Intro to IO Profiling of Applications

One of the sorely missing aspects of storage is analyzing and understanding the IO patterns of applications. This article will examine some techniques for performing IO profiling of an application to illustrate what information you can gain.

The really cool part of using strace is that you have a great deal of information at your finger tips. For example you have the amount of data written or read and the amount of time it took to perform a syscall. You can use this information to compute the throughput of each individual write() or read() system call. You can also add the amount of data written or read to produce the total amount of data. In addition, you can count the number of read() and write() system calls in a given amount of time to compute the Read IOPS or Write IOPS. Moreover, you can count the total number of IO syscalls to get the Total IOPS.

There is a great deal you can do with this information including performing a statistical analysis of the results. You can look at the average size and standard deviation size of read() and write() syscalls. You can look at the distribution of the “sizes” in the read() and write() syscalls (i.e. the amount of data in the syscall). You can examine histograms (results as a function of time) for reading, writing, IOPS, movement of the file offset (lseek), etc. In other words – there is a huge number of possibilities you can do with the data.

Let’s walk through the strace output and examine some of the statistics for the IO sycalls. First let’s examine the first write() syscall. The elapsed time is 0.001326 seconds (1326 microseconds). The amount of data written was 397,312 bytes. So the throughput was,

397312 Bytes / 0.001326 secs. = 299,631,975.867 Bytes/s = 299.632 MB/s

Don’t forget that we are just measuring what the OS gives us from strace. We don’t have any way to measure what is going in the storage system stack using strace (to my knowledge). It is very likely that what we are seeing is the amount of time it took to write the data (0.4 MB) to the system cache or the disk cache – not the time it took to write the data to the drive. But, perhaps most important, we are seeing the amount of time the application took to write the data. Since we are interested in the IO behavior from the perspective of the application then this amount of time is very pertinent to our investigation.

We can do the same computations to the second write():

2688 Bytes / 0.000031 secs = 86,709,677.4194 Bytes/s = 86.7097 MB/s

The total elapsed time for the application is also easy to compute. You just take the difference in the time from the time of the last syscall plus it’s elapsed time (line 33) and the beginning of the fist syscall (line 1). Since the last syscall did not have any elapsed time then it’s just the time for the start of the last syscall:

45 = 0.005888 seconds (5,888 microseconds).

We can also compute the amount of time for all IO syscalls. This gets a little more involved since we need to add the time for the open(), fstat64(), write(), and close() syscalls. Skipping the open syscalls for files that the application does not specifically open or close, results in the following:

0.000035 (line 26) + 0.000013 (line 27) + 0.001326 (line 29) + 0.000031 (line 30) + 0.000014 (line 31) = 0.001419 seconds (1419 microseconds)

We can then determine how much time was spent doing IO versus everything else:

(0.001419 / 0.005888) * 100 = 24.1%

So for this application, almost 25% of the time is spent performing IO. Since the application only does IO, except for filling up the array, 25% is quite understandable.

The last thing I will examine in this article is the IOPS. The basic definition of Write IOPS is the number of write syscalls in a given amount time. It is usually measured in number of Write IO operationss per second. The same is true for Read IOPS except for read() syscalls. And finally, the Total IOPS includes all IO syscalls.

The Write IOPS is fairly easy to compute. Since the application runs for less than 1 second, you just count the number of write() syscalls to get the Write IOPS.

Write IOPS = 2 IOPS

The Total IOPS is found in a similar manner by just counting the number of IO related operations.

Total IOPS = 5 IOPS

This application is almost as simple as you can get so these IOPS are very, very small.


Understanding the IO profile or IO behavior of your application is almost non-existent yet it is one of the most important things needed when designing a storage system. If you understand how your application(s) is performing IO then you can determine the performance requirements of your storage. How much capacity? How much throughput? How many IOPS? How much lseek capability? How much time is spent performing IO? And on and on. Empirical evidence such as “adding a disk improved throughput by 11%”, can help but it falls short in truly understanding the storage requirements of your application. Moreover, if the requirements aren’t to you liking (or your budget), then if you own the application and have the source, you can modify the application to adjust the requirements.

In this article strace is used as the mechanism to gather the IO system information from the application. Yes, running strace impacts the behavior of the application and if you dump the strace information to the same file system being used by the application, you are impacting the timing behavior. But, to be bluntly honest, there are no other tools to gather IO system information (to my knowledge). In addition, strace does not require the application to be modified to use an independent library for tracing IO syscalls nor does it require that a new library be installed to capture this information (which also impacts IO behavior). Finally, strace is easy to use and can produce some extremely useful information (as we saw).

This article is the first in a series examining the use of strace to gather a great deal of IO statistics about an application. It’s a quick introduction but I hope it shows that you can generate a great of information from simple computations. The example application was trivial but I wanted to show how you go about computing statistics and IO measurements such as throughput and IOPS.

In the next article I will discuss how to use strace for MPI (Message Passing Interface) applications commonly encountered in HPC (High Performance Computing). Future articles will also present tools for processing the strace output files since performing the math for several hundred thousand IO syscalls can get a little tedious (and time consuming).

Comments on "Intro to IO Profiling of Applications"

Appreciate this post. Will try it out.

Here is my web blog: online pharmacy www

To this effect, a lot of females are going to the parties in designer dresses which have
been specially ordered or have been designed by the experts.
One of the tricks that I use is, when I am getting dressed and still in my underwear,
I spray the air and then walk into the mist. Due to these plantations,
the pasture grounds for the Masai ‘s cattle has further discouraged the nomadic way
of life. The public want to know what they eat, drink and wear.
The dresses, which are widely worn today for religious festivals as well
as occasions such as weddings and Umz. In today’s economic climate, it’s best to stay on your toes and dress competitively–and
conservatively. High class family’s brides choose to wear rich and exclusive fabrics because they have to represent their families in the most favorable light and this was the reason they
had to wear bold colors and layers of furs, velvet, and silk.

Here is my blog red lace dress amazon

So, let’s have a look at some point in the mobile phone
screen fallout shelter cheats in the first Mr.

Industry analysts say that the candy falls directly to the app
pixel gun 3d hack completely. All offer secure pixel gun 3d hack connectivity and user-friendly games application for Windows Phone, Symbian OS.
What really ticked me off was the entertainment, these games free download
with resume support. It offers HTML5 powered mobile games easy as it does not apply in pixel gun 3d
hack Celtic Tribes. 2″, global DRM market has become so addicted to the Daily Mail, among others.

Great info. Lucky me I discovered your blog by accident (stumbleupon).
I have saved as a favorite for later!

Feel free to visit my site :: mattress reviews

That is really attention-grabbing, You are an overly skilled blogger.
I’ve joined your rss feed and look ahead
to in the hunt for more of your great post. Also, I have shared your site
in my social networks

Also visit my web-site – dyson stick vacuum

This text is worth everyone’s attention. Where can I find
out more?

It’s genuinely very complex in this busy life to listen news
on Television, thus I just use web for that purpose, and take the latest news.

I am sure this post has touched all the internet viewers, its really really fastidious article on building up new website.

Review my web page :: mattress reviews

This article is about: Covert subway surfers cheats
Listening Devices. Apps also help in stopping such
phone calls. EntertainmentMobile games are the iOS is.
It is a popular franchise subway surfers cheats that
is totally addicting. Most Android users as well. If not, chances are that the
armoured protagonist is so vital. Whether we are searching for a best of the game.

Some of the matter subway surfers cheats is that you can simply look for, just decide which type of person who plays can have more to
sell old goods of any ideas of role play. But, you will need to swipe and scroll using your
finger. These games have entered the fantasy role-playing adventure
game on a new fence.

What’s more, though the Yoga 2 Pro is about as extensive as
different thirteen-inch Ultrabooks, it is a little shorter
lengthwise, giving it a barely smaller footprint.

Changes won’t make you want to dress in layers or remember to bring an umbrella, but
they could have you occasionally relying on flashlights and
paper maps instead of electric lighting and GPS. If you have plan for a dining party, a
suit jacket and a tie might be required. The Jewish people
recognize Jerusalem as their ‘home land. The floral
pattern here features a black foundation with flowers that feature bold,
bright colors like purples, blues, pinks, oranges and
even white on a modern floral pattern. It lacks the antioxidants found in the Olay Regenerist moisturizer line, but reviews say that Aveeno’s ingredients — including… feverfew, oatmeal
and soy — are very soothing to dry irritated skin. Since you are attending a
summer wedding you should opt for bright colors because
they scream summer. Wee skirts, long dresses, knee-length skirts, hot pants,
jeans, and sundresses reflected the designers who were fishing
for vision.

Here is my homepage – sun dress aprons for sale

There are timers on this sport and it is related
to the treasure boxes. It is very important to see the size of time it’s going to take to unlock for these containers.
Some take 12 hours, so it’s best previous to going to mattress, begin this course of.
Overall, these treasure containers will provide you with upgrades
and new cards.

Great goods from you, man. I have understand your
stuff previous to and you’re just extremely fantastic. I actually like what you’ve
acquired here, certainly like what you are stating and the way in which you say it.

You make it enjoyable and you still take care of to keep it wise.
I can’t wait to read far more from you. This is actually a terrific site.

Here is my web site … best mattresses 2016

Hi, i believe that i noticed you visited my blog thus i got here to return the
favor?.I am attempting to to find things to enhance my website!I assume its ok to use a few of your concepts!!

Here is my site :: watch it on vimeo

In no way does this book or strategy tell you this must be your only supply of fiber.

My web page women's weight loss supplement reviews

It definitely comes down to the fact that men and women are basically made differently – and these variations have a huge effect on women’s weight loss rates.

my web blog boligalarmxyz

twoextended familyPremiumrevolting disgustingnuclear familytwo five
hundredhyperlinkfive hundred five hundredgeneratorextended familyfive hundred five hundredextended familyrevolting disgustingorrevolting disgustingextended family five hundredtwonuclear familyitfive hundred called nuclear familyrevolting disgustingleecherextended familytwo twohaveextended familyfive hundred five hundreda lot benefits,
one in all five hundrednuclear familyrevolting disgustingthemrevolting disgustingnuclear familyfive hundred, we do not want five hundredextended familypremiumrevolting
disgustingnuclear family five hundredtwonuclear familyrevolting disgustingmemberextended familyfive hundred five
hundredtwonuclear familytorevolting disgustingextended familyfive hundred downloadfive hundred five hundredvideo games five hundredtwonuclear
familyrevolting disgustingandrevolting disgustingextended familyfive hundred five hundredtwoextended
familyappsrevolting disgustingextended familyfive hundred five hundrednuclear familywithnuclear familytwofive hundred cost technique twonuclear familylabelrevolting disgustingextended familytwofive hundred,
five hundredtwonuclear familywerevolting disgustingfive hundred simply five hundrednuclear familyaddrevolting
disgustingtwofive hundred twothenuclear familytwofive hundred five hundredlinkfive hundred
address nuclear familyrevolting disgustingtorevolting disgustingtwo twonuclear familygeneratorrevolting disgustingextended familyfive hundred five hundredfield twowheretwofive hundred five hundredtwoextended familyrevolting disgustingthenuclear familytwofive hundred five hundreddirectoryextended familytwofive hundred twonuclear familyfilenuclear familytwo nuclear familyaddedrevolting disgustingnuclear familytwofive hundred five hundredextended familyrevolting disgustingsuchtwo twonuclear familyasnuclear familytwo revolting disgustingrapidgator, five hundredtwoextended familyuploudedextended familytwo, nuclear
familyrevolting disgustingturbobitfive hundred, nuclear familyfilemonstertwo nuclear familyand many othersnuclear family five hundredtwoSonuclear familyfive
hundred we can twoextended familyhaverevolting disgustingnuclear
familyfive hundred extended familyourrevolting disgusting extended familyfileextended familytwo five hundrednuclear familyifrevolting disgusting we don’t have much money twoextended familyrevolting disgustingtonuclear familytwo five hundredtwogetnuclear family five hundredextended familyrevolting disgustingtroughrevolting disgusting five hundredrevolting disgustingthenuclear familyfive hundred payment method five hundredfromrevolting disgustingnuclear familyfive hundred nuclear familytherevolting disgusting obtainfive hundred link.

It’s awesome in favor of mee too have a website, which is beneficial iin support of my knowledge.
thanks admin

Here is mmy blog post :: adjustable beds and mattresses

I truly appreciate this post. Awesome.

I really like and appreciate your article.Really looking forward to read more. Awesome.

Say, you got a nice article.Really thank you! Really Cool.

If you have been invited for a summer garden party, you may want to know something about
perfect garden party dresses.
With this, you can freely search for a bridesmaid dress that can go perfectly with your wedding gown regarding color and
design. The right shoes to wear during the activity are the
ones that are closed for protection. As ever, the fashions of the
day are a pretty accurate barometer of the national mood.
Through this, you’ll manage to ascertain if their products are in top quality and
if the delivery is on time. For hour-glass shaped bodies, it is essential to balance the bottom and top-half of the body.

Hi there! I could have sworn I’ve been to this website before but after checking through some of the
post I realized it’s new to me. Anyways, I’m definitely
glad I found it and I’ll be bookmarking and checking back frequently!

Here is my page :: Http://flashwebdesign3.hazblog.com/

You should take the pill 20 minutes before a ual act.

Physiologically, erection is a hydraulic mechanism based upon blood
entering and being retained in the penis. Excessive estrogen is due to
improper diet, lack of exercise, environmental toxins,
usage of s legal or illegal, etc.

my web page; https://www.levitradosageus24.com/levitra-generic-buy-mg/

I 100% agree with u. Divergent is way better than The Hunger Games as it can be really fun and NOT DEPRESSING

Saved as a favorite, cool website!

I hate reading time-consuming content, simply because i have got a small amount of dislexia, but i really loved this article

terrific usage of language in the post, it really did help when i was reading

I just want to tell you that I am all new to blogging and site-building and actually loved you’re blog site. Very likely I’m planning to bookmark your blog . You really come with remarkable articles. Thank you for sharing your blog site.

Always wear high heels but opt for a chunkier heel rather than a stiletto for stability and a
perfect, confident walk. Thankfully the Steve Harvey
collection for women carries sizes up to a size 18 in misses
and a 24W for plus size. Tall and Skinny women will look good on belted dresses.
So if you make the effort and check out their web
sites you can often find that bargain you’re looking for.
Ladies from the upper class don’t seem to be responding to ecoceleb Angelina Jolie modeling designer St.

Not only is it extra warm for the winter it is also really eyecatching with lots of colour,
volume and texture.

It is perfect time to make some plans for the future and it is time to be happy. I’ve read this post and if I could I want to suggest you some interesting things or suggestions. Perhaps you can write next articles referring to this article. I wish to read more things about it!

I read this post fully regarding the resemblance of newest and previous technologies, it’s awesome article.

Heya i’m for the first time here. I came across this board and I
find It really useful & it helped me out much. I hope to give something back and
aid others like you helped me.

Leave a Reply