JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun ZFS Storage 7000 System Administration Guide
search filter icon
search icon

Document Information

Preface

1.  Introduction

2.  Status

3.  Configuration

4.  Services

5.  Shares

6.  Analytics

Analytics

Introduction

Concepts

Analytics

Drilldown Analysis

Statistics

Datasets

Actions

Worksheets

Statistics

Introduction

Descriptions

Analytics

Advanced Analytics

Default Statistics

Tasks

Statistics Tasks

CPU Percent utilization

CPU: Percent Utilization

Example

When to check

Breakdowns

Further Analysis

Details

Cache ARC accesses

Cache: ARC accesses

When to check

Breakdowns

Details

Metadata

Prefetch

Further Analysis

Cache L2ARC IO bytes

Cache: L2ARC I/O bytes

When to check

Breakdowns

Further Analysis

Cache L2ARC accesses

Cache: L2ARC accesses

When to check

Breakdowns

Further Analysis

Data Movement NDMP bytes transferred tofrom disk

Data Movement: NDMP bytes transferred to/from disk

When to check

Breakdowns

Further Analysis

Data Movement NDMP bytes transferred tofrom tape

Data Movement: NDMP bytes transferred to/from tape

When to check

Breakdowns

Further Analysis

Data Movement Shadow migration bytes

Data Movement: Shadow migration bytes

When to check

Breakdowns

Further Analysis

Data Movement Shadow migration ops

Data Movement: Shadow migration ops

When to check

Breakdowns

Further Analysis

Data Movement Shadow migration requests

Data Movement: Shadow migration requests

When to check

Breakdowns

Further Analysis

Disk Disks

Disk: Disks

When to check

Breakdowns

Interpretation

Further Analysis

Details

Disk IO bytes

Disk: I/O bytes

When to check

Breakdowns

Further Analysis

Disk IO operations

Disk: I/O operations

When to check

Breakdowns

Further Analysis

Network Device bytes

Network: Device bytes

When to check

Breakdowns

Further Analysis

Network Interface bytes

Network: Interface bytes

Example

When to check

Breakdowns

Further Analysis

Protocol SMB operations

Protocol: SMB operations

Example

When to check

Breakdowns

Further Analysis

Protocol Fibre Channel bytes

Protocol: Fibre Channel bytes

Example

When to check

Breakdowns

Further Analysis

Protocol Fibre Channel operations

Protocol: Fibre Channel operations

Example

When to check

Breakdowns

Further Analysis

Protocol FTP bytes

Protocol: FTP bytes

Example

When to check

Breakdowns

Further Analysis

Protocol HTTPWebDAV requests

Protocol: HTTP/WebDAV requests

When to check

Breakdowns

Further Analysis

Protocol iSCSI bytes

Protocol: iSCSI bytes

When to check

Breakdowns

Further Analysis

Protocol iSCSI operations

Protocol: iSCSI operations

When to check

Breakdowns

Further Analysis

Protocol NFSv2 operations

Protocol: NFSv2 operations

Example

When to check

Breakdowns

Further Analysis

Protocol NFSv3 operations

Protocol: NFSv3 operations

When to check

Breakdowns

Further Analysis

Protocol NFSv4 operations

Protocol: NFSv4 operations

Example

When to check

Breakdowns

Further Analysis

Protocol SFTP bytes

Protocol: SFTP bytes

Example

When to check

Breakdowns

Further Analysis

Protocol SRP bytes

Protocol: SRP bytes

Example

When to check

Breakdowns

Further Analysis

Protocol SRP operations

Protocol: SRP operations

Example

When to check

Breakdowns

Further Analysis

CPU CPUs

CPU: CPUs

When to check

Breakdowns

Details

CPU Kernel spins

CPU: Kernel spins

When to check

Breakdowns

Cache ARC adaptive parameter

Cache: ARC adaptive parameter

When to check

Breakdowns

Cache ARC evicted bytes

Cache: ARC evicted bytes

When to check

Breakdowns

Cache ARC size

Cache: ARC size

When to check

Breakdowns

Cache ARC target size

Cache: ARC target size

When to check

Breakdowns

Cache DNLC accesses

Cache: DNLC accesses

When to check

Breakdowns

Cache DNLC entries

Cache: DNLC entries

When to check

Breakdowns

Cache L2ARC errors

Cache: L2ARC errors

When to check

Breakdowns

Cache L2ARC size

Cache: L2ARC size

When to check

Breakdowns

Data Movement NDMP file system operations

Data Movement: NDMP file system operations

When to check

Breakdowns

Data Movement NDMP jobs

Data Movement: NDMP jobs

When to check

Breakdowns

Disk Percent utilization

Disk: Percent utilization

When to check

Breakdowns

Notes

Disk ZFS DMU operations

Disk: ZFS DMU operations

When to check

Breakdowns

Disk ZFS logical IO bytes

Disk: ZFS logical I/O bytes

When to check

Breakdowns

Disk ZFS logical IO operations

Disk: ZFS logical I/O operations

When to check

Breakdowns

Memory Dynamic memory usage

Memory: Dynamic memory usage

When to check

Breakdowns

Memory Kernel memory

Memory: Kernel memory

When to check

Breakdowns

Memory Kernel memory in use

Memory: Kernel memory in use

When to check

Breakdowns

Memory Kernel memory lost to fragmentation

Memory: Kernel memory lost to fragmentation

When to check

Breakdowns

Network IP bytes

Network: IP bytes

When to check

Breakdowns

Network IP packets

Network: IP packets

When to check

Breakdowns

Network TCP bytes

Network: TCP bytes

When to check

Breakdowns

Network TCP packets

Network: TCP packets

When to check

Breakdowns

System NSCD backend requests

System: NSCD backend requests

When to check

Breakdowns

System NSCD operations

System: NSCD operations

When to check

Breakdowns

Open Worksheets

Worksheets

Graph

Quantize Plot

Show Hierarchy

Common

Background Patterns

Saving a Worksheet

Toolbar Reference

CLI

Tips

Tasks

BUI

Saved Worksheets

Introduction

Properties

BUI

CLI

Datasets

Introduction

BUI

CLI

Viewing available datasets

Reading datasets

Suspending and Resuming all datasets

7.  Application Integration

Glossary

Index

Protocol iSCSI operations

Protocol: iSCSI operations

This statistic shows iSCSI operations/sec (iSCSI IOPS) requested by initiators to the appliance. Various useful breakdowns are available: to show the initiator, target, type and latency of the iSCSI I/O.

When to check

iSCSI operations/sec can be used as an indication of iSCSI load, and can also be viewed on the dashboard.

Use the latency breakdown when investigating iSCSI performance issues, especially to quantify the magnitude of the issue. This measures the I/O latency component for which the appliance is responsible for, and displays it as a heat map so that the overall latency pattern can be seen, along with outliers. If the iSCSI latency is high, drill down further on latency to identify the client initiator, the type of operation and LUN for the high latency, and, check other statistics for both CPU and Disk load to investigate why the appliance is slow to respond; if latency is low, the appliance is performing quickly, and any performance issues experienced on the client initiator are more likely to be caused by other factors in the environment: such as the network infrastructure, and CPU load on the client itself.

The best way to improve performance is to eliminate unnecessary work, which may be identified through the client initiator, lun and command breakdowns.

Breakdowns

Breakdown
Description
initiator
iSCSI client initiator
target
local SCSI target
project
the project for this iSCSI request.
lun
the LUN for this iSCSI request.
type of operation
iSCSI operation type. This shows how the SCSI command is transported by the iSCSI protocol, which can give an idea to the nature of the I/O.
command
SCSI command sent by the iSCSI protocol. This can show the real nature of the requested I/O (read/write/sync-cache/...).
latency
a heat map showing the latency of iSCSI I/O, as measured from when the iSCSI request arrived on the appliance from the network, to when the response is sent; this latency includes the time to process the iSCSI request, and to perform any disk I/O.
offset
a heat map showing the file offset of iSCSI I/O. This can be used to identify random or sequential iSCSI IOPS. Use the Disk I/O operations statistic to check whether random iSCSI IOPS maps to random Disk IOPS after the LUN and RAID configuration has been applied.
size
a heat map showing the distribution of iSCSI I/O sizes.

These breakdowns can be combined to produce powerful statistics. For example:

Further Analysis

See Protocol: iSCSI bytes for the throughput of this iSCSI I/O; also see Cache: ARC accesses broken down by hit/miss to see how well an iSCSI read workload is returning from cache, and Disk: I/O operations for the back-end disk I/O caused.