NUC10i7 ESXi Wireguard
VMware testing on Ubuntu 20.04 via the Phoronix Test Suite.
12vCPU Wireguard ESXi6.7 NUC10i7
Processor: Intel Core i7-10710U (12 Cores), Motherboard: Intel 440BX (VMW71.00V.15401161.B64.2001021853 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 8GB, Disk: 26GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.4.0-51-generic (x86_64), File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
12vCPU Wireguard ESXi6.7 NUC10i7
Processor: Intel Core i7-10710U (12 Cores), Motherboard: Intel 440BX (VMW71.00V.15401161.B64.2001021853 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 8GB, Disk: 26GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 20.04, Kernel: 5.4.0-51-generic (x86_64), File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 October 2020 02:05 by user dre.