You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/azure-vmware-solution-nsx-scale-and-performance-recommendations-for-vmware-hcx.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
-
title: NSX Scale and Performance Recommendations for VMware HCX
2
+
title: NSX Scale and Performance Recommendations
3
3
description: Learn about the default NSX Topology in Azure VMware Solution and recommended practices to mitigate performance issues around HCX migration use cases.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 12/19/2024
6
+
ms.date: 1/9/2026
7
7
ms.custom: engagement-fy25
8
8
# Customer intent: As an IT administrator managing HCX migrations on Azure VMware Solution, I want to optimize NSX Edge performance and mitigate bottlenecks, so that I can ensure efficient data transfer and reliable application performance during migration tasks.
9
9
---
@@ -62,7 +62,7 @@ Using the built-in NSX alarm framework is recommended to monitor and identify ke
62
62
63
63
### How to Monitor and Identify NSX Edge Data Path Resource Constraints
64
64
65
-
NSX Edge performance can be monitored and identified by using the built-in NSX alarm framework. The following critical NSX Edge alarms identify the NSX Edge data path resource constraints:
65
+
NSX Edge performance can be monitored and identified by using the built-in NSX alarm framework. Customer can use the NSX UI or API to monitor alarms, or utilize Azure VMware Solution Resource Health notifications to alert customers when Edge resource constraint alarms are triggered. More information on the resource health feature is documented [here](resource-health-for-azure-vmware-solution-overview.md). The following critical NSX Edge alarms identify the NSX Edge data path resource constraints.
66
66
67
67
1. Edge NIC Out of Transmit/Receive buffer.
68
68
@@ -74,7 +74,7 @@ NSX Edge performance can be monitored and identified by using the built-in NSX a
74
74
75
75
## How to fix the NSX Edge resource constraints
76
76
77
-
To validate the issue, check Historic/Realtime traffic throughput at the alarm time for the correlation.
77
+
To validate the issue, check Historic/Real time traffic throughput at the alarm time for the correlation.
* Edge Scale up may not help if you have one or more heavy flows, for example, HCX Network Extension (NE) to Network Extension (NE) traffic, as this traffic could potentially pin to one of the DPDK CPU cores.
90
90
91
-
2. Tier-1 Gateway Topology Change: Change the Azure VMware Solution NSX default Tier-1 Gateway topology with multiple Tier-1 Gateways to split the traffic across multiple Edge VMs
91
+
2. NSX Tier-1 Gateway Topology Change:
92
+
93
+
* Set up a new Tier-1 gateway in "Distributed-only" mode and migrate all segments to it to optimize usage of all available Edges through distributed flow based hashing for all north-south traffic. Note that the NSX distributed Tier-1 gateway does not support gateway services such as Gateway Firewall, VPN, DNS, or DHCP
94
+
95
+
* If you require NSX gateway services and want to utilize all Edge resources, adjust the Azure VMware Solution NSX default Tier-1 Gateway topology by deploying multiple Tier-1 Gateways. Then, manually assign Edge resources to each Tier-1 and move the segments to the respective Tier-1 Gateways. This approach helps distribute north-south traffic across Edge VMs optimally.
96
+
97
+
* More details in the next section with an example of HCX migration use case.
98
+
99
+
>[!NOTE]
100
+
> Tier-1 topology change options work for all use case where one of the NSX Edge being over utilized.
101
+
92
102
93
-
* More details in the next section with an example of HCX migration use case.
94
103
95
104
3. Edge Scale-OUT: If you have a large number of Hosts in the SDDC and workloads, NSX Edge Scale-OUT (from two Edges to four Edges) could be an option to add additional NSX Edge data path resources.
96
105
@@ -100,7 +109,7 @@ Mitigation options:
100
109
101
110
### Default and configuration recommendations to the NSX Edge data path performance
102
111
103
-
Here are a few configuration recommendations to mitigate an NSX Edge VMs performance challenges.
112
+
Here are a few configuration recommendations to mitigate NSX Edge VMs performance challenges.
104
113
105
114
1. By default, Edge VMs are part of Azure VMware Solution management resource pool on vCenter. All appliances in the management resource pool have dedicated computing resources assigned.
106
115
@@ -112,6 +121,8 @@ Here are a few configuration recommendations to mitigate an NSX Edge VMs perform
112
121
113
122
5. Verify for HCX migration use case, that the HCX Network Extension (NE) and HCX Interconnect (IX) appliances have the CPU reserved. Reserving the CPU allows HCX to optimally process the HCX migration traffic. (By default, these appliances have no CPU reservations).
114
123
124
+
6. Ensure that Cluster-1, which hosts all VCF management appliances and HCX service mesh appliances, has optimal resources with the necessary CPU oversubscription ratio to help with overall performance.
125
+
115
126
## How to optimize Azure VMware Solution NSX Data Path Performance - HCX Use Case
116
127
117
128
One of the most frequent scenarios that may potentially reach the NSX Edges data path limit is the HCX migration and network extension use case. The reason being HCX migration and network extension creates heavy flows (single flow between Network Extenders) this will be hashed to single edge and single DPDK core within the Edge VM. This could potentially limit HCX migration and Network extension traffic up to 5 Gbps, based on the flow hashing.
@@ -153,7 +164,7 @@ Active/Standby Option:
153
164
154
165
3. Select the **Edge VM** that is not currently active as the preferred option.
155
166
156
-
4. For the **Fail Over** setting, select **Preemptive**, this ensures that traffic will always failback to the preferred Edge VM selected in Step 3.
167
+
4. For the **Fail Over** setting, select **Preemptive**, this ensures that traffic always failback to the preferred Edge VM selected in Step 3.
157
168
158
169
5. Select **All Connected Segments and Service Ports** to be advertised.
159
170
@@ -173,7 +184,7 @@ For detailed instructions on NSX Segment creation. [NSX Segment Creation](tutori
173
184
Select the newly created Tier-1 Gateway when creating your new NSX Segment.
174
185
175
186
>[!NOTE]
176
-
>When creating a new NSX Segment, customers cannot utilize the Azure VMware Solution reserved IP space.
187
+
>Customers cannot utilize the Azure VMware Solution reserved IP space, when creating a new NSX Segment.
177
188
178
189
:::image type="content" source="media/nsxt/nsx-segment-creation.png" alt-text="Diagram showing the creation of an NSX segment." border="false" lightbox="media/nsxt/nsx-segment-creation.png":::
0 commit comments