Free Essay

Performance-Counter-for-Sql-Server

In:

Submitted By sugeshkr
Words 1126
Pages 5
Few of my friends who wish to do a performance tuning in their servers, they asked me what are the counters that they should check that gave me an idea to prepare this document and publish across.

Disk Related Counters:
Object Name: Physical Disk
Counters:
Current Queue Length: Sustained high queue for a period of time means that the IO subsystem has a problem.

Average Queue Length: If the Average Queue Length for the disk is high more than 2. Then this indicates a potential IO subsystem problem. This would also make the disk sec/read and disk sec/write high.

Disk Sec/Read: This counter should measure not more than 15ms in normal situation. Continuous values of more than 20ms indicate that the disks have a problem.
Under these conditions, consider the following
Move the files to additional drives.
Check for proper indexing on the tables.
Check for the CPU and memory counters to find any other potential bottlenecks.

Disk Sec/Writes: This counter should measure not more than 15ms in normal situation. Continuous values of more than 20ms indicate that the disks have a problem.
Under these conditions, consider the following
Move the files to additional drives.
Check for proper indexing on the tables.
Check for the CPU and memory counters to find any other potential bottlenecks.
Placing transactional log files in separate drives to remove additional pressure on the drives

Memory/Cache:
Object Name: Memory:
Counters:
Page Faults/Sec: Page faults occur when the page that is not requested is not found in the memory. There are 2 types of page faults. Hard page faults and Soft page faults. Hard page faults require a disk access and where as Soft page faults are ones where the page is found elsewhere in the memory. High number of page faults/sec indicates that there is a problem with memory used by SQL Server. Use this counter in correlation with SQL Server:Memory Manager counters to check if there is a memory pressure.

Pages/Sec: This counter is the actual value of the Hard faults and should be used in correlation with Page Faults/Sec and SQL Server memory Manager counters to find the memory pressure.

CPU:
Object Name: Processor
Counters:
%User Time: SQL Server runs in User mode. Privilege mode is used by Operating system to access hardware and memory components. This counter should have a value more than 70%. If it has a value less than that check the %privileged time and %processor time counters to see if there is a problem with the processor.

%Privileged Time: Operating system moves thread to Privileged mode to access services. This counter should value less than 20%.

%Processor Time: This counter tells the percentage of the time that CPU is executing over a period. Ideally it should value less than 70%.

Interrupts/Sec: Interrupts/sec is the average rate, in incidents per second, at which the processor received and serviced hardware interrupts.

System:Object Name: System
Counters:
Processor Queue Length: Is the number threads that are waiting to be processed by the processor. This counter is calculated by the actual value divided by the number of processors. Ideally value should be less than 2.

SQL Server:
Object Name: Access Methods
Counters:
Forwarded Records/Sec: Number of records fetched through forwarded record pointers. Tables with NO clustered index can. If you start out with a short row, and update the row creating a wider row, the row may no longer fit on the data page. A pointer will be put in its place and the row will be forwarded to another page.
Can be avoided by:
Using default values
Using Char instead of Varchar.

Full Scans/Sec: Either table or Index in fully scanned. This could be caused because of wrong or unhelpful indexes.

Page Splits/Sec: Number of page splits occurring as the result of index pages overflowing. Normally, this is associated with leaf pages of clustered indexes and non-clustered indexes. This can be avoided by having proper fill factor.

Object Name: Memory Manager
Counters:
Memory Grants Pending: Memory is needed to process each user request. If enough memory is not available then the user request waits for memory which cause performance hitch in executing the query.
This can be avoided by the following
Adding more memory to the server
Adding memory to SQL Server
Creating proper Indexes

Object Name: Buffer Manager
Counters:

Buffer Cache Hit Ratio: Percentage of time the pages requested are already in memory. It should be ideally more than 99% and if less than 95% indicates that SQL server has no enough memory and adding more memory would be beneficial.

Checkpoints/Sec: Pages written to the disk during the Checkpoint process freeing up SQL cache. Memory pressure is indicated if this counter is more than 300 Secs.

Lazy Writes/Sec: Pages written to the disk during the LazyWriter process freeing up SQL cache. Memory pressure is indicated if this counter is more than 300 Secs.

Page Life Expectancy: This is one counter that I would love to monitor to check the memory pressure. This would give you the time in seconds the data pages reside in the SQL Server cache. If the value is low indicates the following problems.
SQL Cache is cold(Discussed in Page Faults)
Memory Problems
Missing indexes.
If Checkpoints/Sec, Lazywriter/Sec and Page life expectancy together is less than 300 seconds then it indicates the cause of memory pressure and your server needs more memory.

Object Name: Databases
Counters:
Transactions/Sec: Indicates the number of transaction that occur per second in the server.

Object Name: General StatisticsCounters:
User Connections: Number of connections made to the SLQ Server.

Object Name: Latches
Counters:
Average Latch wait Time: Latches are short term light weight synchronization object. Latches are not held for the duration of a transaction. Typical latching operations during row transfers to memory, controlling modifications to row offset table, etc.
A high value here indicates potential problems with IO subsystem or Memory.

Object Name: Locks
Counters
Average Wait Time(ms), Lock Wait time(ms) and Lock waits/Sec: All these counters are related to the locks held by the SQL Server. Transaction should be as short as possible and should hold locks only for a short time without blocking other user queries, A high value here would indicate the following.
Memory Pressure
IO Subsystem problem
Improper indexes
Improper SQL structures
Improper placement of files in the disk subsystem
Incorrect usage of SQL Isolation levels

These are the major counters that I would wish to check. Apart from this you can also check the following counters.

Object Name Counter Name
SQL Statistics Compilations/sec
SQL Statistics Recompilations/sec
SQL Statistics Batch Requests/sec
SQL Server: Buffer Manager Readahead pages/sec

Similar Documents

Premium Essay

A Comparative Investigation and Evaluation of Oracle9I and Sql Server2000 with Respect to Performance and Scalability

...A Comparative Investigation and Evaluation of Oracle9i and SQL server2000 with respect to Performance and Scalability By Phathisile Sibanda Supervisor: Mr John Ebden Computer Science Department, Rhodes University 26 September 2005 Abstract: Performance and scalability are two omnipotent factors determining database availability and reliability. This is especially true for modern computer systems due to the inclusion of the Internet in Online transaction processing (OLTP) and E-commerce applications which use databases. This evolution gave birth to an enduring need for high throughput, good response time, excellent data consistency and concurrency control. This paper evaluates SQL server 2000 and Oracle 9i with respect to performance and scalability. Initial performance tests showed that at low to medium workload both database systems behaved in a similar fashion in terms of throughput and response time. At high load however Oracle 9i emerged victorious in both cases. market and use of the Internet in databases. The first point has lead to competition between commercial and open source database vendors while the second has resulted in a need for high performance database systems. This whole controversy has in the past lead database vendors to employ numerous tricks in bid to improve the processing speed of their systems during benchmarking and thus falsely prove that their databases products are superior to other competitors. Some of their...

Words: 3061 - Pages: 13

Free Essay

Performance Tuning for Windows Server 2008

...Performance Tuning Guidelines for Windows Server 2012 April 12, 2013 Abstract This guide describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any intellectual...

Words: 50142 - Pages: 201

Free Essay

Indian Railway

...Indian Railways customer success story I n dustry • Public Sector BusI n ess Challenge • Providing a seamless and centralized process of purchasing and managing unreserved tickets syBase teCh nology • Adaptive Server® Enterprise • SQL Anywhere® • Replication Server® Key Ben efIts • Minimizes the transaction time of issuance to less than 20 seconds per ticket • Enables advance booking and cancellation of unreserved tickets from any station • Improves passenger satisfaction with 24x7 ‘Always Available’ ticketing • Minimizes possibilities of manipulations and malpractice • Enables centralized control for monitoring and auditing • Ensures accounting of the tickets sold across all railway zones • Sustains growth in passengers without any growth in staff • Simplifies changes in fare structure, destination and other database updates Indian Railways (IR), the largest rail network in Asia and the world’s second largest under one management, spanning over 6000 stations, carries 17 million passengers every day. Only a million passengers travel with reserved seat tickets, and the remaining 16 million passengers travel each day without a confirmed seat. While reserved ticketing technology is enabled, unreserved ticketing was done primitively using printed cards. Generating over 49% of its earnings, Indian Railways needed a solution to centralize the purchase and management of unreserved tickets...

Words: 1725 - Pages: 7

Premium Essay

Nt1330 Unit 3 Assignment 1 Case Study Of Configuration Auditing

...A closer look at LepideAuditor Suite Server systems are like pillars to establish the working environment in an organization. These servers should be up all times without any interruptions. If a server crashes or goes down because of an unwanted change, the users will not be able to work. Such problematic changes can be a result of IT Administrator’s trial to test a new policy in a live environment or it can be because of an unwelcome access. In case of the latter, the organization will not only lose valuable time of its professionals, but also there is a chance of an insider’s unexpected access to the million-dollar information stored on the servers. With change configuration auditing of servers in hand, an IT Administrator is supposed to save the...

Words: 900 - Pages: 4

Premium Essay

Database and Data Warehousing Design

...Running head: DATABASE AND DATA WAREHOUSING DESIGN Database and Data Warehousing Design Yolanda McCollum Dr. Constance D. Blanson CIS499: Information Systems Capstone February 11, 2014 Database and Data Warehousing Design Why does one need data warehousing? According to Total Metrics (2013): 1. The prime purpose of a Data Warehouse is to store, in one system, data and information that originates from multiple applications within, or across, organizations. The data may be stored ‘as received’ from the source application, or it may be processed upon input to validate, translate, aggregate, or derive new data/information. 2. Most of the data load functions are processed in batch. There are few on-line data maintenance functions. The on-line functions that do exist tend to update the reference files and data translation tables. 3. A database alone does not constitute a Data Warehouse system. At a minimum, a Data Warehouse system must include the database and corresponding load functions. Data reporting functions are optional. They may, or may not be an integral part of the Data Warehouse system. 4. The prime purpose of storing the data is to support the information reporting requirements of an organization i.e. multiple users and multiple applications. 5. The Data Warehouse may, or may not, provide the required reporting functions. In some cases, external applications access the Data Warehouse files to generate their own reports and queries. 6. Data Warehouse...

Words: 880 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1

...increasing its performance levels. • Fault Tolerance: The system has to be available even if one or more components fail. • Transparency: All kind of system users perceives it as a simple one rather than a set of components working on the same goal. Distributed systems definition and characteristics emerge three main elements that are shared by their users: • Resources: Resource sharing is the state that available hardware and software is accessible from system’s users. User access is controlled by suitable modules called resource managers. The scope of these modules is to efficiently assign resources to users. Resources managers use a system model to describe resources and a scheduler to control desired allocations. System model provides real time information to the allocator about the resources availability and properties. The allocator then depending on those information allocate resources to tasks in such way to keep performance on optimum levels (Raman, Livny, & Solomon, 2000). A simple example of sharable resource is a printer connected to a local area network. LAN users has the ability to use printer in order to print documents. A suitable module delegates and queues print jobs from connected users. Each user who like to print document send a request to this module (printer manager). The printer manager controls the requests arrived and fulfil them depending on the policies, protocols and algorithms that are applicate. Another example is web server and application server functionality...

Words: 3083 - Pages: 13

Premium Essay

Big Data (Mongodb, Hbase and Casandra)

...Big Data [Name of Writer] [Name of Institution] Introduction The term Big Data is gaining more followers and popularity. However, despite this trend, not all organizations are clear about how to face the challenge to store, organize, display and analyze large volumes of data. The term Big Data is gaining more followers and popularity. However, despite this trend so evident, not all organizations are clear about how to face the challenge to store, organize, display and analyze large volumes of data. There are multiple techniques in terms of huge database storing approaches that can store petabytes, exabytes and may be zetabytes data. These options are Cassendara, Mongodb and HBase. We will discuss about them one by one and in a proper research method and will compare them in order to contrast their difference and efficiency. Research Background One problem in understanding the phenomenon is that the size of these data sets the volume greatly exceeds the Data warehouse. A plane collects 10 terabytes of information from sensors every 30 minutes flight, while the Stock Exchange of New York collects structured information 1 TB per day. In the context of Big Data, volumes are reaching peta bytes, exa bytes and then soon to zeta bytes. For instance, Apple has just announced that 7 trillion send daily notifications to iOS devices. The explosion of information in social networks, blogs, and emails is characterized the presence of data key...

Words: 3463 - Pages: 14

Free Essay

Siteprotector Database Tuning Guide

...Database Tuning and Administration Guide for SP6.1 February 22, 2007 IBM Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © IBM Internet Security Systems, Inc. 1994-2006. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patent pending. Internet Security Systems, System Scanner, Wireless Scanner, SiteProtector, Proventia, Proventia Web Filter, Proventia Mail Filter, Proventia Filter Reporter ADDME, AlertCon, ActiveAlert, FireCell, FlexCheck, Secure Steps, SecurePartner, SecureU, and X-Press Update are trademarks and service marks, and the Internet Security Systems logo, X-Force, SAFEsuite, Internet Scanner, Database Scanner, Online Scanner, and RealSecure registered trademarks, of Internet Security Systems, Inc. Network ICE, the Network ICE logo, and ICEpac are trademarks, BlackICE a licensed trademark, and ICEcap a registered trademark, of Network ICE Corporation, a wholly owned subsidiary of Internet Security Systems, Inc. SilentRunner is a registered trademark of Raytheon Company. Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated. Certicom is a trademark and Security Builder is a registered trademark of Certicom...

Words: 5367 - Pages: 22

Premium Essay

Goodman

...1.) You are developing a project that contains multiple SQL Server Integration Services (SSIS) packages. The packages will be deployed to the SSIS catalog. One of the steps in each package accesses an FTP site to download sales transaction data. You create project parameters to store the username and password that are used to access the FTP site. You need to ensure that the username and password values are encrypted when they are deployed. What should you do? A. set the Sensitive property of the parameters to True. B. Set the ProtectionLevel property of the package to EncryptSensitiveWithUserKey. C. Change the parameters to package parameters. D. Change the project to the Legacy Deployment model. Answer: A 2.) You develop a SQL Server Integration Services (SSIS) package that imports SQL data into a data warehouse every night. The SQL data contains many misspellings and variations of abbreviations. To import the data, a developer used the Fuzzy Lookup transformation to choose the closest-matching string from a reference table of allowed values. The number of rows in the reference table is very large. If no acceptable match is found, the Fuzzy Lookup transformation passes a null value. The current setting for the Fuzzy Lookup similarity threshold is 0.50. Many values are incorrectly matched. You need to ensure that more accurate matches are made by the Fuzzy Lookup transformation without degrading performance. What should you do? A. Change the Exhaustive property to True...

Words: 5340 - Pages: 22

Free Essay

Hci Storyboard

...2011 Install SharePoint Server 2010 Installation and configuration for development This tutorial helps you to install SharePoint Server 2010. It shows you step-by-step how to setup requirements like Windows Server 2008 R2 including roles and features, administrative and service accounts as well as SQL Server 2008 R2. With these requirements installed you are able to deploy SharePoint Server 2010. Get more tutorials at http://sharepoint-tutorial.net/ Need a SharePoint book? http://sharepoint-book.net/ SharePoint resources http://andreasglaser.net/ Disclaimer THIS INFORMATION IS PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANY KIND. All trademarks are property of their respective owners. © Copyright 2011 Andreas Glaser Software Engineering GmbH Version: 1.1, 3/9/2011 Overview 1 Table of contents 1. Overview .............................................................................................................................. 2 1.1. 1.2. 2. 2.1. 2.2. 2.3. Hardware requirements .......................................................................................................... 3 Software requirements ........................................................................................................... 4 Installation ............................................................................................................................... 5 Updates ...............................................................................................

Words: 4069 - Pages: 17

Premium Essay

Teradata 12 Release Summary

...Adaptec, Inc. AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc. BakBone and NetVault are trademarks or registered trademarks of BakBone Software, Inc. EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation. GoldenGate is a trademark of GoldenGate Software, Inc. Hewlett-Packard and HP are registered trademarks of Hewlett-Packard Company. Intel, Pentium, and XEON are registered trademarks of Intel Corporation. IBM, CICS, RACF, Tivoli, z/OS, and z/VM are registered trademarks of International Business Machines Corporation. Linux is a registered trademark of Linus Torvalds. LSI and Engenio are registered trademarks of LSI Corporation. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are registered trademarks of Microsoft Corporation in the United States and other countries. Novell and SUSE are registered trademarks of Novell, Inc., in the United States and other countries. QLogic and SANbox trademarks or registered trademarks of QLogic Corporation. SAS and SAS/C are trademarks or registered trademarks of SAS Institute Inc. SPARC is a registered trademarks of SPARC International, Inc. Sun Microsystems, Solaris, Sun, and Sun Java are trademarks or registered trademarks of Sun Microsystems, Inc., in the...

Words: 18345 - Pages: 74

Free Essay

Sharepoint 2010 Installation and Configuration Plan

...SHAREPOINT 2010 AND FAST SEARCH SERVER 2010 INSTALLATION AND CONFIGURATION PLAN Document Control |Document Details | |Project Name |Intranet Revamp | |Document Location |IT | |Document Reference | SharePoint 2010 Installation Plan.doc | |Revision History | |Revision Description |Version |Date |Author / Editor | |Initial draft |0.1 |08/08/2010 |Chiyesu Kalaba | |Final draft |0.2 |25/08/2010 |Jacob Siwiti | 1. INTRODUCTION This document outlines the process of preparing, installation and configuration of...

Words: 7699 - Pages: 31

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Free Essay

Is3220 Paper

...Overflow • Fragmentation Attacks • Session Hijacking • Social Engineering • SQL Injection / Injection attacks • Eavesdropping • Replay Attacks There are many more attacks possible but these are the attack we focused on. With each threat, we analyzed how these attacks could be used against us and what counter measures would be used to prevent or mitigate such events from happening. DOS/DDOS Attacks- In general, Denial of Service attacks are used to flood an infrastructure with requests to the point where systems cannot keep up with the volume and crash as a result. As a business that relies on bidding and some public access, this can be troublesome as it would crash the website and stop business at critical times. In order to prevent such attacks, a NIDS or Network Intrusion Detection System can and should be implemented to “weed out” false requests from IP addresses that are flooding the system. For further protection the use of a “Honeypot” or trap for hackers can be used to direct any incoming attacks towards a lesser valuable target. Man in the Middle attacks- Man in the middle attacks are exactly what they sound like. The danger in these attacks lay with the hacker who lies between the connection of the client and server and either intercepts information between the two, or sometimes poses as the server to grab information from the client like passwords, or other critical information. To protect against these...

Words: 1272 - Pages: 6

Free Essay

Information Flow of Standard Bank Ltd.

...TERM PAPER ON Information System of Standard Bank Limited [pic] Submitted To: Dr. Md. Mosharraf Hossain Professor Department of Management University of Dhaka Submitted By: Sabbir Ahmed 3-11-21-065 Department of Management University of Dhaka Date of Submission 09.11.2014 Preface Theoretical knowledge, what we learn through our academic activities, is not sufficient to prepare ourselves for the life battle. Academic knowing is needed to be backed up by practical experience. In business studies, besides their usual theoretical course works, students are required to fulfill some practical assignments which are set by the course teachers to examine the depth of knowledge learned by the students. Most of the time, the students are required to study a practical working environment of any organization or industry to critically examine ‘what is actually going on’ in the real world.    This document is prepared as a result of an assignment set by the honorable course teacher of the course “Fundamental of MIS”. .My duty was to describe “Information System of My Organization.” and report what I found. This is how this assignment paper titled “Information System of Standard Bank Limited.” was emerged. I believe this paper is a reflection of accumulation of my effort, learning and dedication. Letter of Transmittal November 8, 2014 Dr. Mosharraf Hossain Professor MBA (Evening) Program Department...

Words: 1837 - Pages: 8