New NFS Tracing Tools and Techniques for System Analysis

Total Page:16

File Type:pdf, Size:1020Kb

New NFS Tracing Tools and Techniques for System Analysis New NFS Tracing Tools and Techniques for System Analysis The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Ellard, Daniel and Margo Seltzer. 2003. New NFS tracing tools and techniques for system analysis. Proceedings of the Seventeenth Large Installation Systems Administration Conference (LISA XVII): October 26 - 31, 2003, San Diego, California, ed. LISA, 73-85. Berkeley, California: USENIX Association. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:2798959 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA New NFS Tracing Tools and Techniques for System Analysis Daniel Ellard and Margo Seltzer – Harvard University ABSTRACT Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understanding of an NFS workload. Historically, such traces have been used primarily by file system researchers in an attempt to understand, categorize, and generalize file system workloads. However, because such traces provide a wealth of detailed information about how a specific system is actually used, they should also be of interest to system administrators. We introduce a new open-source toolkit for passively gathering and summarizing NFS traces and show how to use this toolkit to perform analyses that are difficult or impossible with existing tools. Introduction be analyzed several ways and at different time scales. It also means that there is a clear interface between these The purpose of most passive NFS tracing tools and that they can be used independently.For exam- research tools is to discover and investigate workload characteristics that can be exploited by the operating ple, we have written several other programs to analyze system. The goals of the tools and methods described the output of nfsdump and used them in our own studies in this paper are quite different – we wish to use pas- of NFS workloads and usage patterns [6, 7]. sive NFS trace analysis to help system administrators Another advantage of the separation of the gathering understand the workload on their systems, identify and analysis of traces is that the data may be anonymized latent performance issues, and diagnose specific prob- before analysis. The nfsdump toolkit includes an lems. For example, file system researchers might be anonymizing postprocessor that anonymizes the client and content to know that on a particular system most of server IP addresses, user and group ID numbers, and file the reads come from a small number of large files, but names. All of the data presented in this paper have been the administrators of that system might also want to anonymized so that they may be made public. In ordinary know the names of those files. If the system becomes use by system administrators, however, this anonymiza- swamped with requests for those files, the administra- tion step would be omitted so that specific and potentially tors might also want to identify the owner of the files useful identifying information about users, groups, client and the users responsible for the requests so that those hosts, and file names is preserved. users can be consulted. The rest of this paper is organized as follows: There already exist a number of tools that make • A discussion of related work and other tools for it possible to quantify many aspects of NFS traffic, NFS analysis and system administrators have devised ways to use • An overview of nfsdump and nfsscan these tools in order to identify and debug common • A description of the systems used in our exam- problems [17]. Unfortunately, most of these tech- ple analyses and case studies niques are limited in their ability to analyze the activi- • Basic analyses using nfsscan ties of specific clients and users. Furthermore, they are • Case studies tailored to solving specific problems and are difficult • A discussion of the limits of passive tracing and to use as a way to explore the wealth of information how to augment nfsdump/nfsscan with active that can be gleaned from NFS traces. methods In this paper, we describe nfsdump and nfsscan, • Conclusion a pair of tools that provide a framework for gathering and analyzing NFS traces in a general and extensible Related Work manner.nfsdump collects NFS traces, while nfsscan NFS1 trace analysis has a long and rich history as scans through the traces gathered by nfsdump and cre- a tool for file system research. Because of this, most of ates a set of summary tables that can be analyzed by the work in passive NFS trace analysis has focused on simple scripts or imported into a spreadsheet or other research topics such as characterizing workloads and data analysis tool for further processing. In addition to investigating the effects of client-side caching [5, 15]. nfsdump and nfsscan, we describe ns_timeagg, ns_split, and ns_quickview, three applications that 1In the context of this paper, NFS refers only to NFS ver- simplify manipulation of the tables created by nfsscan. sion 2 protocol [14] and the NFS version 3 protocol [2]. nfs- dump and nfsscan do not support version 4 of the NFS pro- The advantage of decoupling the process of gather- tocol [13, 16] or any variants of NFSv2 and NFSv3, al- ing traces from trace analysis is that the same traces can though our tools may be extended to handle these protocols. 2003 LISA XVII – October 26-31, 2003 – San Diego, CA 75 New NFS Tracing Tools and Techniques for System Analysis Ellard & Seltzer Matthew Blaze introduced several techniques for uses libpcap [10], the same packet-capture library as inferring the client workload from an NFS trace and tcpdump, and has the ability to read and write raw implemented these techniques in rpcspy and nfstrace packet files in the same format as tcpdump or any [1]. Andrew Moore gives a survey of these and other other tool that uses this format. techniques and contrasts the analysis of file system The most important functional differences between workloads via passive network monitoring and direct nfsdump and earlier tools are that nfsdump captures the kernel-level traces [12]. This work shows that passive effective UID and GID of each call, and properly NFS tracing reveals useful and accurate information decodes RPC over TCP (even with jumbo frames). about many aspects of an NFS workload. nfsscan There already exist many tools for gathering NFS traces or summary information about NFS activity. The first step of our analysis system, nfsscan, writes its data in a format designed to be easy to parse Basic tools like nfsstat(1M), iostat(1M), and nfswatch [4] provide aggregate statistics about NFS traffic. For many and interface with other tools. This is in contrast with diagnostic purposes, these statistics suffice. Specialized most other tracing tools, which often generate output in tools such as nfstrace and the NFS Logging System [18] an irregular, difficult to parse, or undocumented format focus entirely on NFS. General-purpose network proto- – for example, tcpdump 3.7.2 prints file offsets for read col monitors, such as tcpdump [11], ethereal [3], rpcspy and write operations in hexadecimal for NFSv3 requests [1], and snoop [19] can be used to analyze NFS traffic and decimal for NFSv2 requests, but does not print and other system activity.Most of these tools contain whether the request is NFSv2 or NFSv3. code to decode and print detailed information about The output of nfsscan consists of one or more NFS calls and responses, and therefore general-purpose distinct tables (depending on how nfsscan is invoked). tools like tcpdump have replaced special-purpose NFS These tables can be analyzed by simple scripts or monitors in many contexts. imported into a spreadsheet, database, or other data In terms of general capability, our system most analysis tool for further processing. These tables closely resembles nfswatch and the NFS logging/nfs- include the following information: logd system provided with Solaris. In comparison to • The total number of NFS operations and the nfswatch, nfsdump/nfsscan is more flexible because it number of times each NFS operation is called runs on more platforms and captures more information during each analysis period. The default analysis – nfsscan can gather any combination of per-user, per- period is five minutes, but a different analysis group, per-client, per-file, and per-directory informa- period may be specified on the command line. tion, while nfswatch gathers either per-user or per- • The average latency of each type of NFS operation. client information. • A map of the file system hierarchy, and infor- mation about each file accessed. In contrast to the NFS logging system and nfslogd, The file system hierarchy is inferred from the our system is completely passive, can run on a separate results of lookup, create, mkdir, rename, host instead of running on the server, and is portable remove, and link calls. Information about each across a range of platforms instead of being tied to file is gathered from the responses to getattr Solaris. A shortcoming of nfsdump/nfsscan is that it does not attempt to reconstruct an application-level trace and other calls. of the NFS activity in the same manner as nfslogd, but By default, nfsscan only records the counts for this capability could be added as a postprocess to the the NFS operations that appear most frequently in a output of nfsdump (much as nfslogd postprocesses the typical workload – read, write, lookup, getattr, access, records created by the NFS Logging System). create, and remove. Additional operations or an alter- native list of operations may be specified on the com- The Toolkit mand line.
Recommended publications
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • SUSE Linux Enterprise Server 12 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 12 SP4
    SUSE Linux Enterprise Server 12 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 12 SP4 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • Veritas™ Volume Manager Administrator's Guide: Linux
    Veritas™ Volume Manager Administrator's Guide Linux 5.1 Service Pack 1 Veritas™ Volume Manager Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 5.1 SP1 Document version: 5.1SP1.1 Legal Notice Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • IBM Certification Study Guide AIX Performance and System Tuning
    IBM Certification Study Guide AIX Performance and System Tuning Developed specifically for the purpose of preparing for AIX certification Makes an excellent companion to classroom education For experienced AIX professionals Thomas C. Cederlöf André de Klerk Thomas Herlin Tomasz Ostaszewski ibm.com/redbooks SG24-6184-00 International Technical Support Organization IBM Certification Study Guide AIX Performance and System Tuning December 2000 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix D, “Special notices” on page 265. First Edition (December 2000) This edition applies to AIX Version 4.3 (5765-C34) and subsequent releases running on an RS/6000 or pSeries server. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2000. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures....................................................ix Tables.....................................................xi Preface...................................................xiii
    [Show full text]
  • Performance Analysis
    Nov, 2014 Performance Analysis Brendan Gregg Senior Performance Architect BSD Observability • FreeBSD for content delivery – Open Connect Appliances – Approx 33% of US Internet traffic at night • AWS EC2 Linux cloud for interfaces – Tens of thousands of instances – CentOS and Ubuntu • Performance is criOcal – Customer sasfacOon: >50M subscribers – $$$ price/performance Brendan Gregg • Senior Performance Architect, NeVlix – Linux and FreeBSD performance – Performance Engineering team (@coburnw) • Recent work: – New Flame Graph types with pmcstat – DTrace tools for FreeBSD OCAs • Previous work includes: – Solaris performance, DTrace, ZFS, methodologies, visualizaons, findbill Agenda A brief discussion of 5 facets of performance analysis on FreeBSD 1. Observability Tools 2. Methodologies 3. Benchmarking 4. Tracing 5. Counters 1. Observability Tools How do you measure these? FreeBSD Observability Tools Observability Tools • Observability tools are generally safe to use – Depends on their resource overhead • The BSDs have awesome observability tools – DTrace, pmcstat, systat • Apart from uOlity, an OS compeOOve advantage – Solve more perf issues instead of wearing losses • Some examples… upme • One way to print load averages: $ uptime! • 7:07PM up 18 days, 11:07, 1 user, load averages: 0.15, 0.26, 0.25! • CPU demand: runnable + running threads – Not confusing (like Linux and nr_uninterrupOble) • ExponenOally-damped moving averages with Ome constants of 1, 5, and 15 minutes – Historic trend without the line graph • Load > # of CPUs, may mean CPU
    [Show full text]
  • Rosetta Stone for Unix
    This custom drawing feature now works in Mozilla, in Opera 7.0 or better, and in IE 5 or better for Solaris, HP-UX, or Windows. Use click, shift-click, control-click, and the "set" and "clear" buttons to select the desired subset of OSs. Then select "Draw table" to redraw the window with your custom table. Thanks to Mårten Svantesson <[email protected]> for the improved JavaScript. A Sysadmin's Unixersal Translator (ROSETTA STONE) OR What do they call that in this world? Contributions and corrections gratefully accepted. Please help us fill in the blanks. New "tasks" are welcome, too! PDF version (for best results print US legal size, landscape orientation. If your browser plug-in has trouble with the PDF, then download it and load it in stand-alone acroread). Framed version. OS versions in parentheses; e.g. 10+ means version 10 and greater; 9- means version 9 and previous. $=extra cost If not specified, commands are in one of the following directories: /usr/bin, /usr/sbin, /sbin, /bin Categories: hardware, firmware, devices disks kernel, boot, swap files, volumes networking security, backup software, patching, tracing, logging references TASK \ OS AIX Darwin DG/UX FreeBSD HP-UX IRIX Linux NCR Unix NetBSD OpenBSD Reliant SCO UnixWare Solaris SunOS 4 Tru64 Ultrix UNICOS OS / TASK Fujitsu Siemens. Based on Cray Inc., formed By IBM, with input from SCO UnixWare 7.0.1& The Open Source DC/OSX from Pyramid, from the March System V, BSD, etc. etc. Derived from SCO UnixWare 7.1.1 Solaris 2.0-2.6, 7, 8, 9 (Digital Unix, OSF/1) An early DEC Unix, foundation for Mac OS Data General was aquired Derived from 4.4BSD-Lite (rh) = Red Hat, Forked from NetBSD in SINIX Solaris 1.* 2000 merger of OS notes Runs mainly on IBM Hewlett-Packard.
    [Show full text]
  • (Prstat, Iostat, Mpstat, Vmstat) • Solaris Containers* • Dtrace
    Deploying SAS®9 on Solaris™ 10: Calling Superheroes to Fight Supervillians Maureen Chew, Sun Microsystems Abstract : Solaris 10 brings a dream team cast of superheroes that can enlighten and empower meek and mild mannered SAS users / systems administrators to fight the evil villians and archenemies which prevent successful SAS deployments. Solaris 10 Containers brings Spider-Man to the rescue in the form of extreme agility as we explore a novel approach to promotion of SAS 9 test environments to production as well as extreme 'web' security in stopping attackers cold by forming protective shields or nets. Service Management Framework(SMF), part of the Solaris 10 Predictive Self-Healing feature, brings the superhuman healing factors known to the Incredible Hulk and X-Men's Wolverine and Archangel. Discover how SMF can monitor and self-heal key services such as SAS Metadata server and OLAP server. Solaris 10 DTrace is Batman's utility belt needed by Solaris admins and users who need to be 'in the know'. Ever present,unobtrusive, DTrace has what you need, when you need it and provides the capbility to answer "What? Where? When? How? Why?" in complex, large scale, multi-user deployment environments. Last but not least, Wonder Woman's Lasso of Truth gets thrown for a bonus section on SAS 9 installation and deployment tips. The much anticipated release of Sun's Solaris 10 in February '05, represents a tremendous amount of innovation. Coupled with the Solaris open source release, there is no doubt that widespread adoption of Solaris 10 will follow. Solaris 10 is an excellent platform for deployment of SAS 9 applications.
    [Show full text]
  • Disk Utilisation by Process
    Solaris Performance Metrics – Disk Utilisation by Process 10th December 2005 Brendan Gregg [Sydney, Australia] Abstract This paper presents new metrics for monitoring disk utilisation by process for the Solaris 10™ operating environment by Sun Microsystems™. How to measure and understand disk utilisation by process is discussed, as well as the origin of the measurements. Facilities used to monitor disk utilisation include procfs, TNF tracing and DTrace. 1 1 This is one part of a series of papers I'm planning that cover performance monitoring metrics. Solaris Performance Metrics – Disk Utilisation by Process 1 Table of Contents Abstract............................................................................................................................................................... 1 1. Introduction.....................................................................................................................................................4 2. Strategies.........................................................................................................................................................5 2.1. Existing Tools....................................................................................................................................5 2.2. Additional Tools................................................................................................................................ 5 2.3. Available Strategies...........................................................................................................................5
    [Show full text]
  • Unix Users's Guide
    Unix Users’s Guide i Unix Users’s Guide September 13, 2021 Unix Users’s Guide ii Copyright © 2013 Jason W. Bacon, Lars E. Olson, SeWHiP, All Rights Reserved. Permission to use, copy, modify and distribute the Unix User’s Guide for any purpose and without fee is hereby granted in perpetuity, provided that the above copyright notice and this paragraph appear in all copies. Unix Users’s Guide iii COLLABORATORS TITLE : Unix Users’s Guide ACTION NAME DATE SIGNATURE WRITTEN BY Jason W. Bacon September 13, 2021 Unix Users’s Guide iv Contents 1 Using Unix 1 1.1 Keep It Simple, Stupid . .1 1.2 What is Unix? . .2 1.2.1 Aw, man... I Have to Learn Another System? . .2 1.2.2 Operating System or Religion? . .4 1.2.3 The Unix Standard API . .7 1.2.4 Shake Out the Bugs . .8 1.2.5 The Unix Standard UI . .9 1.2.6 Freedom of Choice . .9 1.2.7 Fast, Stable and Secure . .9 1.2.8 Sharing Resources . 10 1.3 Self-test . 10 1.4 Unix User Interfaces . 10 1.4.1 Graphical User Interfaces (GUIs) . 10 1.4.2 X11 on Mac OS X . 13 1.4.3 Command Line Interfaces (CLIs): Unix Shells . 13 1.4.4 Terminals . 15 1.4.5 Basic Shell Use . 16 1.4.6 Self-test . 17 1.5 Still Need Windows? Don’t Panic! . 18 1.5.1 Cygwin: Try This First . 18 1.5.2 Windows Subsystem for Linux: Another Compatibility Layer . 31 1.6 Logging In Remotely .
    [Show full text]
  • Oracle® Linux 8 Monitoring and Tuning the System
    Oracle® Linux 8 Monitoring and Tuning the System F24025-08 August 2021 Oracle Legal Notices Copyright © 2019, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • The USE Method Can Be Summarized in a N Tlenecks and Errors
    the method by Brendan Gregg S USEU A U TIO LIZATI The hardest part of a performance investigation can be U knowing where to start: which analysis tools to run first, which metrics to read, and how to interpret the output. R The choices on FreeBSD are numerous, with standard tools including top(1), vmstat(8), iostat(8), netstat(1), and more advanced options such as pmcstat(8) and DTrace. These A tools collectively provide hundreds of metrics, and can be customized to provide thousands more. However, most of T us aren’t full-time performance engineers and may only have the time to check familiar tools and metrics, overlooking many possible I areas of trouble. The Utilization, Saturation, and Errors (USE) method addresses this problem, and is E RRO R intended for those—especially systems administrators—who perform occasional performance analysis. It is a process for quickly checking system performance early WHAT IS IT? in an investigation, identifying common bot- The USE Method can be summarized in a N tlenecks and errors. Instead of beginning single sentence: For every resource, check with the tools and their statistics, the USE Utilization, Saturation, and Errors. Resources method begins with the questions we’d like are any hardware in the datapath, including answered. That way, we ensure that CPUs, memory, storage devices, network we don’t overlook things due interfaces, controllers, and busses. Software to a lack of familiarity with resources, such as mutex locks, thread tools or a lack of the tools pools, and resource control limits, can also themselves. ? be studied.
    [Show full text]
  • NUMA ● Huge Pages ● Manage Virtual Memory Pages ● Flushing of Dirty Pages ● Swapping Behavior Understanding NUMA (Non Uniform Memory Access)
    Tuning Red Hat Enterprise Linux for Databases Sanjay Rao Principal Performance Engineer, Red Hat June 13, 2013 Objectives of this session ● Share tuning tips ● RHEL 6 scaling ● Aspects of tuning ● Tuning parameters ● Results of the tuning ● Bare metal ● KVM Virtualization ● Tools Scalability RHEL 6 is a lot more scalable but it also offers many opportunites for tuning What To Tune ● I/O ● Memory ● CPU ● Network I/O Tuning – Hardware ● Know Your Storage ● SAS or SATA? (Performance comes at a premium) ● Fibre Channel, Ethernet or SSD? ● Bandwidth limits (I/O characteristics for desired I/O types) ● Multiple HBAs ● Device-mapper multipath ● Provides multipathing capabilities and LUN persistence ● Check for your storage vendors recommendations (upto 20% performance gains with correct settings) ● How to profile your I/O subsystem ● Low level I/O tools – dd, iozone, dt, etc. ● I/O representative of the database implementation I/O Tuning – Understanding I/O Elevators ● Deadline ● Two queues per device, one for read and one for writes ● I/Os dispatched based on time spent in queue ● Used for multi-process applications and systems running enterprise storage ● CFQ ● Per process queue ● Each process queue gets fixed time slice (based on process priority) ● Default setting - Slow storage (SATA) ● Noop ● FIFO ● Simple I/O Merging ● Lowest CPU Cost ● Low latency storage and applications (Solid State Devices) CFQ vs Deadline vsDeadline CFQ 100M 200M 300M 400M 500M 600M 100M 150M 200M 250M 300M 350M 400M 450M 50M 0M 0M 8K-SW 8K-SR 8K-RW 8K-RR 16K-SW
    [Show full text]