Understanding the Effects of Hypervisor I/O Scheduling for Virtual Machine Performance Interference

Total Page:16

File Type:pdf, Size:1020Kb

Understanding the Effects of Hypervisor I/O Scheduling for Virtual Machine Performance Interference Understanding the Effects of Hypervisor I/O Scheduling for Virtual Machine Performance Interference Ziye Yang, Haifeng Fang, Yingjun Wu, Chunqi Li, Bin Zhao H. Howie Huang EMC Labs China The George Washington University fziye.yang, fang.haifeng, yingjun.wu, chunqi.li, [email protected] [email protected] Abstract public, which one is in use is unknown. To address this problem, we use a gray-box method in our framework to classify the In virtualized environments, the customers who purchase virtual machines scheduling algorithm. For a closed-source hypervisor, we use (VMs) from a third-party cloud would expect that their VMs run in an isolated manner. However, the performance of a VM can be negatively affected by a black-box analysis to obtain the scheduling properties such as co-resident VMs. In this paper, we propose vExplorer, a distributed VM I/O I/O throughput and latency. performance measurement and analysis framework, where one can use a set With the knowledge of I/O scheduling algorithm, a malicious of representative I/O operations to identify the I/O scheduling characteristics within a hypervisor, and potentially leverage this knowledge to carry out I/O user can intentionally slow down co-located (co-resident) VMs based performance attacks to slow down the execution of the target VMs. by launching various attacking workloads. The main feature of We evaluate our prototype on both Xen and VMware platforms with four such I/O performance attack is to deploy non-trivial I/O work- server benchmarks and show that vExplorer is practical and effective. We also conduct similar tests on Amazon’s EC2 platform and successfully slow down loads and manipulate the shared I/O queues to have an unfair the performance of target VMs. advantage. Note that space and time locality are the two major considerations in I/O scheduling schedulers. For example, the 1. Introduction scheduling algorithms (e.g., Deadline, and Completely Fair Queuing or CFQ) merge the I/O requests that are continuous Cloud providers employ virtualization techniques that allow in logical block address (LBA) for better space locality, while physical machines to be shared by multiple virtual machines other algorithms (e.g., Anticipatory Scheduling or AS [8] and (VMs) owned by different tenants. While resource sharing CFQ too) have a time window to anticipatorily execute the improves hardware utilization and service reliability, this may incoming I/O requests that are adjacent with previous I/O also open doors to side channel or performance interference requests in LBA. attacks by malicious tenants. For example, CPU cache based In this work, we design and develop a distributed perfor- attack has been studied in cloud environment [1, 2, 3, 4], which mance measurement and analysis framework, vExplorer, that might be mitigated to a lesser degree when each core in new allows co-resident VMs to issue a group of I/O workloads to multi-core CPUs is used exclusively by a single VM (at the cost understand I/O scheduling algorithms in a hypervisor. In partic- of reduced CPU utilization). On the other hand, I/O resources ular, two types of representative workloads are proposed in this are mostly shared in virtualized environments, and I/O based framework: the Prober workload is responsible for identifying performance attacks remains a great threat, especially for data- the I/O scheduling characteristics of a hypervisor that include intensive applications [5, 6, 7]. In this paper, we discuss the the algorithm and related properties, and the Attacker workload possibility of such attacks, and especially focus on the effects can be utilized to form I/O performance attacks, where one of disk I/O scheduling in a hypervisor for VM performance can dynamically configure the I/O workloads with the param- interference. eters (e.g., percentage of read/write operations) based on the The premise of virtual I/O based attacks is to deploy ma- extracted scheduling knowledge. To summarize, we make the licious VMs that are co-located with target VMs and aim to following contributions in this paper: slow down their performance by over-utilizing the shared I/O • We design and develop vExplorer , which can be used to resources. Previous work shows the feasibility of co-locating identify the characteristics of I/O scheduling in a hypervi- VMs on same physical machines in a public cloud [1]. In this sor. Also, the Prober workloads can be adopted as an I/O work, we will demonstrate that a well designed measurement profiling benchmark in virtualized environments. framework can help study virtual I/O scheduling, and such • We discuss the feasibility of VM based I/O performance knowledge can be potentially applied to exploit the usage of attacks through a simple mathematical model, and also the underlying I/O resources. design a set of Attacker workloads that are shown effec- Extracting the I/O scheduling knowledge in a hypervisor is tive on virtualized platforms such as Xen and VMware. challenging. Generally, hypervisors can be divided into two Furthermore, we conduct the experiments on Amazon classes, i.e., open-source hypervisor (e.g., Xen) and closed- EC2 platform [9], where several VMs are deployed on a source hypervisor (e.g., VMware ESX server). For an open- physical host and their virtual disks (local instance store) source hypervisor, while the knowledge of the I/O schedulers is are mapped into one local disk. For four benchmarks we observe significant performance reduction on target VMs. workloads are defined through a group of single I/O commands The remainder of this paper is organized as follows. Sec- (IOs), in form of <sequence id, daemon id, launch time, tion 2 presents the design and implementation of our prototype end time, file info, IO mode, IO offset, IO size> shown in system, vExplorer. Section 3 presents the profiling work of I/O Table 1. scheduling on both Xen and VMware. Section 4 demonstrates TABLE 1. IO Description VM I/O scheduling based attacks with the predefined mathe- matical model. Section 5 shows a case study of our approach Sequence id Unique id of the IO in time sequence on Amazon EC2, and Section 6 discusses related work. Finally, Daemon id The execution owner (IMD) of the IO we conclude in Section 7. Launch time The launch time of the IO, controlled by the DC End time The ending time of the IO, collected by each IMD 2. System Design and Implementation File info Target file of the IO, e.g., /dev/sda1 IO mode Operation mode: read or write, sync or non-sync IO offset The offset of the IO The challenge of exploring I/O performance attacks is to con- IO size The I/O size, e.g., 4KB, 8KB and etc. trol the access patterns of the I/O workloads in various VMs for extracting the scheduling characteristics of a hypervisor. Fig- We also define several typical workload modes that will be ure 1 shows the architecture of vExplorer system that consists used in our experiments. of distributed I/O controller (DC), I/O measurement daemon • Sequential mode. Each program sequentially reads or (IMD) and analytical module (AM). When the measurement writes a target file (i.e., a raw disk device) from the begins, the Monitor in the DC interacts with the IMDs within beginning to end. Furthermore, if each adjacent pair various VMs and directs each IMD to execute the I/O tasks of IOs (sorted by issuing time) satisfies this formula, generated by the Workload module; then the outputs produced IO (IO offset) = IO (IO offset) + IO (IO size), by each IMD are stored into the Output Container (e.g., a j i i then such workload can be categorized as seq-non-gap database); finally the DC delivers the results to the AM for mode, which is designed for verifying the scheduling knowledge extraction. This process can be repeated iteratively optimization for space locality. for training and analysis. • Burst mode. Each receiver continually runs a given set of I/O tasks in a time interval. This mode can be applied to identify the maximum I/O throughput of the hypervisor. • Random mode. Among a fixed number of I/O commands, the program randomly reads/writes a target file in a ratio (ranged from 0% to 100%), and the remaining IOs are sequential I/O commands. The usage of random mode is to measure VM I/O latency on different I/O sizes. 2.2. I/O Measurement Daemon IMD, a daemon running within a VM, is responsible for interacting with the Monitor and executes dispatched I/O com- mands. Once an IMD is adopted as a working node by the Mon- itor, it spawns several IOworkers according to the requirements Fig. 1. vExplorer System Architecture from the monitor. For executing IOs at a specified launch time, two approaches are provided: • Time synchronization. Each VM holding the IMD must 2.1. Distributed I/O Controller synchronize the time with the DC host through NTP (Net- work Time Protocol) during the working node registration. The Monitor module is in charge of communicating with • Timer event control. We choose the timer policy pro- each IMD and dispatching the workloads. At the beginning, it posed in Linux 2.6 due to its flexibility and accuracy, waits for the registry requests from each IMD. Upon receiving which will not be affected by the side effects of process a registry request, a service process is spawned for information scheduling. exchange through the network. When the number of IMDs ex- ceeds a threshold (e.g., 3), the Monitor starts to dispatch the I/O 2.3.
Recommended publications
  • SUSE BU Presentation Template 2014
    TUT7317 A Practical Deep Dive for Running High-End, Enterprise Applications on SUSE Linux Holger Zecha Senior Architect REALTECH AG [email protected] Table of Content • About REALTECH • About this session • Design principles • Different layers which need to be considered 2 Table of Content • About REALTECH • About this session • Design principles • Different layers which need to be considered 3 About REALTECH 1/2 REALTECH Software REALTECH Consulting . Business Service Management . SAP Mobile . Service Operations Management . Cloud Computing . Configuration Management and CMDB . SAP HANA . IT Infrastructure Management . SAP Solution Manager . Change Management for SAP . IT Technology . Virtualization . IT Infrastructure 4 About REALTECH 2/2 5 Our Customers Manufacturing IT services Healthcare Media Utilities Consumer Automotive Logistics products Finance Retail REALTECH Consulting GmbH 6 Table of Content • About REALTECH • About this session • Design principles • Different layers which need to be considered 7 The Inspiration for this Session • Several performance workshops at customers • Performance escalations at customer who migrated from UNIX (AIX, Solaris, HP-UX) to Linux • Presenting the experiences made at these customers in this session • Preventing the audience from performance degradation caused from: – Significant design mistakes – Wrong architecture assumptions – Having no architecture at all 8 Performance Optimization The False Estimation Upgrading server with CPUs that are 12.5% faster does not improve application
    [Show full text]
  • On the Performance Variation in Modern Storage Stacks
    On the Performance Variation in Modern Storage Stacks Zhen Cao1, Vasily Tarasov2, Hari Prasath Raman1, Dean Hildebrand2, and Erez Zadok1 1Stony Brook University and 2IBM Research—Almaden Appears in the proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST’17) Abstract tions on different machines have to compete for heavily shared resources, such as network switches [9]. Ensuring stable performance for storage stacks is im- In this paper we focus on characterizing and analyz- portant, especially with the growth in popularity of ing performance variations arising from benchmarking hosted services where customers expect QoS guaran- a typical modern storage stack that consists of a file tees. The same requirement arises from benchmarking system, a block layer, and storage hardware. Storage settings as well. One would expect that repeated, care- stacks have been proven to be a critical contributor to fully controlled experiments might yield nearly identi- performance variation [18, 33, 40]. Furthermore, among cal performance results—but we found otherwise. We all system components, the storage stack is the corner- therefore undertook a study to characterize the amount stone of data-intensive applications, which become in- of variability in benchmarking modern storage stacks. In creasingly more important in the big data era [8, 21]. this paper we report on the techniques used and the re- Although our main focus here is reporting and analyz- sults of this study. We conducted many experiments us- ing the variations in benchmarking processes, we believe ing several popular workloads, file systems, and storage that our observations pave the way for understanding sta- devices—and varied many parameters across the entire bility issues in production systems.
    [Show full text]
  • Vytvoření Softwareově Definovaného Úložiště Pro Potřeby Ukládání a Sdílení Dat V Rámci Instituce a Jeho Zálohování Do Datových Úložišť Cesnet
    Slezská univerzita v Opavě Centrum informačních technologií Vysoká škola báňská – Technická univerzita Ostrava Fakulta elektrotechniky a informatiky Technická zpráva k projektu 529R1/2014 Vytvoření softwareově definovaného úložiště pro potřeby ukládání a sdílení dat v rámci instituce a jeho zálohování do datových úložišť Cesnet Řešitel: Ing. Jiří Sléžka Spoluřešitelé: Mgr. Jan Nosek, Ing. Pavel Nevlud, Ing. Marek Dvorský, Ph.D., Ing. Jiří Vychodil, Ing. Lukáš Kapičák Leden 2016 Obsah 1 Popis projektu...................................................................................................................................1 2 Cíle projektu.....................................................................................................................................1 3 Volba HW a SW komponent.............................................................................................................1 3.1 Hardware...................................................................................................................................1 3.2 GlusterFS..................................................................................................................................2 3.2.1 Replicated GlusterFS Volume...........................................................................................2 3.2.2 Distributed GlusterFS Volume..........................................................................................3 3.2.3 Striped Glusterfs Volume..................................................................................................3
    [Show full text]
  • Buffered FUSE: Optimising the Android IO Stack for User-Level Filesystem
    Int. J. Embedded Systems, Vol. 6, Nos. 2/3, 2014 95 Buffered FUSE: optimising the Android IO stack for user-level filesystem Sooman Jeong and Youjip Won* Hanyang University, #507-2, Annex of Engineering Center, 17 Haengdang-dong, Sungdong-gu, Seoul, 133-791, South Korea E-mail: [email protected] E-mail: [email protected] *Corresponding author Abstract: In this work, we optimise the Android IO stack for user-level filesystem. Android imposes user-level filesystem over native filesystem partition to provide flexibility in managing the internal storage space and to maintain host compatibility. The overhead of user-level filesystem is prohibitively large and the native storage bandwidth is significantly under-utilised. We overhauled the FUSE layer in the Android platform and propose buffered FUSE (bFUSE) to address the overhead of user-level filesystem. The key technical ingredients of buffered FUSE are: 1) extended FUSE IO size; 2) internal user-level write buffer; 3) independent management thread which performs time-driven FUSE buffer synchronisation. With buffered FUSE, we examined the performances of five different filesystems and three disk scheduling algorithms in a combinatorial manner. With bFUSE on XFS filesystem using the deadline scheduling, we achieved the IO performance improvements of 470% and 419% in Android ICS and JB, respectively, over the existing smartphone device. Keywords: Android; storage; user-level filesystem; FUSE; write buffer; embedded systems. Reference to this paper should be made as follows: Jeong, S. and Won, Y. (2014) ‘Buffered FUSE: optimising the Android IO stack for user-level filesystem’, Int. J. Embedded Systems, Vol. 6, Nos.
    [Show full text]
  • Redhat Virtualization Tuning and Optimization Guide
    Red Hat Enterprise Linux 7 Virtualization Tuning and Optimization Guide Using KVM performance features for host systems and virtualized guests on RHEL Last Updated: 2020-09-10 Red Hat Enterprise Linux 7 Virtualization Tuning and Optimization Guide Using KVM performance features for host systems and virtualized guests on RHEL Jiri Herrmann Red Hat Customer Content Services [email protected] Yehuda Zimmerman Red Hat Customer Content Services [email protected] Dayle Parker Red Hat Customer Content Services Scott Radvan Red Hat Customer Content Services Red Hat Subject Matter Experts Legal Notice Copyright © 2019 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • Virtualization Best Practices
    SUSE Linux Enterprise Server 12 SP4 Virtualization Best Practices SUSE Linux Enterprise Server 12 SP4 Publication Date: September 24, 2021 Contents 1 Virtualization Scenarios 2 2 Before You Apply Modifications 2 3 Recommendations 3 4 VM Host Server Configuration and Resource Allocation 3 5 VM Guest Images 26 6 VM Guest Configuration 37 7 VM Guest-Specific Configurations and Settings 43 8 Hypervisors Compared to Containers 46 9 Xen: Converting a Paravirtual (PV) Guest to a Fully Virtual (FV/HVM) Guest 50 10 External References 53 1 SLES 12 SP4 1 Virtualization Scenarios Virtualization oers a lot of capabilities to your environment. It can be used in multiple scenarios. For more details refer to Book “Virtualization Guide”, Chapter 1 “Virtualization Technology”, Section 1.2 “Virtualization Capabilities” and Book “Virtualization Guide”, Chapter 1 “Virtualization Technology”, Section 1.3 “Virtualization Benefits”. This best practice guide will provide advice for making the right choice in your environment. It will recommend or discourage the usage of options depending on your workload. Fixing conguration issues and performing tuning tasks will increase the performance of VM Guest's near to bare metal. 2 Before You Apply Modifications 2.1 Back Up First Changing the conguration of the VM Guest or the VM Host Server can lead to data loss or an unstable state. It is really important that you do backups of les, data, images, etc. before making any changes. Without backups you cannot restore the original state after a data loss or a misconguration. Do not perform tests or experiments on production systems. 2.2 Test Your Workloads The eciency of a virtualization environment depends on many factors.
    [Show full text]
  • One Big PDF Volume
    Proceedings of the Linux Symposium July 14–16th, 2014 Ottawa, Ontario Canada Contents Btr-Diff: An Innovative Approach to Differentiate BtrFs Snapshots 7 N. Mandliwala, S. Pimpale, N. P. Singh, G. Phatangare Leveraging MPST in Linux with Application Guidance to Achieve Power and Performance Goals 13 M.R. Jantz, K.A. Doshi, P.A. Kulkarni, H. Yun CPU Time Jitter Based Non-Physical True Random Number Generator 23 S. Müller Policy-extendable LMK filter framework for embedded system 49 K. Baik, J. Kim, D. Kim Scalable Tools for Non-Intrusive Performance Debugging of Parallel Linux Workloads 63 R. Schöne, J. Schuchart, T. Ilsche, D. Hackenberg Veloces: An Efficient I/O Scheduler for Solid State Devices 77 V.R. Damle, A.N. Palnitkar, S.D. Rangnekar, O.D. Pawar, S.A. Pimpale, N.O. Mandliwala Dmdedup: Device Mapper Target for Data Deduplication 83 V. Tarasov, D. Jain, G. Kuenning, S. Mandal, K. Palanisami, P. Shilane, S. Trehan, E. Zadok SkyPat: C++ Performance Analysis and Testing Framework 97 P.H. Chang, K.H. Kuo, D.Y. Tsai, K. Chen, Luba W.L. Tang Computationally Efficient Multiplexing of Events on Hardware Counters 101 R.V. Lim, D. Carrillo-Cisneros, W. Alkowaileet, I.D. Scherson The maxwell(8) random number generator 111 S. Harris Popcorn: a replicated-kernel OS based on Linux 123 A. Barbalace, B. Ravindran, D. Katz Conference Organizers Andrew J. Hutton, Linux Symposium Emilie Moreau, Linux Symposium Proceedings Committee Ralph Siemsen With thanks to John W. Lockhart, Red Hat Robyn Bergeron Authors retain copyright to all submitted papers, but have granted unlimited redistribution rights to all as a condition of submission.
    [Show full text]
  • Improving Block-Level Efficiency with Scsi-Mq
    Improving Block Level Efficiency with scsi-mq Blake Caldwell NCCS/ORNL March 4th, 2015 ORNL is managed by UT-Battelle for the US Department of Energy Block Layer Problems • Global lock of request queue per block device • Cache coherency traffic – If servicing part of a request on multiple cores, the lock must be obtained on the new core and invalidated on the old core • Interrupt locality – Hardware interrupt may occur on wrong core, requiring sending soft-interrupt to proper core 2 Improving Block Level Efficiency Linux Block Layer • Designed with rotational media in mind – Time spent in the queue allows sequential request reordering – a very good thing – Completion latencies 10ms to 100ms • Single request queue – Staging area for merging, reordering, scheduling • Drivers are presented with the same interface for each block device 3 Improving Block Level Efficiency blk-mq (multi-queue) • Rewrite of the Linux block layer (since kernel 3.13) • Two levels of queues 1) Per-core submission queues 2) 1 more more hardware dispatch queues with affinity to NUMA nodes/CPU’s (device-driver specific) • IO scheduling within software queues – Inserted in FIFO order, then interleaved to hardware queues • Tags IOs that are reused for lookup on completion 4 Improving Block Level Efficiency Core 0 Core 1 Core 2 Core 3 Core 0 Core 1 Core 2 Core 3 Application Application blk-mq (Core 0, 1, 2) (Core 0, 1, 2) single queue libaio libaio ost_io ost_io Page Page Cache Cache Software Submission queues Hardware Dispatch Queues Block Device Driver Block Device Driver
    [Show full text]
  • Xen Cloud Platform Administrator's Guide Release 0.1 0.1
    Xen Cloud Platform Administrator's Guide Release 0.1 0.1 Published October 2009 1.0 Edition 1 Xen Cloud Platform Administrator's Guide Xen Cloud Platform Administrator's Guide: Release 0.1 Published October 2009 Copyright © 2008 Xen®, Xen.org®, Xen Cloud Platform™, and logos are either registered trademarks or trademarks of Xen.org Systems, Inc. in the United States and/or other countries. Other company or product names are for informational purposes only and may be trademarks of their respective owners. This product contains an embodiment of the following patent pending intellectual property of Xen.org Systems, Inc.: 1. United States Non-Provisional Utility Patent Application Serial Number 11/487,945, filed on July 17, 2006, and entitled “Using Writeable Page Tables for Memory Address Translation in a Hypervisor Environment”. 2. United States Non-Provisional Utility Patent Application Serial Number 11/879,338, filed on July 17, 2007, and entitled “Track- ing Current Time on Multiprocessor Hosts and Virtual Machines”. 2 Contents 1. Document Overview ........................................................................................... 9 How this Guide relates to other documentation .................................................. 9 2. Xen Cloud Platform hosts and resource pools ................................................ 11 Hosts and resource pools overview ................................................................. 11 Requirements for creating resource pools ........................................................ 11
    [Show full text]
  • Synergistically Coupling of Solid State Drives and Hard Disks for Qos-Aware Virtual Memory Ke Liu Wayne State University
    Wayne State University DigitalCommons@WayneState Wayne State University Theses 1-1-2013 Synergistically Coupling Of Solid State Drives And Hard Disks For Qos-Aware Virtual Memory Ke Liu Wayne State University, Follow this and additional works at: http://digitalcommons.wayne.edu/oa_theses Recommended Citation Liu, Ke, "Synergistically Coupling Of Solid State Drives And Hard Disks For Qos-Aware Virtual Memory" (2013). Wayne State University Theses. Paper 236. This Open Access Thesis is brought to you for free and open access by DigitalCommons@WayneState. It has been accepted for inclusion in Wayne State University Theses by an authorized administrator of DigitalCommons@WayneState. SYNERGISTICALLY COUPLING OF SOLID STATE DRIVES AND HARD DISKS FOR QOS-AWARE VIRTUAL MEMORY by KE LIU THESIS Submitted to the Graduate School of Wayne State University, Detroit, Michigan in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE 2013 MAJOR: COMPUTER ENGINEERING Approved by: Advisor Date ACKNOWLEDGEMENTS The two years study at Wayne State University is very interesting and full of challenges. This thesis could not be achieved without help from many people in my life. I am very grateful to my advisor, Dr. Song Jiang, for his guidance, support, encouragement all the time. His guidance and extensive knowledge help me get through all the hard times of this work. Thanks to Dr. Kei Davis, who provided me an internship and a fantastic trip at Los Alamos National Laboratory, as his insightful comments on my work help it improved a lot. I would also like to thank the rest of my thesis committee, Prof. Cheng-zhong Xu and Prof.
    [Show full text]
  • Automatic I/O Scheduler Selection Through Online Workload Analysis
    Automatic I/O scheduler selection through online workload analysis Ramon Nou1, Jacobo Giralt1, Toni Cortes1;2 Barcelona Supercomputing Center (Spain)1 - Technical University of Catalonia(UPC)2 [email protected], [email protected], [email protected] Abstract workloads. The I/O scheduler is assigned statically on a per- I/O performance is a bottleneck for many workloads. The disk basis and is normally predefined by the Linux distribution. I/O scheduler plays an important role in it. It is typically On the CPU side, the additional transistors given by the configured once by the administrator and there is no selection advance of the scale of integration are currently addressed that suits the system at every time. Every I/O scheduler has a mainly to increase the number of cores in the chip. Perfor- different behavior depending on the workload and the device. mance achieved by CPUs keeps getting higher, and so does We present a method to select automatically the most suitable the number of CPUs in a system. A similar progression can be I/O scheduler for the ongoing workload. This selection is found for disk capacity, but not for I/O performance. This per- done online, using a workload analysis method with small I/O formance gap is widening with multicores, since the available traces, finding common I/O patterns. Our dynamic mechanism storage bandwidth must be shared among several cores. The adapts automatically to one of the best schedulers, sometimes effects of this performance gap are typically reduced using achieving improvements on I/O performance for heteroge- more storage devices in parallel (like RAID systems), which neous workloads beyond those of any fixed configuration leads to an increased performance in terms of the number of (up to 5%).
    [Show full text]
  • Tuning Linux OS on IBM System P the POWER of Innovation June 2007
    Front cover Tuning Linux OS on System p The POWER of Innovation Linux kernel tuning DB2, WebSphere, and Oracle tuning SystemTap examples Stephen Hochstetler Kraml Liu Andre Metelo Prasanna S Panchamukhi John Zucker ibm.com/redbooks International Technical Support Organization Tuning Linux OS on IBM System p The POWER of Innovation June 2007 SG24-7338-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (June 2007) This edition applies to Red Hat Enterprise Linux AS 4 and SUSE Linux Enterprise Server 10. © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Become a published author . xiv Comments welcome. xv Chapter 1. Introduction to the book. 1 1.1 Operating an efficient server: four phase . 2 1.2 Performance tuning guidelines . 3 1.3 Using information from the System p Performance Lab . 3 1.4 Linux Technology Center . 5 1.5 Understanding the organization of this book . 5 Chapter 2. IBM System p hardware . 7 2.1 System p advantages . 8 2.1.1 Performance . 8 2.1.2 Scalability . 9 2.1.3 Reliability, availability, and serviceability. 11 2.1.4 Manageability . 13 2.1.5 Virtualization . 14 2.2 System p product line introduction . 15 2.2.1 POWER servers . 16 2.2.2 PowerPC servers and blades . 23 2.2.3 IntelliStation.
    [Show full text]