Solved

AIX VP-to-entitlement ratios

Posted on 2014-03-26
3
239 Views
Last Modified: 2014-12-29
at this doc..

http://www.ibmsystemsmag.com/aix/administrator/lpar/vp_entitlements/

It’s also important to look at VP-to-entitlement ratios. Ideally the ratio should be 2.5 or less. Anything above 4.0 is performance unfriendly, especially on multi-node systems (770 and above). When the VP is dispatched but its home node is busy, the system uses scheduler resource affinity domains (SRADs) at run time to determine the best core to dispatch it to. This core could be local, near or far. However, the memory might still be allocated on DIMMs attached to the home or some other core. As the LPARs get busy, this is more and more likely to happen. If memory is local, the bandwidth on the POWER7 is 68GB/s per memory controller. If it’s near, it goes to 40-50GB/s, and far memory is about 23-26GB/s.

Clearly, you take a performance hit if memory isn’t on the DIMMs attached to the home core. On a very busy system with lots of LPARs, it can lead to thrashing of the memory subsystem as well as affinity issues. This is more likely to happen with lots of VPs and low entitlement in the LPAR because the LPAR will be spread further in raw throughput mode. The lssrad command can show if this is happening. You can also run the Hardware Management Console (HMC) scanner to get information on servers and calculate the VP-to-entitlement ratios, keeping them within the values recommended by IBM’s Nigel Griffiths



after we have added cores to our prod system we started to see severe fardispatching
via

topas -M

now how can we check our system under this guidance at the document?
0
Comment
Question by:it-rex
  • 2
3 Comments
 
LVL 61

Expert Comment

by:gheist
ID: 39958216
If you dont run LPAR it is not relevant at all.
0
 
LVL 11

Author Comment

by:it-rex
ID: 39959145
!
we do have P7 lpars,that is why I am asking the Q.
0
 
LVL 61

Accepted Solution

by:
gheist earned 500 total points
ID: 39959190
Count CPUs in server and in all LPARs, then divide later with former...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

My previous tech tip, Installing the Solaris OS From the Flash Archive On a Tape (http://www.experts-exchange.com/articles/OS/Unix/Solaris/Installing-the-Solaris-OS-From-the-Flash-Archive-on-a-Tape.html), discussed installing the Solaris Operating S…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now