Bug 1256949
Summary: | KSM sleep_millisecs bellow 10ms for systems above 16GB of RAM | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Virtualization Manager | Reporter: | Amador Pahim <asegundo> | |
Component: | vdsm | Assignee: | Martin Sivák <msivak> | |
Status: | CLOSED ERRATA | QA Contact: | Shira Maximov <mshira> | |
Severity: | high | Docs Contact: | ||
Priority: | high | |||
Version: | 3.5.3 | CC: | amureini, bazulay, dfediuck, gklein, istein, jentrena, lsurette, mgoldboi, msivak, pdwyer, rhodain, sauchter, s.kieske, tdosek, ycui, yeylon, ykaul | |
Target Milestone: | ovirt-3.6.1 | Keywords: | EasyFix, Patch, ZStream | |
Target Release: | 3.6.1 | |||
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: |
Previously, a Memory Overcommitment Manager (MOM) policy rule computed KSM's sleep_millisecs value using a division with the amount of host memory being part of the divider. As a result, the sleep_millisecs value dropped below 10ms on hosts with more than 16GiB of RAM. That value was invalid and too aggressive, causing a huge CPU load on the host. In this release, the sleep_millisecs value was bounded to never drop below 10ms, thus improving the CPU load on affected machines.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1261507 (view as bug list) | Environment: | ||
Last Closed: | 2016-03-09 19:44:08 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | SLA | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1261507 |
Description
Amador Pahim
2015-08-25 20:23:45 UTC
Thanks Amador. Is there a way to reload modified file /etc/vdsm/mom.d/03-ksm.policy without restarting vdsmd? Hi Julio, on 3.6 you just need to restart vdsm-mom service. There is no simple way on 3.5 unless you enabled the RPC port that is disabled by default (because it is unprotected). try to verify on: vdsm-4.17.10-5.el7ev.noarch couldn't verify because that patch is missing from that version. try to verify on: vdsm-4.17.10-5.el7ev.noarch couldn't verify because that patch is missing from that version. Martin, can you please ensure it's available for 3.6.1? Already merged to the right VDSM branch. moving back to modified because the patch didn't enter the latest version yet. details of the latest verion i tried to verify on : Red Hat Enterprise Virtualization Manager Version: 3.6.0.3-0.1.el6 vdsm-4.17.10.1-0.el7ev.noarch mom-0.5.1-1.el7ev.noarch moving back to modified because the patch didn't enter the latest version yet. details of the latest verion i tried to verify on : Red Hat Enterprise Virtualization Manager Version: 3.6.0.3-0.1.el6 vdsm-4.17.10.1-0.el7ev.noarch mom-0.5.1-1.el7ev.noarch verified on : http://bob.eng.lab.tlv.redhat.com/builds/3.6/3.6.1-2/el7/x86_64/ verifcation steps: 1. create a virtual host with (virtual) 256GB : (if you have an host with 256GB you can skip this step) have a nested environment in order to crate a VM that will be a host in your setup in the nested environment, create a new cluster policy which the memory filter is disabled (the right up corner -> configure -> cluster policy) go to clusters tab -> choose your cluster -> in the cluster policy -> choose the cluster policy that you created disable memory overcommited on the nested host add the following line in the file /etc/sysctl.conf : vm.overcommit_memory = 1 power of the vm (nested host) edit the vm ( your nested host) - > set the memory to 262144 start the vm 2. Triggered KSM 3. see that the ksmd process is not taking a high amount of CPU- run `ps -fade | grep ksmd` - and check that CPU is not unusual 4. in /var/log/vdsm/mom.log, when ksm triggered you should see that:run != 0 and the millisec always bigger than 10 log results should look like this : /var/log/vdsm/mom.log: 2015-11-05 15:46:26,923 - mom.Controllers.KSM - INFO - Updating KSM configuration: pages_to_scan:64 run:1 sleep_millisecs:10 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-0362.html |