iscsi-esxi-host-win2019-iozone-test
VMware testing on Microsoft Windows Server 2019 Standard Build 17763 via the Phoronix Test Suite.
iscsi-esxi-host-win2019-iozone-test
Processor: 2 x Intel Xeon E5-2670 v2 @ 2.50GHz (2 Cores), Motherboard: Intel 440BX (VMW71.00V.0.B64.1903020819 BIOS), Memory: 1 x 8192 MB 0MHz VMW-8192MB, Disk: 60GB VMware Virtual disk Disk, Graphics: VMware SVGA 3D, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand
OS: Microsoft Windows Server 2019 Standard Build 17763, Kernel: 10.0 (x86_64), Display Driver: 8.16.1.24, File-System: NTFS, Screen Resolution: 1454x909, System Layer: VMware
Processor Notes: CPU Microcode: 000000002E040000
Security Notes: __user pointer sanitization: Disabled + IBRS: Enabled + STIBP: Enabled + KPTI Enabled: Yes + PTE Inversion: Yes
IOzone
The IOzone benchmark tests the hard disk drive / file-system performance. Learn more via the OpenBenchmarking.org test page.
iscsi-esxi-host-win2019-iozone-test
Processor: 2 x Intel Xeon E5-2670 v2 @ 2.50GHz (2 Cores), Motherboard: Intel 440BX (VMW71.00V.0.B64.1903020819 BIOS), Memory: 1 x 8192 MB 0MHz VMW-8192MB, Disk: 60GB VMware Virtual disk Disk, Graphics: VMware SVGA 3D, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand
OS: Microsoft Windows Server 2019 Standard Build 17763, Kernel: 10.0 (x86_64), Display Driver: 8.16.1.24, File-System: NTFS, Screen Resolution: 1454x909, System Layer: VMware
Processor Notes: CPU Microcode: 000000002E040000
Security Notes: __user pointer sanitization: Disabled + IBRS: Enabled + STIBP: Enabled + KPTI Enabled: Yes + PTE Inversion: Yes
Testing initiated at 7 August 2021 13:48 by user Administrator.