On Fri, Sep 09, 2011 at 08:05:00PM +0200, S?bastien Riccio wrote:
> Okay thanks it's clear. I'm trying to find a way to be nearly sure
> that on a xen host if a customer vm gets hacked and starts flooding
> the network like hell, it doesn't render the whole host unreachable
> (That's what happened the first time I tried this test.)  The first
> step for me was to know what was the expected behavior of
> openvswitch when this happens and then find a way to prevent it.

I think this is where Jesse's kernel work to ensure that no individual
port can monopolize the kernel-to-user flow reporting channel becomes
useful.  I hope that it will be ready soon.
_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to