nettest
net-apache-ev-2
apache-ev-1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
apache-ev-2
Processor: 24 x Intel Xeon X5680 (47 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 24GB, Disk: 215GB Virtual disk, Graphics: VMware SVGA II, Network: Intel 82545EM
OS: Ubuntu 20.04, Kernel: 5.4.0-121-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Ethr
Ethr is a cross-platform Golang-written network performance measurement tool developed by Microsoft that is capable of testing multiple protocols and conducting different measurements. Learn more via the OpenBenchmarking.org test page.
Server Address: nettest - Protocol: TCP - Test: Latency - Threads: 1
apache-ev-1: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Failed to lookup IP address for the server: nettest. Error: lookup nettest: Temporary failure in name resolution
Server Address: nettest - Protocol: UDP - Test: Latency - Threads: 1
apache-ev-1: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Latency" for Protocol: "UDP" is not supported.
Server Address: nettest - Protocol: HTTP - Test: Latency - Threads: 1
apache-ev-1: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
apache-ev-1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 July 2022 15:49 by user finki.
apache-ev-2
Processor: 24 x Intel Xeon X5680 (47 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 24GB, Disk: 215GB Virtual disk, Graphics: VMware SVGA II, Network: Intel 82545EM
OS: Ubuntu 20.04, Kernel: 5.4.0-121-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 July 2022 15:52 by user finki.