|

Meltdown and Spectre Patches May Increase CPU Load [Initial Findings]

Meltdown and Spectre Patches May Increase CPU Load [Initial Findings]

With the OS and hypervisor patches forย Meltdownย (CVE-2017-5754) having been released and the OS, hypervisor, and firmware patches forย Spectreย (CVE-2017-5715ย and CVE-2017-5753) in someย partial state of release depending on vendor,ย there have beenย manyย questions about the performance implications of updating.ย Because thereโ€™sย low-level interactionย at play forย Meltdownย andย Spectreย patches,ย the net result will depend significantly on factors like workload (e.g. what is it that users are actually doing), CPU architecture, OS version, hypervisor version, hardware characteristics, and so on. Thisย means that itโ€™sย essentialย to haveย aย method of benchmarking (and in someย cases predicting) what the net impact may be. Weโ€™ve undertaken someย initial testing to try and give someย indicative guidance but, as always, this may not be reflective of your experience depending on your unique setup.

Clearly there are a wild number of variables at play in this, but for starters, we chose to begin with VDI workloads as our impression was that these (along with other shared CPU scenarios) would be the most likely to see the significant aggregate impact. While we might not be able to validate all scenarios in-house, weย will attempt to benchmark common scenarios with more universal workloads, and weโ€™ll especially focus on slightly older hardware to make it more relevant to where many enterprise customers are likely to be in their product cycle for supporting servers.ย Additionally, weย will beย postingย more details on the discrete/physical workstation case when thereโ€™s more information to be drawn from theย SysTrackย Community.

The following is a short summary of our findings aroundย performance impacts ofย Meltdownย andย Spectreย patchesย on VDI workloads.ย You can also listen to the Lifeguard IT podcast for more background on Meltdown and Spectre. The discussion of our CPU impact findings starts at 6:40. The episode is alsoย available on iTunes/Apple Podcasts and Google Play.

Initialย Testing

Patch Testedย  Meltdownย ONLYย 
Hypervisor VMwareย ESXi, 6.0.0, 6921384
Guest OS Windows 10, build 15063
CPU Intel(R) Xeon(R) CPU E5-2670 v2 @ 2.50GHz
Memory 6 GB
Disk SSDย local storage
Density 62 VMs

 

To try and make our workload generally representative of what normal enterprise activity would look like for more of a task-based worker (restricted to mostly browser based and basic Office product usage),ย we restricted our artificial load to Internet Explorer, Microsoft Word, Outlook, and Excel.ย Quick shout-out toย Login VSIย for providing the framework for the synthetic transactions.

Methodology

Theย thought process for the testing was straightforward: letโ€™s evaluate the sameย workload and density on a single VDI host with both hypervisor and OS unpatched and then subsequently patched.ย For the evaluation of the impact,ย we continuously collected data withย SysTrackย toย monitorย allย the resource consumptionย metrics of interest as well as our ownย end-user experience KPIs and score.

So, letโ€™s get straight to the interesting part: what are the results?ย For the unpatched load, we saw an active average (only with workload, not idle) of around 20.26% CPU usage. For patched load, we saw 21.52%. Thatย means weโ€™re looking at around an increase ofย 1.26%ย CPUย inย activeย load.

Now, what does thatย mean overall?ย The workload increase in CPU usage on a per VM basis is small, but as we know,ย that can add up very quickly when you start dealing with higher densities. More importantly, we were only doing very I/O light applications, andย all indicationsย (at least for Windows) seem to show that I/O intense workloads can present much more of a problem.ย So, how can you figure out whether this is going to pose a problem for your users?

How do I play the home game with Meltdown and Spectre patches?

Luckily thisย can be aย simple three-step process,ย givenย the rightย Digital Experience Monitoringย tool.ย Now,ย assuming youโ€™ve gotย SysTrack, the process can be made even simpler with Lakeside’s newย Kit for both the predictive analysis and impact outline for after the patch is applied.ย Based on our understanding of the primary factors at play for the mitigationย methods to be used for both problems,ย weโ€™ve developed aย method of predicting a potential impact based on the activity from an existing system.ย This is best seen through our Speculation Control Kit dashboard.

 

 

This is a complex topic, and weโ€™ll have a lot more details as soon as we start to see more of the patched system results out in the wild. Stay tuned for more from us on performance testing, and feel free to reach out with anyย questions.

tl;dr: Performance impact per machine is lowย with a light workload: roughly 1.3% per VM, but that adds up quickly with density.ย Expect to see more impact fromย Spectre, and check with us for resources on how to analyze your environment’s impact.

Ready to find outย your risk? Contact us for a demo!

Share to:

Subscribe to the Lakeside Newsletter

Receive platform tips, release updates, news and more

Related Posts