On 09.09.2011 20:09, Ben Pfaff wrote:
On Fri, Sep 09, 2011 at 08:05:00PM +0200, S?bastien Riccio wrote:
Okay thanks it's clear. I'm trying to find a way to be nearly sure
that on a xen host if a customer vm gets hacked and starts flooding
the network like hell, it doesn't render the whole host unreachable
(That's what happened the first time I tried this test.)  The first
step for me was to know what was the expected behavior of
openvswitch when this happens and then find a way to prevent it.
I think this is where Jesse's kernel work to ensure that no individual
port can monopolize the kernel-to-user flow reporting channel becomes
useful.  I hope that it will be ready soon.


Ah, excellent. I will be ready to test it when it'll be ready. Thanks for your help!

Sébastien

_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to