Table of ContentsView in Frames

What victim and bully workloads are

A victim is a workload whose performance has decreased due to other workloads, called bullies, that are over-using cluster components. Bullies can be user-defined or system-defined workloads.

Workloads on a cluster can share many of the cluster components, such as storage aggregates and the CPU for network and data processing. When a workload, such as a volume, increases its usage of a cluster component to the point that the component is unable to meet the demand of other workloads, the component is in contention. The workload whose activity is over-using a component is a bully. The other workloads that share those components, and whose performance is impacted by the bully, are the victims. Activity from system-defined workloads, such as deduplication or snapshots, can also escalate into "bullying."

When Performance Manager detects an incident, it identifies all workloads and cluster components involved, including the bully workloads that caused the incident, the cluster component that is in contention, and the victim workloads whose performance has decreased due to the increased activity of bully workloads.
Note: If Performance Manager is unable to identify the bully workloads, it only alerts on the victim workloads and the cluster component involved.

Performance Manager can identify workloads that are victims of bully workloads, and also identify when those same workloads become bully workloads. A workload can be a bully and a victim at the same time. It can also be a bully to itself. For example, a high performing workload that is being throttled by a policy group limit causes all workloads in the policy group to be throttled, including itself.