JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle® ZFS Storage Appliance Analytics Guide
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon

Document Information

Using This Documentation

Chapter 1 Introduction

Chapter 2 Analytics Interface

Chapter 3 Statistics and Datasets

Statistics

Introduction

Descriptions

Analytics

Advanced Analytics

Default Statistics

Tasks

Statistics Tasks

Determining the impact of a dynamic statistic

CPU Percent Utilization

CPU: Percent Utilization

Example

When to Check

Breakdowns

Further Analysis

Details

Cache ARC Accesses

Cache: ARC Accesses

When to Check

Breakdowns

Details

Metadata

Prefetch

Further Analysis

Cache L2ARC I/O Bytes

Cache: L2ARC I/O Bytes

When to Check

Breakdowns

Further Analysis

Cache L2ARC Accesses

Cache: L2ARC Accesses

When to Check

Breakdowns

Further Analysis

Capacity Bytes Used

Capacity: Capacity Bytes Used

When to Check

Breakdowns

Further Analysis

Capacity Percent Used

Capacity: Capacity Percent Used

When to Check

Breakdowns

Further Analysis

Capacity System Pool Bytes Used

Capacity: System Pool Bytes Used

When to Check

Breakdowns

Further Analysis

Capacity System Pool Percent Used

Capacity: System Pool Percent Used

When to Check

Breakdowns

Further Analysis

Data Movement NDMP Bytes Statistics

Data Movement: NDMP Bytes Statistics

When to Check

Breakdowns

Further Analysis

Data Movement NDMP Operations Statistics

Data Movement: NDMP Operations Statistics

When to Check

Breakdowns

Further Analysis

Data Movement Replication Bytes

Data Movement: Replication Bytes

When to Check

Breakdowns

Further Analysis

Data Movement Replication Operations

Data Movement: Replication Operations

When to Check

Breakdowns

Further Analysis

Data Movement Shadow Migration Bytes

Data Movement: Shadow Migration Bytes

When to Check

Breakdowns

Further Analysis

Data Movement Shadow Migration Ops

Data Movement: Shadow Migration Ops

When to Check

Breakdowns

Further Analysis

Data Movement Shadow Migration Requests

Data Movement: Shadow Migration Requests

When to Check

Breakdowns

Further Analysis

Disk Disks

Disk: Disks

When to Check

Breakdowns

Interpretation

Further Analysis

Details

Disk I/O Bytes

Disk: I/O Bytes

When to Check

Breakdowns

Further Analysis

Disk I/O Operations

Disk: I/O Operations

When to Check

Breakdowns

Further Analysis

Network Device bytes

Network: Device bytes

When to Check

Breakdowns

Further Analysis

Network Interface Bytes

Network: Interface Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol SMB Operations

Protocol: SMB Operations

Example

When to Check

Breakdowns

Further Analysis

Protocol Fibre Channel Bytes

Protocol: Fibre Channel Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol Fibre Channel Operations

Protocol: Fibre Channel Operations

Example

When to Check

Breakdowns

Further Analysis

Protocol FTP bytes

Protocol: FTP bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol HTTPWebDAV Requests

Protocol: HTTP/WebDAV Requests

When to Check

Breakdowns

Further Analysis

Protocol iSCSI Bytes

Protocol: iSCSI Bytes

When to Check

Breakdowns

Further Analysis

Protocol iSCSI Operations

Protocol: iSCSI Operations

When to Check

Breakdowns

Further Analysis

Protocol NFS Bytes

Protocol: NFSv Bytes

When to Check

Breakdowns

Further Analysis

Protocol NFS Operations

Protocol: NFSv Operations

When to Check

Breakdowns

Further Analysis

Protocol SFTP Bytes

Protocol: SFTP Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol SRP Bytes

Protocol: SRP Bytes

Example

When to Check

Breakdowns

Further Analysis

Protocol SRP Operations

Protocol: SRP Operations

Example

When to Check

Breakdowns

Further Analysis

CPU CPUs

CPU: CPUs

When to Check

Breakdowns

Details

CPU Kernel Spins

CPU: Kernel Spins

When to Check

Breakdowns

Cache ARC Adaptive Parameter

Cache: ARC Adaptive Parameter

When to Check

Breakdowns

Cache ARC Evicted Bytes

Cache: ARC Evicted Bytes

When to Check

Breakdowns

Cache ARC Size

Cache: ARC Size

When to Check

Breakdowns

Cache ARC Target Size

Cache: ARC Target Size

When to Check

Breakdowns

Cache DNLC Accesses

Cache: DNLC Accesses

When to Check

Breakdowns

Cache DNLC Entries

Cache: DNLC Entries

When to Check

Breakdowns

Cache L2ARC Errors

Cache: L2ARC Errors

When to Check

Breakdowns

Cache L2ARC Size

Cache: L2ARC Size

When to Check

Breakdowns

Data Movement NDMP Bytes Transferred to/from Disk

Data Movement: NDMP Bytes Transferred to/from Disk

When to Check

Breakdowns

Further Analysis

Data Movement NDMP Bytes Transferred to/from Tape

Data Movement: NDMP Bytes Transferred to/from Tape

When to Check

Breakdowns

Further Analysis

Data Movement NDMP File System Operations

Data Movement: NDMP File System Operations

When to Check

Breakdowns

Data Movement NDMP Jobs

Data Movement: NDMP Jobs

When to Check

Breakdowns

Data Movement Replication Latencies

Data Movement: Replication Latencies

When to Check

Breakdowns

Disk Percent Utilization

Disk: Percent Utilization

When to Check

Breakdowns

Notes

Disk ZFS DMU Operations

Disk: ZFS DMU Operations

When to Check

Breakdowns

Disk ZFS Logical I/O Bytes

Disk: ZFS Logical I/O Bytes

When to Check

Breakdowns

Disk ZFS Logical I/O Operations

Disk: ZFS Logical I/O Operations

When to Check

Breakdowns

Memory Dynamic Memory Usage

Memory: Dynamic Memory Usage

When to Check

Breakdowns

Memory Kernel Memory

Memory: Kernel Memory

When to Check

Breakdowns

Memory Kernel Memory in Use

Memory: Kernel Memory in Use

When to Check

Breakdowns

Memory Kernel Memory Lost to Fragmentation

Memory: Kernel Memory Lost to Fragmentation

When to Check

Breakdowns

Network Datalink Bytes

Network: Datalink Bytes

Example

When to Check

Breakdowns

Further Analysis

Network IP Bytes

Network: IP Bytes

When to Check

Breakdowns

Network IP Packets

Network: IP Packets

When to Check

Breakdowns

Network TCP Bytes

Network: TCP Bytes

When to Check

Breakdowns

Network TCP Packets

Network: TCP Packets

When to Check

Breakdowns

Network TCP Retransmissions

Network: TCP Retransmissions

When to Check

Breakdowns

System NSCD Backend Requests

System: NSCD Backend Requests

When to Check

Breakdowns

System NSCD Operations

System: NSCD Operations

When to Check

Breakdowns

Datasets

Introduction

BUI

CLI

Viewing Available Datasets

Reading Datasets

Suspending and Resuming All Datasets

Discarding Data in a Dataset

Chapter 4 Performance Impact

Index

CPU: Percent Utilization

This shows the average utilization of the appliance CPUs. A CPU may be a core on a socket or a hardware thread; the number and type can be seen under Analytics Interface. For example, a system may have four sockets of quad-core CPUs, meaning there are 16 CPUs available to the appliance. The utilization shown by this statistic is the average across all CPUs.

Figure 3-1  CPU Percent Utilization

image:graphic showing CPU percent utilization

The appliance CPUs can reach 100% utilization, which may or may not be a problem. For some performance tests the appliance is deliberately driven to 100% CPU utilization to measure it at peak performance.

Example

This example shows CPU: Percent utilization broken down by CPU mode, while the appliance served over 2 Gbytes/sec of cached data over NFSv3.

An average of 82% utilization suggests that there could be more headroom available, and that appliance may be able to serve more than 2 Gbytes/sec (it can). (The breakdowns only add to 81%; the extra 1% is due to rounding.)

The high level of CPU utilization does mean that overall latency of NFS operations may increase, which can be measured by Protocol NFS operations broken down by latency, as operations may be waiting for CPU resources more often.

When to Check

When searching for system bottlenecks. This may also be checked when enabling features that consume CPU, such as compression, to gauge the CPU cost of that feature.

Breakdowns

Available breakdowns of CPU Percent utilization:

Table 3-2  Breakdowns of Percent Utilization
Breakdown
Description
CPU mode
Either user or kernel. See the CPU modes table below.
CPU identifier
Numeric operating system identifier of the CPU.
application name
Name of the application which is on-CPU.
process identifier
Operating system process ID (PID).
user name
Name of the user who owns the process or thread which is consuming CPU.

The CPU modes are:

Table 3-3  CPU Modes
CPU mode
Description
user
This is a user-land process. The most common user-land process consuming CPU is akd, the appliance kit daemon, which provides administrative control of the appliance.
kernel
This is a kernel-based thread which is consuming CPU. Many of the appliance services are kernel-based, such as NFS and SMB.

Further Analysis

A problem with this CPU utilization average is that it can hide issues when a single CPU is at 100% utilization, which may happen if a single software thread is saturated with work. Use the Advanced Analytic CPUs broken down by percent utilization, which represents utilization as a heat map of CPUs, allowing a single CPU at 100% to be easily identified.

Details

CPU utilization represents the time spent processing CPU instructions in user and kernel code, that are not part of the idle thread. Instruction time includes stall cycles on the memory bus, so high utilization can be caused by the I/O movement of data.