当前位置:网站首页>What are the software operation and maintenance monitoring?
What are the software operation and maintenance monitoring?
2022-07-27 23:56:00 【Put the stars by the bed】
Monitoring is a function that programmers need to rely on when maintaining software operation , Today we will learn about it through case analysis , What are the indicator types of software operation and maintenance monitoring .
1、 indicators
Usually, the monitoring indicators are from System 、 application 、 Business Wait for several dimensions :
System monitoring : Mainly to monitor the physical machine 、 virtual machine 、 How the operating system works , The main indicators include CPU、 Memory 、 disk 、 Network, etc , Other related data include the physical machine run time 、 Operating system version 、 Operating system kernel , These are also some of the basic basis for troubleshooting . Here we need to focus on the network , Microservices are called or called through the network , Once the network goes wrong , The entire microservice cluster is not available , So network monitoring needs to be refined to traffic 、 Data packets 、 Packet loss 、 Misstatement 、 The number of connections, etc .
Application monitoring : It mainly monitors the operation of the application , Including application run time 、http Service port 、 service url、http Service response code 、http Service response time 、SQL、 A cache hit 、TPS、QPS etc. . about Java application , It also needs to include JVM Operation of the :JDK edition 、 Memory usage ( Heap memory 、 Non heap memory, etc )、GC etc. Java Virtual machine operation .
Business monitoring : It mainly monitors the implementation of some core businesses , It's intrusive to the business , The indicators of each service are different , Different monitoring methods are different , It's usually buried code . For example, monitoring login registration 、 Commodity information 、 Inventory 、 Place an order 、 payment 、 Delivery and other business .
2、 health
The general health check-up is done by a heartbeat test , There are usually two kinds of :
One is to establish TCP link , perform ping/pong call . This way needs to be established with the monitoring system in the service TCP link , Monitoring components need to be embedded in the service , There's an intrusion into the service . But because of its high efficiency , And it's targeted , There will be no underreporting .
One is to listen to the service port , In this way, you only need to add monitoring plug-ins in the container or virtual machine , There's no intrusion into the service , But since port availability and service availability are not a concept , So there will be cases of underreporting .
3、 Exception collection
There are two kinds of anomalies , Logical and behavioral anomalies . Logical exception means that there is abnormal logic in the code , For example, the common NPE; Abnormal behavior refers to the unexpected user behavior , Both of these situations are harmful to the system . So we need to collect these anomalies , And be able to locate the location of the exception . The purpose of abnormal information collection is to locate the problem , So the information reported must be comprehensive and easy to locate . Therefore, it is necessary to protect the exception code in the reported information , You can customize a certain length of string , Easy to position . And then we have to report the parameters , Used to restore the site . And report abnormal information , Used to analyze anomalies .
边栏推荐
- Arm32进行远程调试
- Reduce error demonstration
- C # delegate usage -- console project, which implements events through delegation
- Join hands with Changjiang storage, jiangbolong launches the world's smallest expansion card
- What is the difference between concurrency and parallelism?
- [C language] address book (dynamic version)
- New technology leads new changes in marketing of large and medium-sized enterprises, and UFIDA BiP CRM is launched!
- Redis 哈希Hash底层数据结构
- 主数据管理理论与实践
- 五子棋人机对战实现
猜你喜欢

【zer0pts CTF 2022】 Anti-Fermat

基于mediapipe的姿态识别和简单行为识别

NDK series (6): let's talk about the way and time to register JNI functions

Notes on Shangpin project in shangsilicon Valley (I)

C # delegate usage -- console project, which implements events through delegation

Ideas, methods and steps of making folding fans with 3DMAX

2022 summer vacation daily question (5)

Xss.haozi.me practice customs clearance

CaEGCN: Cross-Attention Fusion based Enhanced Graph Convolutional Network for Clustering 2021

Introduction to several common usage scenarios of message queue
随机推荐
Features of hardwired controller:
JS提升:JS中的数组扁平化问题
4小时定单破20000+,自称“百万内最豪华”,国产品牌飘了?
BUUCTF-RSA4
Redis 哈希Hash底层数据结构
[MRCTF2020]babyRSA
Nail alarm tool
Control mode of CPU
Use a grayscale filter
What is the prospect of low code development? Are you really optimistic about low code development?
Notes on Shangpin project in shangsilicon Valley (I)
BUUCTF-bbbbbbrsa
Socket interaction process of three handshakes
Flutter pull_to_refresh-1.6.0/lib/src/internals/slivers.dart:164:13: Error: Method not found: ‘descr
字符流学习14.3
解密 OOM 崩溃下降 90% 的秘密~
2022/7/24-7/25
【zer0pts CTF 2022】 Anti-Fermat
Use of date
尚硅谷尚品项目汇笔记(一)