Skip to content

Commit c1fed98

Browse files
authored
Merge pull request #310327 from riperez123/main
Revise NSX Performance recommendations
2 parents 8b9c94f + 8779f2a commit c1fed98

2 files changed

Lines changed: 21 additions & 10 deletions

File tree

articles/azure-vmware/azure-vmware-solution-nsx-scale-and-performance-recommendations-for-vmware-hcx.md

Lines changed: 20 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: NSX Scale and Performance Recommendations for VMware HCX
2+
title: NSX Scale and Performance Recommendations
33
description: Learn about the default NSX Topology in Azure VMware Solution and recommended practices to mitigate performance issues around HCX migration use cases.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 12/19/2024
6+
ms.date: 1/9/2026
77
ms.custom: engagement-fy25
88
# Customer intent: As an IT administrator managing HCX migrations on Azure VMware Solution, I want to optimize NSX Edge performance and mitigate bottlenecks, so that I can ensure efficient data transfer and reliable application performance during migration tasks.
99
---
@@ -62,7 +62,7 @@ Using the built-in NSX alarm framework is recommended to monitor and identify ke
6262

6363
### How to Monitor and Identify NSX Edge Data Path Resource Constraints
6464

65-
NSX Edge performance can be monitored and identified by using the built-in NSX alarm framework. The following critical NSX Edge alarms identify the NSX Edge data path resource constraints:
65+
NSX Edge performance can be monitored and identified by using the built-in NSX alarm framework. Customer can use the NSX UI or API to monitor alarms, or utilize Azure VMware Solution Resource Health notifications to alert customers when Edge resource constraint alarms are triggered. More information on the resource health feature is documented [here](resource-health-for-azure-vmware-solution-overview.md). The following critical NSX Edge alarms identify the NSX Edge data path resource constraints.
6666

6767
1. Edge NIC Out of Transmit/Receive buffer.
6868

@@ -74,7 +74,7 @@ NSX Edge performance can be monitored and identified by using the built-in NSX a
7474

7575
## How to fix the NSX Edge resource constraints
7676

77-
To validate the issue, check Historic/Realtime traffic throughput at the alarm time for the correlation.
77+
To validate the issue, check Historic/Real time traffic throughput at the alarm time for the correlation.
7878

7979
:::image type="content" source="media/nsxt/nsx-edge-performance-charts.png" alt-text="Diagram showing NSX Edge VM performance charts." border="false" lightbox="media/nsxt/nsx-edge-performance-charts.png":::
8080

@@ -88,9 +88,18 @@ Mitigation options:
8888

8989
* Edge Scale up may not help if you have one or more heavy flows, for example, HCX Network Extension (NE) to Network Extension (NE) traffic, as this traffic could potentially pin to one of the DPDK CPU cores.
9090

91-
2. Tier-1 Gateway Topology Change: Change the Azure VMware Solution NSX default Tier-1 Gateway topology with multiple Tier-1 Gateways to split the traffic across multiple Edge VMs
91+
2. NSX Tier-1 Gateway Topology Change:
92+
93+
* Set up a new Tier-1 gateway in "Distributed-only" mode and migrate all segments to it to optimize usage of all available Edges through distributed flow based hashing for all north-south traffic. Note that the NSX distributed Tier-1 gateway does not support gateway services such as Gateway Firewall, VPN, DNS, or DHCP
94+
95+
* If you require NSX gateway services and want to utilize all Edge resources, adjust the Azure VMware Solution NSX default Tier-1 Gateway topology by deploying multiple Tier-1 Gateways. Then, manually assign Edge resources to each Tier-1 and move the segments to the respective Tier-1 Gateways. This approach helps distribute north-south traffic across Edge VMs optimally.
96+
97+
* More details in the next section with an example of HCX migration use case.
98+
99+
>[!NOTE]
100+
> Tier-1 topology change options work for all use case where one of the NSX Edge being over utilized.
101+
92102

93-
* More details in the next section with an example of HCX migration use case.
94103

95104
3. Edge Scale-OUT: If you have a large number of Hosts in the SDDC and workloads, NSX Edge Scale-OUT (from two Edges to four Edges) could be an option to add additional NSX Edge data path resources.
96105

@@ -100,7 +109,7 @@ Mitigation options:
100109

101110
### Default and configuration recommendations to the NSX Edge data path performance
102111

103-
Here are a few configuration recommendations to mitigate an NSX Edge VMs performance challenges.
112+
Here are a few configuration recommendations to mitigate NSX Edge VMs performance challenges.
104113

105114
1. By default, Edge VMs are part of Azure VMware Solution management resource pool on vCenter. All appliances in the management resource pool have dedicated computing resources assigned.
106115

@@ -112,6 +121,8 @@ Here are a few configuration recommendations to mitigate an NSX Edge VMs perform
112121

113122
5. Verify for HCX migration use case, that the HCX Network Extension (NE) and HCX Interconnect (IX) appliances have the CPU reserved. Reserving the CPU allows HCX to optimally process the HCX migration traffic. (By default, these appliances have no CPU reservations).
114123

124+
6. Ensure that Cluster-1, which hosts all VCF management appliances and HCX service mesh appliances, has optimal resources with the necessary CPU oversubscription ratio to help with overall performance.
125+
115126
## How to optimize Azure VMware Solution NSX Data Path Performance - HCX Use Case
116127

117128
One of the most frequent scenarios that may potentially reach the NSX Edges data path limit is the HCX migration and network extension use case. The reason being HCX migration and network extension creates heavy flows (single flow between Network Extenders) this will be hashed to single edge and single DPDK core within the Edge VM. This could potentially limit HCX migration and Network extension traffic up to 5 Gbps, based on the flow hashing.
@@ -153,7 +164,7 @@ Active/Standby Option:
153164

154165
3. Select the **Edge VM** that is not currently active as the preferred option.
155166

156-
4. For the **Fail Over** setting, select **Preemptive**, this ensures that traffic will always failback to the preferred Edge VM selected in Step 3.
167+
4. For the **Fail Over** setting, select **Preemptive**, this ensures that traffic always failback to the preferred Edge VM selected in Step 3.
157168

158169
5. Select **All Connected Segments and Service Ports** to be advertised.
159170

@@ -173,7 +184,7 @@ For detailed instructions on NSX Segment creation. [NSX Segment Creation](tutori
173184
Select the newly created Tier-1 Gateway when creating your new NSX Segment.
174185

175186
>[!NOTE]
176-
>When creating a new NSX Segment, customers cannot utilize the Azure VMware Solution reserved IP space.
187+
>Customers cannot utilize the Azure VMware Solution reserved IP space, when creating a new NSX Segment.
177188
178189
:::image type="content" source="media/nsxt/nsx-segment-creation.png" alt-text="Diagram showing the creation of an NSX segment." border="false" lightbox="media/nsxt/nsx-segment-creation.png":::
179190

articles/azure-vmware/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ items:
222222
href: vmware-hcx-mon-guidance.md
223223
- name: Configure VMware HCX network extension high availability
224224
href: configure-hcx-network-extension-high-availability.md
225-
- name: NSX Scale and Performance Recommendations for VMware HCX
225+
- name: NSX Scale and Performance Recommendations
226226
href: azure-vmware-solution-nsx-scale-and-performance-recommendations-for-vmware-hcx.md
227227
- name: Enable VMware HCX access over the internet
228228
href: enable-hcx-access-over-internet.md

0 commit comments

Comments
 (0)