JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun ZFS Storage 7000 System Administration Guide
search filter icon
search icon

Document Information

Preface

1.  Introduction

2.  Status

3.  Configuration

4.  Services

5.  Shares

6.  Analytics

Analytics

Introduction

Concepts

Analytics

Drilldown Analysis

Statistics

Datasets

Actions

Worksheets

Statistics

Introduction

Descriptions

Analytics

Advanced Analytics

Default Statistics

Tasks

Statistics Tasks

CPU Percent utilization

CPU: Percent Utilization

Example

When to check

Breakdowns

Further Analysis

Details

Cache ARC accesses

Cache: ARC accesses

When to check

Breakdowns

Details

Metadata

Prefetch

Further Analysis

Cache L2ARC IO bytes

Cache: L2ARC I/O bytes

When to check

Breakdowns

Further Analysis

Cache L2ARC accesses

Cache: L2ARC accesses

When to check

Breakdowns

Further Analysis

Data Movement NDMP bytes transferred tofrom disk

Data Movement: NDMP bytes transferred to/from disk

When to check

Breakdowns

Further Analysis

Data Movement NDMP bytes transferred tofrom tape

Data Movement: NDMP bytes transferred to/from tape

When to check

Breakdowns

Further Analysis

Data Movement Shadow migration bytes

Data Movement: Shadow migration bytes

When to check

Breakdowns

Further Analysis

Data Movement Shadow migration ops

Data Movement: Shadow migration ops

When to check

Breakdowns

Further Analysis

Data Movement Shadow migration requests

Data Movement: Shadow migration requests

When to check

Breakdowns

Further Analysis

Disk Disks

Disk: Disks

When to check

Breakdowns

Interpretation

Further Analysis

Details

Disk IO bytes

Disk: I/O bytes

When to check

Breakdowns

Further Analysis

Disk IO operations

Disk: I/O operations

When to check

Breakdowns

Further Analysis

Network Device bytes

Network: Device bytes

When to check

Breakdowns

Further Analysis

Network Interface bytes

Network: Interface bytes

Example

When to check

Breakdowns

Further Analysis

Protocol SMB operations

Protocol: SMB operations

Example

When to check

Breakdowns

Further Analysis

Protocol Fibre Channel bytes

Protocol: Fibre Channel bytes

Example

When to check

Breakdowns

Further Analysis

Protocol Fibre Channel operations

Protocol: Fibre Channel operations

Example

When to check

Breakdowns

Further Analysis

Protocol FTP bytes

Protocol: FTP bytes

Example

When to check

Breakdowns

Further Analysis

Protocol HTTPWebDAV requests

Protocol: HTTP/WebDAV requests

When to check

Breakdowns

Further Analysis

Protocol iSCSI bytes

Protocol: iSCSI bytes

When to check

Breakdowns

Further Analysis

Protocol iSCSI operations

Protocol: iSCSI operations

When to check

Breakdowns

Further Analysis

Protocol NFSv2 operations

Protocol: NFSv2 operations

Example

When to check

Breakdowns

Further Analysis

Protocol NFSv3 operations

Protocol: NFSv3 operations

When to check

Breakdowns

Further Analysis

Protocol NFSv4 operations

Protocol: NFSv4 operations

Example

When to check

Breakdowns

Further Analysis

Protocol SFTP bytes

Protocol: SFTP bytes

Example

When to check

Breakdowns

Further Analysis

Protocol SRP bytes

Protocol: SRP bytes

Example

When to check

Breakdowns

Further Analysis

Protocol SRP operations

Protocol: SRP operations

Example

When to check

Breakdowns

Further Analysis

CPU CPUs

CPU: CPUs

When to check

Breakdowns

Details

CPU Kernel spins

CPU: Kernel spins

When to check

Breakdowns

Cache ARC adaptive parameter

Cache: ARC adaptive parameter

When to check

Breakdowns

Cache ARC evicted bytes

Cache: ARC evicted bytes

When to check

Breakdowns

Cache ARC size

Cache: ARC size

When to check

Breakdowns

Cache ARC target size

Cache: ARC target size

When to check

Breakdowns

Cache DNLC accesses

Cache: DNLC accesses

When to check

Breakdowns

Cache DNLC entries

Cache: DNLC entries

When to check

Breakdowns

Cache L2ARC errors

Cache: L2ARC errors

When to check

Breakdowns

Cache L2ARC size

Cache: L2ARC size

When to check

Breakdowns

Data Movement NDMP file system operations

Data Movement: NDMP file system operations

When to check

Breakdowns

Data Movement NDMP jobs

Data Movement: NDMP jobs

When to check

Breakdowns

Disk Percent utilization

Disk: Percent utilization

When to check

Breakdowns

Notes

Disk ZFS DMU operations

Disk: ZFS DMU operations

When to check

Breakdowns

Disk ZFS logical IO bytes

Disk: ZFS logical I/O bytes

When to check

Breakdowns

Disk ZFS logical IO operations

Disk: ZFS logical I/O operations

When to check

Breakdowns

Memory Dynamic memory usage

Memory: Dynamic memory usage

When to check

Breakdowns

Memory Kernel memory

Memory: Kernel memory

When to check

Breakdowns

Memory Kernel memory in use

Memory: Kernel memory in use

When to check

Breakdowns

Memory Kernel memory lost to fragmentation

Memory: Kernel memory lost to fragmentation

When to check

Breakdowns

Network IP bytes

Network: IP bytes

When to check

Breakdowns

Network IP packets

Network: IP packets

When to check

Breakdowns

Network TCP bytes

Network: TCP bytes

When to check

Breakdowns

Network TCP packets

Network: TCP packets

When to check

Breakdowns

System NSCD backend requests

System: NSCD backend requests

When to check

Breakdowns

System NSCD operations

System: NSCD operations

When to check

Breakdowns

Open Worksheets

Worksheets

Graph

Quantize Plot

Show Hierarchy

Common

Background Patterns

Saving a Worksheet

Toolbar Reference

CLI

Tips

Tasks

BUI

Saved Worksheets

Introduction

Properties

BUI

CLI

Datasets

Introduction

BUI

CLI

Viewing available datasets

Reading datasets

Suspending and Resuming all datasets

Discarding Data in a Dataset

7.  Integration

Glossary

Cache L2ARC accesses

Cache: L2ARC accesses

The L2ARC is the 2nd Level Adaptive Replacement Cache, and is an SSD based cache that is accessed before reading from the much slower pool disks. The L2ARC is currently intended for random read workloads. This statistic shows L2ARC accesses if L2ARC cache devices are present, allowing its usage and performance to be observed.

When to check

When investigating performance issues, to check how well the current workload is caching in the L2ARC.

Breakdowns

Breakdown
Description
hit/miss
The result of the L2ARC lookup. hit/miss states are described in the table below.
file name
The file name that was requested from the L2ARC. Using this breakdown allows hierarchy mode to be used, so that filesystem directories can be navigated.
L2ARC eligibility
This is the eligibility of L2ARC caching, as measured at the time of L2ARC access.
project
This shows the project which is accessing the L2ARC.
share
This shows the share which is accessing the L2ARC.
LUN
This shows the LUN which is accessing the L2ARC.

As described in Overhead, breakdown such as by file name would be the most expensive to leave enabled.

Further Analysis

To investigate L2ARC misses, check that the L2ARC has grown enough in size using the Advanced Analytic Cache: L2ARC size. The L2ARC typically takes hours, if not days, to warm up hundreds of Gbytes when feeding from small random reads. The rate can also be checked by examining writes from Cache: L2ARC I/O bytes. Also check the Advanced Analytic Cache: L2ARC errors to see if there are any errors preventing the L2ARC from warming up.

Cache: ARC accesses by L2ARC eligibility can also be checked to see if the data is eligible for L2ARC caching in the first place. Since the L2ARC is intended for random read workloads, it will ignore sequential or streaming read workloads, allowing them to be returned from the pool disks instead.