To confirm whether excessive paging is occurring, add the Avg. Disk sec/Transfer (a physical disk counter) and Pages/sec counter values. If the product of these counters exceeds 0.1, paging is taking more than 10 percent of disk access time. If this occurs over a long period, you probably need more memory.
Next, check for excessive paging due to running applications. If possible, stop the application with the highest working set value, and see if that dramatically changes the paging rate. If you suspect excessive paging, check the Pages/sec counter in System Monitor. This counter, which is part of the Memory object type, shows the number of pages that had to be read from disk because they were not in physical memory. (Notice the difference between this counter and Page Faults/sec, which indicates only that data was not immediately available in the specified working set in memory.)
To address a low physical memory condition an administrator may chose one or more of the following options:
-
Close or stop one or more applications, services, processes
-
Add additional Physical Memory to the computer
-
Move applications to one or more additional computers (applicable to Servers only)
If the system has been adequately provisioned with physical memory and application load but it continually exceeds the available physical memory threshold over time it’s possible that an application is leaking memory. To identify an application that is leaking memory an administrator can do the following:
Open up System Monitor and monitor the following system wide performance counters over time:
If any one of these counters continually increase over time it is possible that an application may be leaking memory. To view recent history for these performance counters you can use the following view:
If the system appears to be leaking memory, the specific application can be identified by monitoring the following counters for each running process using System Monitor:
If a consistent and significant increase in any of these counters is observed it may be necessary to contact the application vendor for support.
|