当前位置:网站首页>JVM family -- monitoring tools
JVM family -- monitoring tools
2022-07-04 03:24:00 【Li Meng LM】
stay linux In the environment
One .uptime

system time , The elapsed time
The number of connections :
Each terminal is a connection
1,5,15 Average system load in minutes
Average number of processes in the run queue
Two .vmstat
Can count the system's CPU, Memory ,swap,io , etc.
vmstat 1 4
3、 ... and .top
cpu Memory
Each process takes up CPU situation
Four .pidstat
monitor CPU,IO, Memory

-p Specify process –u monitor CPU Samples per second altogether 3 Time -t Show threads

TID Threads id CPU Which core
5、 ... and .windows
Task manager :cpu ,io
perfmon
pslist: Show java The operation of the program
6、 ... and .java Bring their own tools
1.jps
List java process , -q Only output processes id -m Output Java process ( The main function ) Parameters of -l Can be used to output the full path of the main function -v Can be displayed and passed to JVM Parameters of
2.jinfo
see java Extension parameters for the application
-flag <name>: Print assignments JVM Parameter values for
-flag [+|-]<name>: Set the specified JVM Boolean value of parameter
-flag <name>=<value>: Set the specified JVM The value of the parameter
jinfo -flag PrintGCDetails 2972
3.jmap
Generate java Heap snapshots of applications and statistics of objects
4.jstack
Print thread dump
-l Print lock information -m Print java and native Frame information of -F mandatory dump, When jstack Use when there is no response
5.JConsole
Graphical monitoring tools
You can see Java Running overview of the application , Monitoring heap information 、 Use of permanent areas 、 Class loading, etc
6.Visual VM
Visual VM It is a powerful visual tool for multi in one fault diagnosis and performance monitoring
7、 ... and . Example
Run a program ThreadBlockMain, Expected output Hello,World , The result is after the program runs , Program stuck , No expected output .
1.jps View program progress
2.jstack Output dump
3.top View occupancy cpu Most of the processes id
4.pidstat Check the process id The next thread is occupied cpu most ,TID Threads id convert to 16 Base number ,nid
5.jstack process id Output information , lookup nid, Location problem
边栏推荐
- Recursive structure
- [database I] database overview, common commands, view the table structure of 'demo data', simple query, condition query, sorting data, data processing function (single row processing function), groupi
- Ningde times and BYD have refuted rumors one after another. Why does someone always want to harm domestic brands?
- Examination question bank of constructor decoration direction post skills (constructor) and examination data of constructor decoration direction post skills (constructor) in 2022
- System integration meets the three business needs of enterprises
- Setting methods, usage methods and common usage scenarios of environment variables in postman
- Rhcsa day 2
- Want to do something in production? Then try these redis commands
- static hostname; transient hostname; pretty hostname
- What are the conditions for the opening of Tiktok live broadcast preview?
猜你喜欢

Jenkins configures IP address access

Lichuang EDA learning notes 14: PCB board canvas settings

Add token validation in swagger

The "message withdrawal" of a push message push, one click traceless message withdrawal makes the operation no longer difficult

Teach you how to optimize SQL

I stepped on a foundation pit today

150 ppt! The most complete "fair perception machine learning and data mining" tutorial, Dr. AIST Toshihiro kamishima, Japan

Want to do something in production? Then try these redis commands

What are the conditions for the opening of Tiktok live broadcast preview?

Ningde times and BYD have refuted rumors one after another. Why does someone always want to harm domestic brands?
随机推荐
Experience summary of the 12th Blue Bridge Cup (written for the first time)
[source code analysis] model parallel distributed training Megatron (5) -- pipestream flush
Command Execution Vulnerability - command execution - vulnerability sites - code injection - vulnerability exploitation - joint execution - bypass (spaces, keyword filtering, variable bypass) - two ex
Explain AI accelerator in detail: why is this the golden age of AI accelerator?
Imperial cms7.5 imitation "D9 download station" software application download website source code
Contest3145 - the 37th game of 2021 freshman individual training match_ J: Eat radish
Learning video website
Crawler practice website image batch download
Is it really so difficult to learn redis? Today, a fan will share his personal learning materials!
Contest3145 - the 37th game of 2021 freshman individual training match_ D: Ranking
System integration meets the three business needs of enterprises
CSCI 2134
Want to do something in production? Then try these redis commands
[development team follows] API specification
Redis transaction
Session learning diary 1
Management and thesis of job management system based on SSM
Slurm view node configuration information
Zigzag scan
Contest3145 - the 37th game of 2021 freshman individual training match_ G: Score