Performance Monitor Objects

Total Page:16

File Type:pdf, Size:1020Kb

Performance Monitor Objects 4620-1 appA.f.qc 10/28/99 12:34 PM Page 751 Appendix A Performance Monitor Objects s discussed in Chapter 18, this appendix provides you with selected A Performance Monitor object:counter definitions. I’ve only provided the core object:counters here, in the interest of time and space, but also according to their importance. To be honest, most of the object:counters I have omitted are not used by Windows 2000 Server administrators and engineers. What I’ve attempted to do is only list the definitions and explanations for the object:counters you are likely to use in the management of your Windows 2000 Server network. However, exceptions and additions exist. The objects for which counters are defined in this appendix include the following: I Cache I Logical Disk I Memory I Network Interface I Network Segment I Objects I Physical Disk I Process I Processor I Redirector I Server Work Queues I System I Thread Third-party ISVs have long taken advantage of Performance Monitor in several ways. First, during the software application development cycle, ISVs use Performance Monitor to monitor the health and performance of the Windows 2000 Server machine and network. This not only enables them to see that their development environment is either running optimally or similar to that of their customers, but it also enables them to see how their software applications are impacting the system. Second, the ISVs typically write object:counters that are unique to their software application, which they run as part of Performance Monitor. Here again, this enables them to monitor and 4620-1 appA.f.qc 10/28/99 12:34 PM Page 752 752 Appendixes I I optimize their software application during the development cycle. But perhaps most important, by creating application-specific object:counters, ISVs expose a wealth of monitoring and optimization possibilities for you, the customer. For example, when you purchase and install Microsoft SQL Server, several object:counters specific to this application are added to Performance Monitor. When using and developing with SQL Server, you benefit greatly from these SQL Server-specific object:counters in the management of your database applications and your network. For descriptions of object:counters not listed here, simply click the explain button for the object:counter of your choice in the Add Counters dialog box. Table A-1 Performance Monitor Object Types Object Object Counter Description Cache Async Copy Reads/sec Measures the frequency of reads from cache pages involving a memory copy of the data from the cache to the application’s buffer. Application regains control immediately even if the disk must be accessed to retrieve the page. Cache Async Data Maps/sec Measures the frequency at which an application, using a file system such as NTFS to map a page of a file into the cache, reads the page and does not wait for the cache to retrieve the page if not found in main memory. Cache Async Fast Reads/sec Measures the frequency of reads from cache pages that bypass the installed file system and retrieve the data directly from the cache. Typically, the file I/O requests invoke the appropriate file system to retrieve data from a file, but this path permits direct retrieval of cache data without file system involvement if the data is in the cache. Even if the data is not in the cache, one invocation of the file system is avoided. If the data is not in the cache, the request (application program call) does not wait until the data is retrieved from disk, but gets control immediately. 4620-1 appA.f.qc 10/28/99 12:34 PM Page 753 Appendix A: Performance Monitor Objects 753 I I Object Object Counter Description Cache Async MDL Reads/sec Measures the frequency of reads from cache pages using a Memory Descriptor List (MDL) to access the pages. Note that the MDL contains the physical address of each page in the transfer, thus permitting direct memory access (DMA) of the pages. If the accessed page(s) are not found in main memory, the calling application program does not wait for the pages to fault in from disk. Cache Async Pin Reads/sec This measures the frequency of reading data into the cache preparatory to writing the data back to disk. Pages read in this fashion are pinned in memory at the completion of the read. File system regains control immediately even if the disk must be accessed to retrieve the page. A page’s physical address is not altered while pinned. Cache Copy Read Hits % Displays the percentage of cache Copy Read requests that hit the cache. Stated another way, does not require a disk read in order to provide access to the page in the cache. Copy Read is a file read operation that is satisfied by a memory copy from a cache page to the application’s buffer. The LAN redirector and disk file systems use this method for retrieving cache information, as does the LAN server for small transfers. Cache Copy Reads/sec Measures the frequency of reads from cache pages that involve a memory copy of the data from the cache to the application’s buffer. The LAN redirector uses this method for retrieving cache information, as does the LAN server for small transfers. Cache Data Flush Pages/sec Measures the frequency of the number of pages that the cache flushes to disk as a result of a request to flush or to satisfy a write-through file write request. More than one page can be transferred on each flush operation. Continued 4620-1 appA.f.qc 10/28/99 12:34 PM Page 754 754 Appendixes I I Table A-1 (continued) Object Object Counter Description Cache Data Flushes/sec This is the frequency that the cache flushes its contents to disk as the result of a request to flush or to satisfy a write-through file write request. One page or more can be transferred on each flush operation. Cache Data Map Hits % This is the percentage of data maps in the cache that can be resolved without having to retrieve a page from the disk — in other words, the page is already in physical memory. Cache Data Map Pins/sec This is the frequency of data maps in the cache that results in pinning a page in main memory, an action usually preparatory to writing to the file on disk. A page’s physical address in main memory and virtual address in the cache are not altered while pinned. Cache Data Maps/sec This is the frequency at which a file system such as NTFS maps a file page into the cache to read the page. Cache Fast Read Not This is the frequency of attempts by an Possible/sec Application Program Interface (API) function call to bypass the file system to get at cache data that cannot be honored without invoking the file system. Cache Fast Read Resource This is the frequency of cache misses Misses/sec necessitated by the lack of available resources to satisfy the request. Cache Fast Reads/sec This is the frequency of reads from cache pages that bypass the installed file system and retrieve the data directly from the cache. Typically, file I/O requests invoke the appropriate file system to retrieve data from a file, but this path permits direct retrieval of cache data without file system involvement if the data is in the cache. 4620-1 appA.f.qc 10/28/99 12:34 PM Page 755 Appendix A: Performance Monitor Objects 755 I I Object Object Counter Description Cache Lazy Write Flushes/sec Lazy writing is the process of updating the disk after the page is changed in memory, so that the application making the change to the file does not have to wait for the disk write to complete before proceeding. It is possible for more than one page to be transferred on each write operation. Cache Lazy Write Pages/sec This is the frequency with which the cache’s lazy write thread is written to disk. Lazy writing is the process of updating the disk after the page is changed in memory, so that the application making the change to the file does not have to wait for the disk write to complete before proceeding. It is possible for more than one page to be transferred on a single disk write operation. Cache MDL Read Hits % This is the percentage of cache memory descriptor list (MDL) read requests that have hit the cache — that is, that do not require disk accesses in order to provide memory access to the page(s) in the cache. Cache MDL Reads/sec This is the frequency of reads from cache pages that use a memory descriptor list (MDL) to access the data. The MDL contains the physical address of each page involved in the transfer and thus can employ a hardware direct memory access (DMA) device to effect the copy. Note that a LAN server uses this method for large transfers out of the server. Cache Pin Read Hits % This is the percentage of cache Pin Read requests that have hit the cache, that is, that do not require a disk read in order to provide access to the page in the cache. A page’s physical address in the cache is not altered while pinned. Note that a LAN redirector uses this method for retrieving cache information, as does the LAN server for small transfers and disk file systems. Continued 4620-1 appA.f.qc 10/28/99 12:34 PM Page 756 756 Appendixes I I Table A-1 (continued) Object Object Counter Description Cache Pin Reads/sec This is the frequency of reading data into the cache preparatory to writing the data back to disk.
Recommended publications
  • Comparing Systems Using Sample Data
    Operating System and Process Monitoring Tools Arik Brooks, [email protected] Abstract: Monitoring the performance of operating systems and processes is essential to debug processes and systems, effectively manage system resources, making system decisions, and evaluating and examining systems. These tools are primarily divided into two main categories: real time and log-based. Real time monitoring tools are concerned with measuring the current system state and provide up to date information about the system performance. Log-based monitoring tools record system performance information for post-processing and analysis and to find trends in the system performance. This paper presents a survey of the most commonly used tools for monitoring operating system and process performance in Windows- and Unix-based systems and describes the unique challenges of real time and log-based performance monitoring. See Also: Table of Contents: 1. Introduction 2. Real Time Performance Monitoring Tools 2.1 Windows-Based Tools 2.1.1 Task Manager (taskmgr) 2.1.2 Performance Monitor (perfmon) 2.1.3 Process Monitor (pmon) 2.1.4 Process Explode (pview) 2.1.5 Process Viewer (pviewer) 2.2 Unix-Based Tools 2.2.1 Process Status (ps) 2.2.2 Top 2.2.3 Xosview 2.2.4 Treeps 2.3 Summary of Real Time Monitoring Tools 3. Log-Based Performance Monitoring Tools 3.1 Windows-Based Tools 3.1.1 Event Log Service and Event Viewer 3.1.2 Performance Logs and Alerts 3.1.3 Performance Data Log Service 3.2 Unix-Based Tools 3.2.1 System Activity Reporter (sar) 3.2.2 Cpustat 3.3 Summary of Log-Based Monitoring Tools 4.
    [Show full text]
  • Solarwinds Web Performance Monitor Administrator Guide
    ADMINISTRATOR GUIDE Web Performance Monitor Version 2.2.2 Last Updated: Monday, June 11, 2018 ADMINISTRATOR GUIDE: WEB PERFORMANCE MONITOR © 2018 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes
    [Show full text]
  • Performance Monitor
    PeopleTools 8.57: Performance Monitor March 2020 PeopleTools 8.57: Performance Monitor Copyright © 1988, 2020, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring
    Windows NT ...: Reducing Total Cost of Ownership - Chapter 9 - Performance Monitorin Page 1 of 13 [Figures are not included in this sample chapter] Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring AN OLD ADAGE SAYS, "IF YOU can’t measure it, you can’t manage it." Even if you can measure something, how can you tell if your changes are making a difference if you don’t have baseline information? It’s important to monitor a server’s or work- station’s performance to maximize your investment in these tools. If a user complains that her computer is too slow, you often need more information to fix the problem. For example, if the problem is loading Web pages on a computer using an analog modem, the modem is probably limiting the system’s performance. However, if the computer is an older model, certain operations may wait for the CPU to finish processing. In this case, a complete system upgrade may be the best solution. The usefulness of performance monitoring goes far beyond handling user expectations. A network and systems administrator can use information obtained by analyzing the operations of existing hardware, software, and networking devices to predict the timing of upgrades, justify the cost of replacing and upgrading devices, and assist in troubleshooting. Performance monitoring ultimately reduces TCO and is a vital part of managing any IT environment. Performance monitoring helps answer important questions about your current environment. For example, you may want to know which activity specifically uses the most resources in your environment. If you determine that it is loading Web pages, then upgrading the RAM or the CPU speed of client machines may not help much.
    [Show full text]
  • Computer Training Options Click Here
    Your Total Training Resource Microsoft® Windows 10® Learn how to perform management, wide varieties of operations, run myriads of built-in programs and maintenance tools of Windows 10. Perform managerial and maintenance commands and features. Learn about Windows essentials, tips and tricks, Managing files and folders on local, network and cloud storage areas like OneDrive. Learn how to customize the Windows environment to personalize the system to work best for you. Work with Cortana to control your computer with voice commands. The modules for Windows 10 are as follows: Module 1 – Learn All the Essential Features of Windows 10 To Schedule / Need Additional Information To schedule sessions, receive more information or for questions/clarifications contact us at: Email: Ken Keller at [email protected] or Dean Carroll at [email protected] or Phone: (630) 495-0505 or (800) 869-7497. To see a complete list of our current computer training options click here. 101 W. 22nd Street, Suite 100 630-495-0505 Lombard, IL 60148 630-495-1321 Fax www.c-kg.com Your Total Training Resource Module 1 – Learn All the Essential Features of Windows 10 • This comprehensive course covers everything you Edge browser, and work with Mail, Calendars, and need to know to install Windows, customize it to People (aka contacts). your liking, and start working with files and • Plus, learn about sharing via a home network, applications. multiuser configurations, security and privacy, and • See how to manage folders, use Cortana to search troubleshooting Windows. and navigate, browse the web with the new Microsoft Management and Maintenance: • Learn how to configure updates, monitor events and • Reviewing event logs.
    [Show full text]
  • Performance Tuning Guidelines for Windows Server 2012 R2
    Performance Tuning Guidelines for Windows Server 2012 R2 Copyright information This document is provided "as-is". Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. This document is confidential and proprietary to Microsoft. It is disclosed and can be used only pursuant to a nondisclosure agreement. © 2012 Microsoft. All rights reserved. Internet Explorer, Microsoft, TechNet, Windows, and Excel are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners. Contents Performance Tuning Guidelines for Windows Server 2012 R2 ...................................................8 Performance Tuning for Server Hardware ................................................................................9 See Also .............................................................................................................................9 Server Hardware Performance Considerations .........................................................................9 See Also ........................................................................................................................... 14
    [Show full text]
  • Monitor and Maintain a Multi-User Networked Operating System 114053
    Monitor and maintain a multi-user networked operating system 114053 PURPOSE OF THE UNIT STANDARD This unit standard is intended To provide proficient knowledge of the areas covered For those working in, or entering the workplace in the area of Data Communications & Networking People credited with this unit standard are able to: Monitor the performance of a multi-user networked operating system Resolve problems with a multi-user networked operating system Maintain a multi-user networked operating system. The performance of all elements is to a standard that allows for further learning in this area. LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING The credit value of this unit is based on a person having prior knowledge and skills to: Install and configure a multi-user networked operating system. Module 4 – Operating system support skills Author: LEARNER MANUAL Rel Date: 27/01/2018 Rev Date: 01/06/2023 Doc Ref: 48573 LM Mod 4 v-1 PAGE 55 INDEX Competence Requirements Page Unit Standard 114053 alignment index Here you will find the different outcomes explained which you need to be 57 proved competent in, in order to complete the Unit Standard 114053. Unit Standard 114053 59 Monitor the performance of a multi-user networked operating system 62 Resolve problems with a multi-user networked operating system 68 Maintain a multi-user networked operating system 84 Self-assessment Once you have completed all the questions after being facilitated, you need to check the progress you have made. If you feel that you are competent in the areas mentioned, you may tick the blocks, if however you feel that you 94 require additional knowledge, you need to indicate so in the block below.
    [Show full text]
  • This Application Note Explains How to Set up Your Windows Performance Monitor to Log System Information in the Event of a Crash Or Memory Leak
    GENESIS32 – Setting Up the Windows Performance Monitor October 2013 Description: This Application Note explains how to set up your Windows Performance Monitor to log system information in the event of a crash or memory leak. OS Requirement: Win 2000, XP Pro, Server 2003, Vista, Server 2008, Windows 7 General Requirement: Administrative access to the computer Why Use the Performance Monitor? The performance monitor that comes with Windows can be useful in debugging application crashes and detecting memory leaks. You can set the performance monitor to log information about the health of your computer, and this information can help determine what is causing a crash or memory leak. Setting up a Performance Log for Windows 2000, XP Pro, and Server 2003 1. Go to Start Settings Control Panel Administrative Tools Performance. Performance Logs and Alerts 2. Expand , right-click Counter Logs, and choose New Log Settings. Figure 2 - Add Counters Dialog 6. Click Add (nothing will visibly happen), and then Close. 7. Set the Interval and Units appropriately. The shorter the interval the more data you will collect, but the larger hit you will take to your system’s overall performance. Select a long interval if you do not know when the problem will occur or you know it will not occur for a while. Select a shorter interval if the problem is frequent or will happen soon. If you are unsure, a good default setting is every 1 minute. Figure 1 - New Log Settings 3. Enter a name for your log into the dialog box and click OK. 4. Click Add Counters.
    [Show full text]
  • SQL Server Monitor
    NNeettwwoorrkk MMoonniittoorr User Guide Version R93 English December 1, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya’s “Click-Accept” EULATOS as updated from time to time by Kaseya at http://www.kaseya.com/legal.aspx. If Customer does not agree with the Agreement, please do not install, use or purchase any Software and Services from Kaseya as continued use of the Software or Services indicates Customer’s acceptance of the Agreement.” ©2016 Kaseya. All rights reserved. | www.kaseya.com Contents Network Monitor Overview 1 Installation 3 Pre-Installation Checklist .......................................................................................................................... 4 Network Monitor Module Minimum Requirements ..................................................................................... 4 Server Sizing ........................................................................................................................................... 5 Installing a New Instance of Network Monitor R93 .................................................................................... 5 Migration of KNM standalone to KNM integrated ...................................................................................... 6 Configuration Summary ........................................................................................................................... 7 Management Interface 9 Getting Started......................................................................................................................................
    [Show full text]
  • Computer Performance
    Computer Performance macOS macOS is Apple’s operating system for all Mac devices. For more information about macOS visit the macOS Apple Page. About This Mac This dialog shows you basic information about the manufacture date and hardware of your Mac. Click the Apple icon at the top left of the screen on the menu bar. Click About This Mac. The dialog window with basic system information will pop up. Click the System Report button for more detailed information for the advanced user. Activity Monitor Similar to Task Manager for PC, Activity Monitor displays every program running on your Mac. You can manage these running programs and identify how they are affecting your Mac’s performance. For more information visit Activity Monitor Support. Uninstall Unnecessary Applications One simple way to clear disk space and keep your computer running smoothly is to uninstall applications you don’t need or aren’t using. NOTE: Make sure you know what the application function is before you delete it, some applications are key to keeping your computer functioning properly. Find the list of applications: Open Finder → Applications (left side panel) How to Uninstall Applications on Mac Windows Windows is Microsoft’s operating system for PCs. For more information about Windows visit the Microsoft Windows Page. System Information Windows also has a basic system information dialog, similar to About This Mac (OS Version, Processor, Memory, 32/64bit info) Right click the This PC Icon on your Desktop and Click Properties. If it isn't there, search "This PC" in the Search Box on your Taskbar.
    [Show full text]
  • Intel® Cache Acceleration Software for Windows* Quick Start Guide
    Intel® Cache Acceleration Software (Intel® CAS) for Windows* Quick Start Guide June 2015 Revision 001 Order Number: 332550-001US Intel® Cache Acceleration Software Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, firmware and/or software optimized to use the technologies. Consult your system manufacturer and/or software vendor for more information. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. Check with your system manufacturer or retailer or learn more at intel.com. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
    [Show full text]
  • ICONICS – Setting up Windows Performance Monitor July 2012
    ICONICS – Setting up Windows Performance Monitor July 2012 Description: Guide to setting up performance monitoring in the event of an application crash or memory leak OS Requirement: Windows 2000/ XP Pro/ Server 2003/ Windows Vista x64/ Server 2008 x64/ Windows 7. General Requirement: understanding of Windows Operating Systems and tools Why Use the Performance Monitor The performance monitor that comes with Windows can be useful in debugging application crashes and detecting memory leaks. You can set the performance monitor to log information about the health of your computer programs to determine what is causing a crash or memory leak. This application note intends to walk you through the steps necessary to create a performance log on any of the operating systems mentioned above. Setting up a Performance Log for Windows 2000, XP Pro, and Server 2003 Figure 2 - Add Counters Dialog 1. Go to Start Settings Control Panel Administrative Tools Performance. 6. Click Add (nothing will visibly happen), and then Close. 2. Expand Performance Logs and Alerts, right-click 7. Set the Interval and Units appropriately. The shorter the Counter Logs, and choose New Log Settings. interval the more data you will collect, but the larger hit you will take to your system’s overall performance. Select a long interval if you do not know when the problem will occur or you know it will not occur for a while. Select a shorter interval if the problem is frequent or will happen soon. If you are unsure, a good default setting is every 1 minute. Figure 3 - Collect Data Sample Interval Figure 1 - New Log Settings 8.
    [Show full text]