Nginx setting up >25.000 concurrent connections per second
MagicBear
magicbearmo at gmail.com
Fri Oct 7 01:10:02 UTC 2011
here is my server results.
using 3 of ab, each open 10000 concurrent connections.
cat logger | sed 's/||/ /g' | awk '{print $3}'| sed 's/\.[0-9]\+//g'
| sort | uniq -c
66776 1317949624
91383 1317949625
92828 1317949626
93364 1317949627
91456 1317949628
93498 1317949629
92916 1317949630
91795 1317949631
91921 1317949632
92935 1317949633
93000 1317949634
89737 1317949635
91141 1317949636
93217 1317949637
93490 1317949638
93069 1317949639
88566 1317949640
93721 1317949641
93860 1317949642
90619 1317949643
93118 1317949644
93011 1317949645
94501 1317949646
93367 1317949647
92656 1317949648
91941 1317949649
using 60% of cpu.
Server Environment:
4x AMD Quad-Core 8360 SE (total 16 cores)
32G DDR2
SATA3 SSD (r/w 550MB/s)
4x1Gbps Ethernet
2011/10/7 Bradley Falzon <brad at teambrad.net>:
> On Fri, Oct 7, 2011 at 5:00 AM, atadmin <nginx-forum at nginx.us> wrote:
>>
>> # Turn on syncookies for SYN flood attack protection
>> net.ipv4.tcp_syncookies = 0
>
> I've never tested the performance benefit (and the costs) of having sync
> cookies enabled or not, but that command there suggests you have turned sync
> cookies off (you probably want it enabled - again it comes at a cost I
> haven't personally investigated).
>
> Also, you have mentioned the state of iptables connection tracking yet. That
> could be a problem if you believe the bottleneck is the server and haven't
> checked that already. You probably want to disable nf_conntrack and rewrite
> your iptables rules (or just disable firewalling completely).
>
> --
> Bradley Falzon
> brad at teambrad.net
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>
--
MagicBear
More information about the nginx
mailing list