On Fri, Sep 09, 2011 at 08:05:00PM +0200, S?bastien Riccio wrote: > Okay thanks it's clear. I'm trying to find a way to be nearly sure > that on a xen host if a customer vm gets hacked and starts flooding > the network like hell, it doesn't render the whole host unreachable > (That's what happened the first time I tried this test.) The first > step for me was to know what was the expected behavior of > openvswitch when this happens and then find a way to prevent it.
I think this is where Jesse's kernel work to ensure that no individual port can monopolize the kernel-to-user flow reporting channel becomes useful. I hope that it will be ready soon. _______________________________________________ discuss mailing list [email protected] http://openvswitch.org/mailman/listinfo/discuss
