Fine-tune your virtualization performance management skills
A comprehensive collection of articles, videos and more, hand-picked by our editors
How can we minimize the impact that using swap files has on virtual machine performance?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Disk swap files are temporary disk storage spaces used to supplement (or extend) solid-state memory. Simply stated, a memory page that is not actively used can be swapped to the disk, freeing that memory page for use by more active content. If the swapped memory page is needed later, it can be swapped back into memory from the disk. Swap files are handy because they prevent the system from running out of memory and crashing unexpectedly.
This is a well-established technique, but disk performance is easily an order of magnitude lower than solid-state memory -- the system and workload always have to wait for the disk -- so anytime a page swap must take place, the workload's performance is negatively affected.
The more a workload relies on swap files, the greater this impairment will be. For example, if the memory shortage is only small and the workload uses lots of static code that can be shuttled off to the disk and only accessed rarely, the swap file will probably have minimal impact on the VM. However, if the memory shortage is extensive and the workload uses active code, which is all accessed frequently, the swap file will probably have a major impact on the VM (perhaps even making it unusable).
There are several strategies to deal with swap file problems. In the near term, an IT technician can perform workload balancing to move one or more workloads between servers in an effort to free memory resources. By making more memory available, reliance on swap files can decrease and performance will improve. An intermediate-term solution is to upgrade the server's memory. Adding physical memory decreases the need for a swap file. The longer-term solution is to upgrade the server to a newer, more powerful model that provides more memory. However, in most cases this usually occurs during a technology refresh cycle.
Related Q&A from Stephen J. Bigelow
Our enterprise wants to limit the time it spends generating Identity and Access Management policies. What tools are available to automate this task?continue reading
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out ...continue reading
We have restrictions imposed on in-house IT staff with AWS Identity and Access Management. How do IAM roles protect access to services, applications ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.