How to avoid big mistakes with Oracle's Exadata
Presenters at the recent Collaborate user conference gave their tips
IDG News Service - Exadata is Oracle's most popular and mature "engineered system," but some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Many people have seen Oracle's advertisements that sing Exadata's praises and cite astounding performance improvements over running the same workload on traditional hardware, said Andy Colvin, practice director with Oracle consulting firm Enkitec, during a presentation at the Collaborate conference in Las Vegas last week.
Many databases are hindered because they're running on servers with older hardware and fibre channel interconnects, as well as a shared SAN (storage area network). Exadata targets these problems with features such as dedicated storage and Infiniband interconnects.
"You get away from everybody else," Colvin said. "You get to be the kid with your own sandbox, so you're not sharing storage with the rest of the organization."
Maybe as a result of this, some customers "think of [Exadata] as throwing hardware at a problem, and it's really not," Colvin said. Simply moving workloads over to Exadata will typically result in a three-times performance improvement, he added.
But the "smart scan" technology afforded by Exadata's specialized storage software "is where the magic really happens," Colvin said.
A few key moves are highly important. For one, Exadata can benefit from a smaller SGA (system global area), Oracle's name for the shared RAM space used by a database instance. "If you start small it will recognize you have a small buffer cache," he said. "It's going to utilize all that power you have down at the storage tier."
However, this advice mostly applies to data warehouses deployed on Exadata, according to Colvin. OLTP (online transaction processing) queries typically need larger SGAs, he said.
But in general, new Exadata customers should realize they "aren't special," and avoid making too many arbitrary tweaks, Colvin said. "You've got a nice fancy system Oracle has configured and tested."
Meanwhile, it might even be a big mistake to buy Exadata at all, as it could be overkill, according to another presenter at Collaborate.
Automotive parts manufacturer Gentex is running its substantial ERP (enterprise resource planning) system with a combination of commodity servers and storage, said Cliff Burgess, director of IT at the company.
It went with the combination after getting the hard sell from Oracle on an Exadata upgrade. The solution Gentex ultimately came up with ended up involving far less additional hardware than Oracle's representatives claimed it would, according to Burgess.
Oracle customers who need more performance would be well served to determine whether simply some faster chips, additional RAM and solid-state cards would solve their problems, versus buying an Exadata, he added.
- The Principles of the Business Data Lake The Business Data Lake is a new approach to information management, analytics and reporting that better matches the culture of business and better...
- Start with a Data Lake. End with Business Value. Pivotal Big Data Suite enables companies to store all data, accelerate processing and most importantly increase the amount of data being analyzed and...
- Store Everything. Analyze Anything, Build the Right Thing. The value of Information has increased, so has the business's thirst for more information.
- How Four Citrix Customers Solved the Enterprise Mobility Challenge Managing mobile devices, data and all types of apps-Windows, datacenter, web and native mobile- through a single solution.
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Applications White Papers | Webcasts