JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle® ZFS Storage Appliance Analytics Guide
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon

Document Information

Using This Documentation

Chapter 1 Introduction

Chapter 2 Analytics Interface

Chapter 3 Statistics and Datasets

Statistics

Introduction

Descriptions

Analytics

Advanced Analytics

Default Statistics

Tasks

Statistics Tasks

Determining the impact of a dynamic statistic

CPU Percent Utilization

CPU: Percent Utilization

Example

When to Check

Breakdowns

Further Analysis

Details

Cache ARC Accesses

Cache: ARC Accesses

When to Check

Breakdowns

Details

Metadata

Prefetch

Further Analysis

Cache L2ARC I/O Bytes

Cache: L2ARC I/O Bytes

When to Check

Breakdowns

Further Analysis

Cache L2ARC Accesses

Cache: L2ARC Accesses

When to Check

Breakdowns

Further Analysis

Capacity Bytes Used

Capacity: Capacity Bytes Used

When to Check

Breakdowns

Further Analysis

Capacity Percent Used

Capacity: Capacity Percent Used

When to Check

Breakdowns

Further Analysis

Capacity System Pool Bytes Used

Capacity: System Pool Bytes Used

When to Check

Breakdowns

Further Analysis

Capacity System Pool Percent Used

Capacity: System Pool Percent Used

When to Check

Breakdowns

Further Analysis

Data Movement NDMP Bytes Statistics

Data Movement: NDMP Bytes Statistics

When to Check

Breakdowns

Further Analysis

Data Movement NDMP Operations Statistics

Data Movement: NDMP Operations Statistics

When to Check

Breakdowns

Further Analysis

Data Movement Replication Bytes

Data Movement: Replication Bytes

When to Check

Breakdowns

Further Analysis

Data Movement Replication Operations

Data Movement: Replication Operations

When to Check

Breakdowns

Further Analysis

Data Movement Shadow Migration Bytes

Data Movement: Shadow Migration Bytes

When to Check

Breakdowns

Further Analysis

Data Movement Shadow Migration Ops

Data Movement: Shadow Migration Ops

When to Check

Breakdowns

Further Analysis

Data Movement Shadow Migration Requests

Data Movement: Shadow Migration Requests

When to Check

Breakdowns

Further Analysis

Disk Disks

Disk: Disks

When to Check

Breakdowns

Interpretation

Further Analysis

Details

Disk I/O Bytes

Disk: I/O Bytes

When to Check

Breakdowns

Further Analysis

Disk I/O Operations

Disk: I/O Operations

When to Check

Breakdowns

Further Analysis

Network Device bytes

Network: Device bytes

When to Check

Breakdowns

Further Analysis

Network Interface Bytes

Network: Interface Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol SMB Operations

Protocol: SMB Operations

Example

When to Check

Breakdowns

Further Analysis

Protocol Fibre Channel Bytes

Protocol: Fibre Channel Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol Fibre Channel Operations

Protocol: Fibre Channel Operations

Example

When to Check

Breakdowns

Further Analysis

Protocol FTP bytes

Protocol: FTP bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol HTTPWebDAV Requests

Protocol: HTTP/WebDAV Requests

When to Check

Breakdowns

Further Analysis

Protocol iSCSI Bytes

Protocol: iSCSI Bytes

When to Check

Breakdowns

Further Analysis

Protocol iSCSI Operations

Protocol: iSCSI Operations

When to Check

Breakdowns

Further Analysis

Protocol NFS Bytes

Protocol: NFSv Bytes

When to Check

Breakdowns

Further Analysis

Protocol NFS Operations

Protocol: NFSv Operations

When to Check

Breakdowns

Further Analysis

Protocol SFTP Bytes

Protocol: SFTP Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol SRP Bytes

Protocol: SRP Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol SRP Operations

Protocol: SRP Operations

Example

When to Check

Breakdowns

Further Analysis

CPU CPUs

CPU: CPUs

When to Check

Breakdowns

Details

CPU Kernel Spins

CPU: Kernel Spins

When to Check

Breakdowns

Cache ARC Adaptive Parameter

Cache: ARC Adaptive Parameter

When to Check

Breakdowns

Cache ARC Evicted Bytes

Cache: ARC Evicted Bytes

When to Check

Breakdowns

Cache ARC Size

Cache: ARC Size

When to Check

Breakdowns

Cache ARC Target Size

Cache: ARC Target Size

When to Check

Breakdowns

Cache DNLC Accesses

Cache: DNLC Accesses

When to Check

Breakdowns

Cache DNLC Entries

Cache: DNLC Entries

When to Check

Breakdowns

Cache L2ARC Errors

Cache: L2ARC Errors

When to Check

Breakdowns

Cache L2ARC Size

Cache: L2ARC Size

When to Check

Breakdowns

Data Movement NDMP Bytes Transferred to/from Disk

Data Movement: NDMP Bytes Transferred to/from Disk

When to Check

Breakdowns

Further Analysis

Data Movement NDMP Bytes Transferred to/from Tape

Data Movement: NDMP Bytes Transferred to/from Tape

When to Check

Breakdowns

Further Analysis

Data Movement NDMP File System Operations

Data Movement: NDMP File System Operations

When to Check

Breakdowns

Data Movement NDMP Jobs

Data Movement: NDMP Jobs

When to Check

Breakdowns

Data Movement Replication Latencies

Data Movement: Replication Latencies

When to Check

Breakdowns

Disk Percent Utilization

Disk: Percent Utilization

When to Check

Breakdowns

Notes

Disk ZFS DMU Operations

Disk: ZFS DMU Operations

When to Check

Breakdowns

Disk ZFS Logical I/O Bytes

Disk: ZFS Logical I/O Bytes

When to Check

Breakdowns

Disk ZFS Logical I/O Operations

Disk: ZFS Logical I/O Operations

When to Check

Breakdowns

Memory Dynamic Memory Usage

Memory: Dynamic Memory Usage

When to Check

Breakdowns

Memory Kernel Memory

Memory: Kernel Memory

When to Check

Breakdowns

Memory Kernel Memory in Use

Memory: Kernel Memory in Use

When to Check

Breakdowns

Memory Kernel Memory Lost to Fragmentation

Memory: Kernel Memory Lost to Fragmentation

When to Check

Breakdowns

Network Datalink Bytes

Network: Datalink Bytes

Example

When to Check

Breakdowns

Further Analysis

Network IP Bytes

Network: IP Bytes

When to Check

Breakdowns

Network IP Packets

Network: IP Packets

When to Check

Breakdowns

Network TCP Bytes

Network: TCP Bytes

When to Check

Breakdowns

Network TCP Packets

Network: TCP Packets

When to Check

Breakdowns

Network TCP Retransmissions

Network: TCP Retransmissions

When to Check

Breakdowns

System NSCD Backend Requests

System: NSCD Backend Requests

When to Check

Breakdowns

System NSCD Operations

System: NSCD Operations

When to Check

Breakdowns

Datasets

Introduction

BUI

CLI

Viewing Available Datasets

Reading Datasets

Suspending and Resuming All Datasets

Discarding Data in a Dataset

Chapter 4 Performance Impact

Index

Cache: L2ARC Accesses

The L2ARC is the 2nd Level Adaptive Replacement Cache, and is an SSD based cache that is accessed before reading from the much slower pool disks. The L2ARC is currently intended for random read workloads. This statistic shows L2ARC accesses if L2ARC cache devices are present, allowing its usage and performance to be observed.

When to Check

When investigating performance issues, to check how well the current workload is caching in the L2ARC.

Breakdowns

Table 3-8  Breakdowns of L2ARC Accesses
Breakdown
Description
hit/miss
The result of the L2ARC lookup. hit/miss states are described in the table below.
file name
The file name that was requested from the L2ARC. Using this breakdown allows hierarchy mode to be used, so that filesystem directories can be navigated.
L2ARC eligibility
This is the eligibility of L2ARC caching, as measured at the time of L2ARC access.
project
This shows the project which is accessing the L2ARC.
share
This shows the share which is accessing the L2ARC.
LUN
This shows the LUN which is accessing the L2ARC.

As described in Overhead, breakdown such as by file name would be the most expensive to leave enabled.

Further Analysis

To investigate L2ARC misses, check that the L2ARC has grown enough in size using the Advanced Analytic Cache L2ARC size. The L2ARC typically takes hours, if not days, to warm up hundreds of Gbytes when feeding from small random reads. The rate can also be checked by examining writes from Cache L2ARC I/O bytes. Also check the Advanced Analytic Cache L2ARC errors to see if there are any errors preventing the L2ARC from warming up.

Cache ARC accesses by L2ARC eligibility can also be checked to see if the data is eligible for L2ARC caching in the first place. Since the L2ARC is intended for random read workloads, it will ignore sequential or streaming read workloads, allowing them to be returned from the pool disks instead.