EcoStruxure IT forum
Schneider Electric support forum about installation and configuration for DCIM including EcoStruxure IT Expert, IT Advisor, Data Center Expert, and NetBotz
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-04 05:45 PM . Last Modified: 2024-04-04 11:48 PM
We are currently experiencing slow DCE server response time. After adding virtual sensors the application will hang (grey out) for anywhere between 5 and 10 minutes., it can take up to 5 minutes to move a PDU to a different zone/room/container this happens when a single user has the application open or when multiple users have it open. This is happening at two separate sites both are running their own instance of DCE with approx. 3500 nodes at each site. Both running DCE 7.4.3, network response times are generally under 20ms and users accessing the application are on the same network. I have restarted both servers and increased the polling time, neither has resolved the issue.
(CID:131961662)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-04 05:45 PM . Last Modified: 2024-04-04 11:48 PM
Dear Mark Tucker,
These my questions are related to the recently discovered vulnerabilities of Meltdown and Spectre. If your DCE servers are VMware virtual guests, then maybe your VMware command applied security patches for ESXi hypervisors or updated CPU microcode, BIOS and so on? All this could significantly affect the performance of guest machines, especially closed appliances (such as DCE software), which are not able to be often updated.
For example, as indicated in the special article Controlling the Performance Impact of Microcode and Security Patches for CVE-2017-5754 CVE-2017-5715... on the RHEL website:
Red Hat has made updated kernels available to address these security vulnerabilities. These patches are enabled by default (detailed below) because Red Hat prioritizes out of the box security. Speculative execution is a performance optimization technique. Thus, these updates (both kernel and microcode) may result in workload-specific performance degradation...
And in order to avoid the consequences of performance degradation as much as possible, in the article Kernel Side-Channel Attacks - CVE-2017-5754 CVE-2017-5753 CVE-2017-5715 and in the special detection script on the RHEL website it is said:
Red Hat recommends that you:
Note about virtualization
In virtualized environment, there are more steps to mitigate the issue, including:
* Host needs to have updated kernel and CPU microcode
* Host needs to have updated virtualization software
* Guest needs to have updated kernel
* Hypervisor needs to propagate new CPU features correctly
For more details about mitigations in virtualized environment see:
https://access.redhat.com/articles/3331571For more information about the vulnerabilities see:
https://access.redhat.com/security/vulnerabilities/speculativeexecution
Additionally, as a preventive and verification method, I recommend that you upgrade at least one of your DCE servers to the latest version of DCE-7.5.0. Read, for example, on this subject article Security fixes in StruxureWare Data Center Expert v7.6.0.
I hope this helps you.
With respect.
(CID:131961816)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-04 05:46 PM . Last Modified: 2024-04-04 11:48 PM
Both are physical servers
Approx 3 months
Smoothly
Servers were upgraded to v7.4.3 at Schnieders recommendatiuon to protect against Spectre-Meltdown.
(CID:131963727)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-04 05:46 PM . Last Modified: 2024-04-04 11:48 PM
Dear Mark Tucker,
Servers were upgraded to v7.4.3 at Schnieders recommendatiuon to protect against Spectre-Meltdown.
This is false, since if you read article Software Vulnerability Scan(s) StruxureWare Data Center Expert, you should be aware, that fixes for these vulnerabilities are only available starting with DCE-7.5.0.
Ok, then if it's a physical server and the problem is constantly present, it's very useful to perform an analysis of server system logs.
How to download server system logs is well told in the post .
What useful information can be learned by analyzing these server system logs can be found in my comment on post :
I am always glad to help.
(CID:131963725)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-04 05:46 PM . Last Modified: 2024-04-04 11:48 PM
Dear Mark Tucker,
Tell us, please, could you solve your problem or not?
With respect.
(CID:131962918)
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2020-07-04 05:46 PM . Last Modified: 2023-10-22 03:56 AM
This question is closed for comments. You're welcome to start a new topic if you have further comments on this issue.
Link copied. Please paste this link to share this article on your social media post.
Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.