Determining the specification of the virtual machine

To determine the specification of the virtual machine:

  1. Choose one of the tables below that corresponds to your operating system and hypervisor.
  2. In the first column of the table, select the appropriate combination of protection technologies.
  3. In the row of the combination of protection technologies that you need, find the cells with the appropriate number of messages to be processed, taking into account the extra performance you want to provision as a safety factor and your chosen unit of measurement for the traffic volume, that is, the number of messages per second, per hour, or per day.

    The cells contain approximate values of the peak performance of the application.

  4. By referring to the column with the satisfactory number of processed messages, you can find out the specification of the virtual machine that you need in the table header.

    If multiple virtual machine specifications are suitable for you, we recommend choosing the configuration with the lowest number of virtual CPUs (vCPUs). It is better to have 2 virtual CPUs at 80% utilization than 8 virtual CPUs at 20% utilization.

The number of simultaneous email traffic processing threads is indicated under the virtual machine specification. When configuring the application, you must apply this setting on each node.

If you require more performance than the table suggests, please contact Kaspersky Technical Support.

We do not recommend using more virtual CPUs than you have physical cores in a single CPU installed in your virtualization server.

If the cluster is comprised of two or more nodes, we recommend putting the virtual machines on virtualization servers whose characteristics are identical.

The actual performance of the application may deviate from the figures in tables. The deviation may be caused by the peculiarities of the infrastructure and mail traffic of your organization, for example: the virtualization technology you are using, your hardware, the number and complexity of Content Filtering regular expressions, the size of individual messages being processed, and the presence of composite attachments (such as archives or office documents).

The tables below list KSMG performance figures:

Page top