UCP收集所有Managed Instance的数据的机制,是通过启用各个Managed Instances上的Collection Set:Utility information(位于Management->Data Collection->System Data collection Sets),Utility Information 是On Demand 模式。UCP每15分钟调用Utility information一次,Utility information 收集所在Instance 对CPU 和Storage 资源的使用数据,发送到UCP。这样UCP就能获各个Managed Instances的资源利用数据,并存储在sysutility_udw 数据库中,通过dashboard report 显示一个consolidated view给DBA,便于DBA监控多个managed instances的资源利用率。

1,Utility information

2,UCP收集数据的频率

collection Set Upload Frequency :Every 15 minutes,Frequency Value不可更改。

3,Evaluation Policy

Evaluation Policy 有三部分组成:Time Window,Fault Tolerance 和 Collection Frequency.

Collection Requency 是 Every 15 minutes,不可更改。

Time Window 和 Fault Tolerance 显示Volatile Resource Policy Evaluation Tab中,可以配置,默认的设置如图

默认设置:time window 是 1hour,  Fault tolerance 是20%,Upload Frequency 是15Minutes。

意思是,在1hour内,UCP会收集4次数据,如果有1次数据超出Overutilized threshold,那么 percent in violation 就是1/4=25%,由于 25%>20%,因此,UCP 评估的结果是Overutilized。默认的设置是不允许任何一次数据超出Overutilized threshold,而不被评估为Overutilized,意思是只要有一次Overutilized,那么就会被mark 为 Overutilized。

如果对资源的Overutilized不是很 sensitive,允许1hour内出现1次Overutilized,如果其他3次没有Overutilized,那么USP就不会Mark为Overutilized。实现这个scenario,可以设置较大的Fault tolerance,也可以设置较大的Overutilized threshold。

Example1,设置 Fault tolerance 是30%

time window 是 1hour, Fault tolerance 是30%,Upload Frequency 是15Minutes。

意思是,在1hour内,UCP会收集到4次数据,如果有1次数据超出Overutilized threshold,那么percent in violation 就是1/4=25%,由于 25%<30%,因此,UCP 评估的结果是没有Overutilized。如果25% 大于Underutilized 的 Fault tolerance,那么UCP会标记Instance处于Well Utilized状态。

Example2,设置更大的Overutilized threshold

思路是使资源利用达不到Overutilized threshold,默认的Overutilized threshold 设置是70%。

如果一个小时内,资源的utility 是 75%,60%,65%,40%,有1次的utility超出70%,那么Instance就被标记为Overutilized;

如果将Overutilized threshold 设置是80%,那么,资源的utility都不会超过80%,那么Instance就不会被标记为Overutilized。

可以通过配置Global Policy 或 Individual Policy来 设置Overutilized threshold 的值。

A: 配置Global Policy

B:配置Individual Policy

Appenix: 引用MSDN:《Reduce Noise in CPU Utilization Policies (SQL Server Utility)

How frequently should processor utilization be in violation before it is reported as overutilized?

The evaluation time period and tolerance for percent violations are both configurable using the Policy tab settings in the Utility Administration node of Utility Explorer. To change policies, use the slider controls to the right of policy descriptions, then click Apply. You can also restore default values or discard changes using buttons at the bottom of the display.
  • The data collection interval is 15 minutes. This value is not configurable.

  • The default upper threshold processor utilization policy is 70%. Options range from 0% to 100%.

  • The default evaluation period for processor overutilization is 1 hour. Options range from 1 hour to 1 week.

  • The default percentage of data points in violation before CPU is reported as overutilized is 20%. Options range from 0% to 100%.

For example, based on default values, 4 data points will be collected every hour, and the policy threshold is 20%. So by default, any violation in a 1-hour collection period will be 25% of 4 data points. The default values report any violation of the CPU overutilization policy threshold.

To reduce noise generated by a single violation, consider the following options:

  • Increase the evaluation period by 1 increment to 6 hours. A single violation in 6 hours would be 1 data point in a sample size of 24. In this case, the policy would tolerate 4 violations of the policy threshold (16.7% of data points) in 6 hours, but would report overutilization for 5 or more violations (>20% of data points) in a 6-hour collection period.

  • Increase the tolerance for percentage of violations by 1 increment to 30%. A single violation in 1 hour would be 1 data point in a sample size of 4. In this case, the policy would tolerate 1 violation per hour, but would report overutilization for 2 or more violations (>30% of data points) in a 1-hour collection period.

  • Increase policy thresholds for SQL Server managed instance and data-tier application processor utilization. For more information about how to change the global CPU utilization policies for managed instances of SQL Server or data-tier applications, see Utility Administration (SQL Server Utility). For more information about how to change CPU utilization policies for individual instances of SQL Server, see Managed Instance Details (SQL Server Utility). For more information about how to change CPU utilization policies for individual data-tier applications, see Deployed Data-tier Application Details (SQL Server Utility).

How frequently should processor utilization be in violation before it is reported as underutilized?

The evaluation time period and tolerance for percent violations are both configurable using the Policy tab settings in the Utility Administration node of Utility Explorer. To change policies, use the slider controls to the right of policy descriptions, then click Apply. You can also restore default values or discard changes using buttons at the bottom of the display.
  • The data collection interval is 15 minutes. This value is not configurable.

  • The default lower threshold for processor utilization policy is 0%. Options range from 0% to 100%.

  • The default evaluation period for processor underutilization is 1 week. Options range from 1 day to 1 month.

  • The default percentage of data points in violation before CPU is reported as underutilized is 90%. Options range from 0% to 100%.

Based on default values, 672 data points are collected every week, but the policy threshold is 0%. So by default, this policy does not generate processor underutilization violations. For more information about how to change the global CPU utilization policies for managed instances of SQL Server or data-tier applications, see Utility Administration (SQL Server Utility). For more information about how to change CPU utilization policies for individual instances of SQL Server, see Managed Instance Details (SQL Server Utility). For more information about how to change CPU utilization policies for individual data-tier applications, see Deployed Data-tier Application Details (SQL Server Utility).

参考文档:

Reduce Noise in CPU Utilization Policies (SQL Server Utility)

Utility2:Appropriate Evaluation Policy的更多相关文章

  1. SLC-Microsoft:Microsoft Lifecycle Policy

    ylbtech-SLC-Microsoft:Microsoft Lifecycle Policy Microsoft Lifecycle Policy The Microsoft Lifecycle ...

  2. PLT:说说Evaluation strategy

    Brief 在学习方法/函数时,我们总会接触到 按值传值 和 引用传值 两个概念.像C#是按值传值,但参数列表添加了ref/out后则是引用传值,但奇怪的事出现了 namespace Foo{ cla ...

  3. Signal Processing and Pattern Recognition in Vision_15_RANSAC:Performance Evaluation of RANSAC Family——2009

    此部分是 计算机视觉中的信号处理与模式识别 与其说是讲述,不如说是一些经典文章的罗列以及自己的简单点评.与前一个版本不同的是,这次把所有的文章按类别归了类,并且增加了很多文献.分类的时候并没有按照传统 ...

  4. 转载:android audio policy

    Audio policy basic:https://www.cnblogs.com/CoderTian/p/5705742.html Set volume flow:https://blog.csd ...

  5. 基音检测算法的性能:Performance Evaluation of Pitch Detection Algorithms

    http://access.feld.cvut.cz/view.php?cisloclanku=2009060001 Vydáno dne 02. 06. 2009 (15123 přečtení) ...

  6. 【Deep Learning Nanodegree Foundation笔记】第 9 课:Model Evaluation and Validation

    In this lesson, you'll learn some of the basics of training models. You'll learn the power of testin ...

  7. Security Policy:行级安全(Row-Level Security)

    行级安全RLS(Row-Level Security)是在数据行级别上控制用户的访问,控制用户只能访问数据库表的特定数据行.断言是逻辑表达式,在SQL Server 2016中,RLS是基于安全断言( ...

  8. Homomorphic Evaluation of the AES Circuit:解读

    之前看过一次,根本看不懂,现在隔这么久,再次阅读,希望有所收获! 论文版本:Homomorphic Evaluation of the AES Circuit(Updated Implementati ...

  9. Policy Management

    策略管理用于管理数据库实例.数据库以及数据库对象的各种属性,Policy Management 位于Management Catalog下, 一,Basic concepts 引用园子里深蓝的博客&l ...

随机推荐

  1. mac 关于使用protobuf出现ld: symbol(s) not found for architecture x86_64的问题

    主要是编译时没有添加protobuf库文件 g++  -o Writer.o  lm.helloworld.pb.cc Writer.cpp -L/usr/local/lib -lprotobuf

  2. 德国W家HIPP 奶粉有货播报:2014.7.8 HIPP 奶粉 1+ 4盒装有货啦!

    德国W家HIPP 奶粉有货播报:2014.7.8 HIPP 奶粉 1+ 4盒装有货啦!

  3. Xpath基础语法学习

    背景: 之所以学习Xpath,是因为在学习selenium定位页面元素,总是定位不到元素.为了更好的开展自动化测试,先学习下Xpath. 一:Xpath是什么. 1:Xpath是一门在XML文档中查找 ...

  4. libCURL开源库在VS2010环境下编译安装,配置详解

    libCURL开源库在VS2010环境下编译安装,配置详解 转自:http://my.oschina.net/u/1420791/blog/198247 http://blog.csdn.net/su ...

  5. 微信公众平台API接口

    简介 微信公众平台消息接口为开发者提供了一种新的消息处理方式.微信公众平台消息接口为开发者提供与用户进行消息交互的能力.对于成功接入消息接口的微信公众账号,当用户发消息给公众号,微信公众平台服务器会使 ...

  6. java分享第十四天(TestNG Assert详解)

     TestNG Assert 详解org.testng.Assert 用来校验接口测试的结果,那么它提供哪些方法呢? 中心为Assert测试类,一级节点为方法例如assertEquals,二级结点为参 ...

  7. iOS tableview自定义cell上添加按钮实现删除功能

    在删除的时候,先删除数据源,再删除cell 但是,会发现一直崩: numberOfRowsInSection 解决方案:

  8. 正则表达式preg_replace中危险的/e修饰符带来的安全漏洞问题

    mixed preg_replace ( mixed pattern, mixed replacement, mixed subject [, int limit]) /e 修饰符使 preg_rep ...

  9. *HDU3398 数学

    String Time Limit: 4000/2000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others)Total Subm ...

  10. cocos2d-x:Particle System(粒子系统)

    一.粒子系统简介: 粒子系统最早出现在80年代,主要用于解决由大量按一定规则运动(变化)的微小物质在计算机上的生成和显示问题.Particle System的应用非常广泛,大的可以模拟原子弹爆炸,星云 ...