SlideShare a Scribd company logo
Windows 8
Disk Deduplication Deep Dive
         Ronald Beekelaar
         Virsoft Solutions
      ronald@beekelaar.com

                             Schiphol, 19 jan 2012
Introductions
• Presenter
   – MVP Security
   – MVP Virtual Machine Technology
   – E-mail: ronald@beekelaar.com

• Work
   –   Security consultancy
   –   Virtualization consultancy
   –   Create many VM-based labs and demos
   –   Software to optimize, manage and run VM
   –   Maintain four datacenters world-wide
        • Running Hyper-V labs for customers (MOC, training and demo purposes)
Objectives
• Discuss one interesting new aspect of
  Windows 8: Disk Deduplication
What is Disk Deduplication ?
• Goal:
  – Use less storage space


• Method:
  – Ensure that identical content in multiple (large) files is
    only stored once


• Is block-based, post-process, transparant solution
Standard deduplication modes
• "Source"
   – Prevent transferring data, if duplicate
       • Used by Remote Differential Compression
• "Inline"
   – Perform deduplication when data is written
       • Used by NTFS file compression
       • Write process is slowed down
• "Post-Process" (or "Background")
   – Perform deduplication later, in background, when idle
       • Used by Windows 8 Data Deduplication
Other methods to save disk space
• SIS (single-instance-store) in Win2000
   – Is file-based, not block-based

• NTFS file compression
   – Is inline, not post-process
   – Much more CPU intensive

• NTFS hard links
   – Is not transparent
   – Is file-based, not block-based
NTFS Hard Links
• Multiple file entries pointing to same data
• Manage
  – Create: mklink /h link.ext target.ext
  – List: fsutil hardlink list file.ext
• Is not transparent
  – Edit one hardlink file, also changes other files
• Windows uses thousands of hard links (!)
  – Good reason not to touch C:Windowswinsxs
Windows 8 dedup architecture
• Is file-system filter driver
   – Coordinates between file entry, regular storage
     and 'chunk' storage
• Dedup service (ddpsvc)
  runs jobs to deduplicate
  files
How does Windows 8 dedup work?
• Dedup service recognizes common 'chunks' in
  files, and places those in Chunk Store
   – In System Volume Information folder
• Dedup filter driver ensures that applications read
  correct file content

• File "size" (= content length) does not change in
  Explorer
   – Explorer reports "size-on-disk" as 4 KB
How does Windows 8 dedup work?
Windows 8 dedup details
• Dedup works per volume
  – Also works on portable disks
  – Dedup does NOT work on C: (Windows) volume
• Chunk size is 32-128 KB (average 80 KB)
• By default
  – Chunks are compressed in chunk store
     • Avoids re-compressing compressed files (zip, etc)
  – Dedup service ignores files < 64 KB
  – Dedup service ignores files changed in last 30 days
  – Dedup service ignores NTFS encrypted files
Savings?
• Depends on file content of course
• Microsoft reported averages:
  – General: 50-60% savings
     • Documents: 30-50% saving
     • Application library: 70-80% savings
     • VHD library: 80-95% savings
Performance?
• Write has no direct performance hit
  – Dedup operations are done post-process

• Read has a ~3% performance hit (if not in cache)
  – Due to more disk head operations
  – Compare with disk fragmentation

• Windows caching is dedup-aware (!)
  – Dedup improves caching efficience
Reliable?
• My opinion: Yes - 100%

• Data is check-summed
    – Means: invalid data is detected
• Operations are crash consistent
    – Means: can interrupt/crash operation at any time without losing
      data
• Data is self-describing
    – Means: it can be read without external data
• Popular 'chunks' (>100x) are stored multiple times
    – Means: avoids creating IO hotspots on disk



January 20, 2012       NIC 2012
How to enable Windows 8 dedup?
• Install Data Deduplication role service
• Start Data Duplication Service (ddpsvc)
• Powershell
    – import-module Deduplication
    – help dedup

    – enable-dedupvolume D:
    – set-dedupvolume D: -minimumfileagedays 0
        • Default is 30 days
    – start-dedupjob D: -type Optimization
        • Use Unoptimization to undo

    – get-dedupjob
    – get-dedupstatus
    – get-dedupmetadata
Questions ?
• Thanks for your attention

More Related Content

What's hot

RAID and LVM
RAID and LVMRAID and LVM
RAID and LVM
Mohitgupta8560
 
Raid data recovery Tips
Raid data recovery TipsRaid data recovery Tips
Raid data recovery Tips
Hone Software
 
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Lars Marowsky-Brée
 
Raid Technology
Raid TechnologyRaid Technology
Raid Technology
Aman Sadhwani
 
Virtualization workshop - part 1
Virtualization workshop - part 1Virtualization workshop - part 1
Virtualization workshop - part 1
Davide Pelosi
 
Raid 5
Raid 5Raid 5
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
Uzair Khan
 
Raid
RaidRaid
Raid
dinaselim
 
Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015
Bryan Gartner
 
Raid
RaidRaid
Raid
RaidRaid
Raid
RaidRaid
RAID
RAIDRAID
Raid
RaidRaid
Raid
Pari Soni
 
Raid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksRaid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive Disks
Mudit Mishra
 
MongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTigerMongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTiger
WiredTiger
 
RAID
RAIDRAID
Storing data in windows server 2012 ss
Storing data in windows server 2012 ssStoring data in windows server 2012 ss
Storing data in windows server 2012 ssKamil Bączyk
 

What's hot (20)

Raid level
Raid levelRaid level
Raid level
 
RAID and LVM
RAID and LVMRAID and LVM
RAID and LVM
 
Raid data recovery Tips
Raid data recovery TipsRaid data recovery Tips
Raid data recovery Tips
 
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
Modeling, estimating, and predicting Ceph (Linux Foundation - Vault 2015)
 
Raid Technology
Raid TechnologyRaid Technology
Raid Technology
 
Virtualization workshop - part 1
Virtualization workshop - part 1Virtualization workshop - part 1
Virtualization workshop - part 1
 
Raid 5
Raid 5Raid 5
Raid 5
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Raid
RaidRaid
Raid
 
Raid level 4
Raid level 4Raid level 4
Raid level 4
 
Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015Northern Colorado BigData Meetup 15Jan2015
Northern Colorado BigData Meetup 15Jan2015
 
Raid
RaidRaid
Raid
 
Raid
RaidRaid
Raid
 
Raid
RaidRaid
Raid
 
RAID
RAIDRAID
RAID
 
Raid
RaidRaid
Raid
 
Raid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksRaid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive Disks
 
MongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTigerMongoDB World 2015 - A Technical Introduction to WiredTiger
MongoDB World 2015 - A Technical Introduction to WiredTiger
 
RAID
RAIDRAID
RAID
 
Storing data in windows server 2012 ss
Storing data in windows server 2012 ssStoring data in windows server 2012 ss
Storing data in windows server 2012 ss
 

Viewers also liked

Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)hypervnu
 
Cluster aware updating v1.0
Cluster aware updating v1.0Cluster aware updating v1.0
Cluster aware updating v1.0
hypervnu
 
Vm mobility
Vm mobilityVm mobility
Vm mobility
hypervnu
 
The way you can deploy hyper v
The way you can deploy hyper vThe way you can deploy hyper v
The way you can deploy hyper v
hypervnu
 
Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)
hypervnu
 
Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)hypervnu
 

Viewers also liked (6)

Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)Scvmm 2012 (maarten wijsman)
Scvmm 2012 (maarten wijsman)
 
Cluster aware updating v1.0
Cluster aware updating v1.0Cluster aware updating v1.0
Cluster aware updating v1.0
 
Vm mobility
Vm mobilityVm mobility
Vm mobility
 
The way you can deploy hyper v
The way you can deploy hyper vThe way you can deploy hyper v
The way you can deploy hyper v
 
Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)
 
Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)
 

Similar to Windows 8 dddd (beekelaar)

Data Reduction for Gluster with VDO
Data Reduction for Gluster with VDOData Reduction for Gluster with VDO
Data Reduction for Gluster with VDO
Gluster.org
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
Alisa Esage Шевченко
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interactionDefconRussia
 
engage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVEengage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVE
Christoph Adler
 
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows AdminsThe Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
Bill Malchisky Jr.
 
Cloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inCloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation in
RahulBhole12
 
Gregory engels nsd crash course - ilug10
Gregory engels   nsd crash course - ilug10Gregory engels   nsd crash course - ilug10
Gregory engels nsd crash course - ilug10
Grégory Engels
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)
MongoDB
 
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and HadoopIOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and HadoopLeons Petražickis
 
Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?SQLDBApros
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
Mike Spaulding
 
Robust Applications in Mesos using External Storage
Robust Applications in Mesos using External StorageRobust Applications in Mesos using External Storage
Robust Applications in Mesos using External Storage
David vonThenen
 
Deployment Strategy
Deployment StrategyDeployment Strategy
Deployment StrategyMongoDB
 
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
 #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
Christoph Adler
 
Hadoop-2.6.0 Slides
Hadoop-2.6.0 SlidesHadoop-2.6.0 Slides
Hadoop-2.6.0 Slides
kul prasad subedi
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
APSU
 
Hadoop Distributed File System
Hadoop Distributed File SystemHadoop Distributed File System
Hadoop Distributed File System
Rutvik Bapat
 
MongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL DatabaseMongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL Database
FITC
 
Storage talk
Storage talkStorage talk
Storage talkchristkv
 
Chapter2.pdf
Chapter2.pdfChapter2.pdf
Chapter2.pdf
WasyihunSema2
 

Similar to Windows 8 dddd (beekelaar) (20)

Data Reduction for Gluster with VDO
Data Reduction for Gluster with VDOData Reduction for Gluster with VDO
Data Reduction for Gluster with VDO
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
 
engage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVEengage 2019 - 15 Domino v10 Admin features we LOVE
engage 2019 - 15 Domino v10 Admin features we LOVE
 
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows AdminsThe Ultimate IBM and Lotus on Linux Workshop for Windows Admins
The Ultimate IBM and Lotus on Linux Workshop for Windows Admins
 
Cloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inCloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation in
 
Gregory engels nsd crash course - ilug10
Gregory engels   nsd crash course - ilug10Gregory engels   nsd crash course - ilug10
Gregory engels nsd crash course - ilug10
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)
 
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and HadoopIOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
IOD 2013 - Crunch Big Data in the Cloud with IBM BigInsights and Hadoop
 
Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?Are the Native SQL Server Backup Utilities Holding You Back?
Are the Native SQL Server Backup Utilities Holding You Back?
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Robust Applications in Mesos using External Storage
Robust Applications in Mesos using External StorageRobust Applications in Mesos using External Storage
Robust Applications in Mesos using External Storage
 
Deployment Strategy
Deployment StrategyDeployment Strategy
Deployment Strategy
 
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
 #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded #DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
#DNUG45 - IBM Notes and Domino Performance Boost - Reloaded
 
Hadoop-2.6.0 Slides
Hadoop-2.6.0 SlidesHadoop-2.6.0 Slides
Hadoop-2.6.0 Slides
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Hadoop Distributed File System
Hadoop Distributed File SystemHadoop Distributed File System
Hadoop Distributed File System
 
MongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL DatabaseMongoDB: Advantages of an Open Source NoSQL Database
MongoDB: Advantages of an Open Source NoSQL Database
 
Storage talk
Storage talkStorage talk
Storage talk
 
Chapter2.pdf
Chapter2.pdfChapter2.pdf
Chapter2.pdf
 

More from hypervnu

Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2
hypervnu
 
How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...
hypervnu
 
TOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-VTOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-V
hypervnu
 
Catch up with VMM 2012 r2
Catch up with VMM 2012 r2Catch up with VMM 2012 r2
Catch up with VMM 2012 r2
hypervnu
 
Nic teaming and converged fabric
Nic teaming and converged fabricNic teaming and converged fabric
Nic teaming and converged fabric
hypervnu
 
Hyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolvedHyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolved
hypervnu
 
Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)hypervnu
 

More from hypervnu (7)

Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2Delivering people centric it with Configuration Manager 2012 R2
Delivering people centric it with Configuration Manager 2012 R2
 
How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...
 
TOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-VTOP-10 countdown Windows Server 2012 R2 Hyper-V
TOP-10 countdown Windows Server 2012 R2 Hyper-V
 
Catch up with VMM 2012 r2
Catch up with VMM 2012 r2Catch up with VMM 2012 r2
Catch up with VMM 2012 r2
 
Nic teaming and converged fabric
Nic teaming and converged fabricNic teaming and converged fabric
Nic teaming and converged fabric
 
Hyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolvedHyper v.nu-windows serverhyperv-networkingevolved
Hyper v.nu-windows serverhyperv-networkingevolved
 
Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)Windows server 8 hyper v & storage (hans vredevoort)
Windows server 8 hyper v & storage (hans vredevoort)
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Windows 8 dddd (beekelaar)

  • 1. Windows 8 Disk Deduplication Deep Dive Ronald Beekelaar Virsoft Solutions ronald@beekelaar.com Schiphol, 19 jan 2012
  • 2. Introductions • Presenter – MVP Security – MVP Virtual Machine Technology – E-mail: ronald@beekelaar.com • Work – Security consultancy – Virtualization consultancy – Create many VM-based labs and demos – Software to optimize, manage and run VM – Maintain four datacenters world-wide • Running Hyper-V labs for customers (MOC, training and demo purposes)
  • 3. Objectives • Discuss one interesting new aspect of Windows 8: Disk Deduplication
  • 4. What is Disk Deduplication ? • Goal: – Use less storage space • Method: – Ensure that identical content in multiple (large) files is only stored once • Is block-based, post-process, transparant solution
  • 5. Standard deduplication modes • "Source" – Prevent transferring data, if duplicate • Used by Remote Differential Compression • "Inline" – Perform deduplication when data is written • Used by NTFS file compression • Write process is slowed down • "Post-Process" (or "Background") – Perform deduplication later, in background, when idle • Used by Windows 8 Data Deduplication
  • 6. Other methods to save disk space • SIS (single-instance-store) in Win2000 – Is file-based, not block-based • NTFS file compression – Is inline, not post-process – Much more CPU intensive • NTFS hard links – Is not transparent – Is file-based, not block-based
  • 7. NTFS Hard Links • Multiple file entries pointing to same data • Manage – Create: mklink /h link.ext target.ext – List: fsutil hardlink list file.ext • Is not transparent – Edit one hardlink file, also changes other files • Windows uses thousands of hard links (!) – Good reason not to touch C:Windowswinsxs
  • 8. Windows 8 dedup architecture • Is file-system filter driver – Coordinates between file entry, regular storage and 'chunk' storage • Dedup service (ddpsvc) runs jobs to deduplicate files
  • 9. How does Windows 8 dedup work? • Dedup service recognizes common 'chunks' in files, and places those in Chunk Store – In System Volume Information folder • Dedup filter driver ensures that applications read correct file content • File "size" (= content length) does not change in Explorer – Explorer reports "size-on-disk" as 4 KB
  • 10. How does Windows 8 dedup work?
  • 11. Windows 8 dedup details • Dedup works per volume – Also works on portable disks – Dedup does NOT work on C: (Windows) volume • Chunk size is 32-128 KB (average 80 KB) • By default – Chunks are compressed in chunk store • Avoids re-compressing compressed files (zip, etc) – Dedup service ignores files < 64 KB – Dedup service ignores files changed in last 30 days – Dedup service ignores NTFS encrypted files
  • 12. Savings? • Depends on file content of course • Microsoft reported averages: – General: 50-60% savings • Documents: 30-50% saving • Application library: 70-80% savings • VHD library: 80-95% savings
  • 13. Performance? • Write has no direct performance hit – Dedup operations are done post-process • Read has a ~3% performance hit (if not in cache) – Due to more disk head operations – Compare with disk fragmentation • Windows caching is dedup-aware (!) – Dedup improves caching efficience
  • 14. Reliable? • My opinion: Yes - 100% • Data is check-summed – Means: invalid data is detected • Operations are crash consistent – Means: can interrupt/crash operation at any time without losing data • Data is self-describing – Means: it can be read without external data • Popular 'chunks' (>100x) are stored multiple times – Means: avoids creating IO hotspots on disk January 20, 2012 NIC 2012
  • 15. How to enable Windows 8 dedup? • Install Data Deduplication role service • Start Data Duplication Service (ddpsvc) • Powershell – import-module Deduplication – help dedup – enable-dedupvolume D: – set-dedupvolume D: -minimumfileagedays 0 • Default is 30 days – start-dedupjob D: -type Optimization • Use Unoptimization to undo – get-dedupjob – get-dedupstatus – get-dedupmetadata
  • 16. Questions ? • Thanks for your attention