?
Solved

Datastore Contention

Posted on 2014-10-15
3
Medium Priority
?
385 Views
Last Modified: 2014-10-20
Hi Experts,

Hoping you can clear something up for me. What is the easiest way to distinguish between poor disk performance of a disk array, and data contention produced by too many VM's per host per datastore

Would i be right in saying a comparision between datastore latency and the latency of the vms on that datastore would shed such light? Ie if the datastore latency is low by the vm latency is high it would indicate a point of contention?

Kind Regards
0
Comment
Question by:FSIFM
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 122

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 40381756
Yes, that's the correct approach, check the latency of the VM on the datastore, using esxtop and if greater than 10ms, that VM is having issues with the datastore.

Then change RAID type, (RAID 6 to RAID10) disk type (SATA to SAS, or SAS to SSD)

let me know if you need help with esxtop.
0
 
LVL 4

Author Comment

by:FSIFM
ID: 40381766
Fantastic :)

We have tools to monitor vm latency and the datastore latency already, but my main problem was isolating what was contention and what was the disk array not providing enough performance for the requirement.

If i can just look at the datastore, see it is sitting below 10ms but the vm is 20+ then that points me in the right direction of too many vms on that datastore creating a choke point as aposed to fearing the arrays don't have enough iops to keep up with demand
0
 
LVL 122
ID: 40381787
Yes, 20ms is higher than the recommended 10ms for a VM.

Baseline the VMs, if it is always this high, if so, you have options above, and moving VM to faster datastore, or change datastore.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your phone running out of space to hold pictures?  This article will show you quick tips on how to solve this problem.
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
Teach the user how to configure vSphere Replication and how to protect and recover VMs Open vSphere Web Client: Verify vsphere Replication is enabled: Enable vSphere Replication for a virtual machine: Verify replicated VM is created: Recover replica…
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question