMATICALLY, which flows through the system as expected.

is anything we're missing that might erratically influence the amount of requests we can generate in our siege test? As near as we can tell, this should be a straight forward test that produces consistent results, and could use a little insight .

So basically every server has a private and a public interface.

Any input would be appreciated.
0
Comment
Question by:c_hockland
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
Vijay Pratap Singh earned 2000 total points
ID: 39264946
Please check the network bottle neck and generate a SAR report while doing tests at max level, IO tests that will help to figure out whats the issue.
0
 

Author Closing Comment

by:c_hockland
ID: 39290143
sorry for this big delay. Thank u much for the response.
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question