Re: System VM network
So I guess yes: In each zone, you need to configure a range of reserved IP addresses for the management network. This network carries communication between the CloudStack Management Server and various system VMs, such as Secondary Storage VMs, Console Proxy VMs, and DHCP. The reserved IP addresses must be unique across the cloud. You cannot, for example, have a host in one zone which has the same private IP address as a host in another zone. The hosts in a pod are assigned private IP addresses. These are typically RFC1918 addresses. The Console Proxy and Secondary Storage system VMs are also allocated private IP addresses in the CIDR of the pod that they are created in. So I guess the system reserved IP’s should indeed be the private ones and not public IP’s, which would lead to my next question I suppose I cannot give this a self-defined VLAN and should be with my management network which is already defined on cloudbr0? Should I give the management and KVM host an IP from this private subnet as well? -- Jimmy Van: Jimmy Huybrechts Datum: woensdag, 1 november 2023 om 20:33 Aan: users@cloudstack.apache.org Onderwerp: System VM network Hi Team, I’m trying to built a lab of ACS 4.18 in Ubuntu 22 but I may be looking at the network and system vm’s the wrong way. I have a /27 my management server host has an IP out of and my KVM host has an IP out of lets call this range 192.168.10.0/27 (in reality this is a public subnet). Now when creating the zone and pods and such I created a Public range of 10.0.0.0/24 (or at least an internal range). When asked for the system reserved addresses I filled out 9 ip’s from my management subnet (192.168.10.0/27) under the impression that the console proxy etc would get an IP out of that range. When the System VM’s were built they yes had an IP from that management range but then as “Private IP”, the “Public IP” was an IP from 10.0.0.0/24 and of course I wasn’t able to use any of them not being reachable from the outside since the gateway and IP where the wrong one. Should I have set my management range as the public range with the ip’s it should use? And an internal range as system reserved addresses or what are the system reserved addresses for? -- Jimmy
System VM network
Hi Team, I’m trying to built a lab of ACS 4.18 in Ubuntu 22 but I may be looking at the network and system vm’s the wrong way. I have a /27 my management server host has an IP out of and my KVM host has an IP out of lets call this range 192.168.10.0/27 (in reality this is a public subnet). Now when creating the zone and pods and such I created a Public range of 10.0.0.0/24 (or at least an internal range). When asked for the system reserved addresses I filled out 9 ip’s from my management subnet (192.168.10.0/27) under the impression that the console proxy etc would get an IP out of that range. When the System VM’s were built they yes had an IP from that management range but then as “Private IP”, the “Public IP” was an IP from 10.0.0.0/24 and of course I wasn’t able to use any of them not being reachable from the outside since the gateway and IP where the wrong one. Should I have set my management range as the public range with the ip’s it should use? And an internal range as system reserved addresses or what are the system reserved addresses for? -- Jimmy
Re: noVNC performance
In case you've compared using KVM, by default the noVNC console is encrypted by CA framework b/w CPVM and the hypervisor host, which could induce some performance pressures. Also bear in mind you may be comparing: VM <- Proxmox vnc server -> novnc client in your browser (is this SSl enabled?) versus VM <- CloudStack KVM host encrypted qemu/vnc server -> vnc-over-TLS -> cpvm agent (reverse proxy) -> secured accessed your browser (in case of SSL enabled CPVM) In the latter (case with CloudStack), there is a double encryption/decryption that happens on the CPVM side on both sides. Regards. From: Murilo Moura Sent: Wednesday, November 1, 2023 16:22 To: users@cloudstack.apache.org Subject: Re: noVNC performance Hi Yadav! Yes, I even made this comparison with the same server where I was running Proxmox before. As for the client, I also accessed it from the same source that I previously used with Proxmox noVNC. I have the impression that there is some tuning opportunity that I haven't found yet, given that the noVNC library is used in both projects (Proxmox & Cloudstack), but with very different results. On Wed, Nov 1, 2023 at 7:26 AM Rohit Yadav wrote: > Hi Murilo, > > Have you tested/compared VNC based traffic between CloudStack VMs and > proxmox (or others) from the same server and client locations? > > Depending on your env, if you've a busy console proxy you can try to > upgrade the systemvm (CPVM) offering with more CPU (cores and speed) and > look at the network setup. > > You could also explore alternatives, for example if the guest VMs have RDP > setup/install such as in case of Windows VMs, you could use a RDP client > such as the Microsoft remote desktop app on the client side. In my > experience, RDP client with guest VMs have better performance and I/O > (webcam, microphone, speaker) than compared with VNC (noVNC). > > > Regards. > > > From: Murilo Moura > Sent: Wednesday, November 1, 2023 08:23 > To: users@cloudstack.apache.org > Subject: noVNC performance > > Is there any instruction to optimize the performance of the graphical > console via noVNC? For virtual machines with desktop enabled, the > performance of the noVNC console is very low. > > I came from experience with Proxmox and in it the noVNC console, even > protected by SSL, is much superior. That's why I wondered if there was any > way of tuning noVNC in ACS. > > > >
Re: noVNC performance
Hi Yadav! Yes, I even made this comparison with the same server where I was running Proxmox before. As for the client, I also accessed it from the same source that I previously used with Proxmox noVNC. I have the impression that there is some tuning opportunity that I haven't found yet, given that the noVNC library is used in both projects (Proxmox & Cloudstack), but with very different results. On Wed, Nov 1, 2023 at 7:26 AM Rohit Yadav wrote: > Hi Murilo, > > Have you tested/compared VNC based traffic between CloudStack VMs and > proxmox (or others) from the same server and client locations? > > Depending on your env, if you've a busy console proxy you can try to > upgrade the systemvm (CPVM) offering with more CPU (cores and speed) and > look at the network setup. > > You could also explore alternatives, for example if the guest VMs have RDP > setup/install such as in case of Windows VMs, you could use a RDP client > such as the Microsoft remote desktop app on the client side. In my > experience, RDP client with guest VMs have better performance and I/O > (webcam, microphone, speaker) than compared with VNC (noVNC). > > > Regards. > > > From: Murilo Moura > Sent: Wednesday, November 1, 2023 08:23 > To: users@cloudstack.apache.org > Subject: noVNC performance > > Is there any instruction to optimize the performance of the graphical > console via noVNC? For virtual machines with desktop enabled, the > performance of the noVNC console is very low. > > I came from experience with Proxmox and in it the noVNC console, even > protected by SSL, is much superior. That's why I wondered if there was any > way of tuning noVNC in ACS. > > > >
Re: noVNC performance
Hi Murilo, Have you tested/compared VNC based traffic between CloudStack VMs and proxmox (or others) from the same server and client locations? Depending on your env, if you've a busy console proxy you can try to upgrade the systemvm (CPVM) offering with more CPU (cores and speed) and look at the network setup. You could also explore alternatives, for example if the guest VMs have RDP setup/install such as in case of Windows VMs, you could use a RDP client such as the Microsoft remote desktop app on the client side. In my experience, RDP client with guest VMs have better performance and I/O (webcam, microphone, speaker) than compared with VNC (noVNC). Regards. From: Murilo Moura Sent: Wednesday, November 1, 2023 08:23 To: users@cloudstack.apache.org Subject: noVNC performance Is there any instruction to optimize the performance of the graphical console via noVNC? For virtual machines with desktop enabled, the performance of the noVNC console is very low. I came from experience with Proxmox and in it the noVNC console, even protected by SSL, is much superior. That's why I wondered if there was any way of tuning noVNC in ACS.