当前位置:网站首页>What are the software operation and maintenance monitoring?
What are the software operation and maintenance monitoring?
2022-07-27 23:56:00 【Put the stars by the bed】
Monitoring is a function that programmers need to rely on when maintaining software operation , Today we will learn about it through case analysis , What are the indicator types of software operation and maintenance monitoring .
1、 indicators
Usually, the monitoring indicators are from System 、 application 、 Business Wait for several dimensions :
System monitoring : Mainly to monitor the physical machine 、 virtual machine 、 How the operating system works , The main indicators include CPU、 Memory 、 disk 、 Network, etc , Other related data include the physical machine run time 、 Operating system version 、 Operating system kernel , These are also some of the basic basis for troubleshooting . Here we need to focus on the network , Microservices are called or called through the network , Once the network goes wrong , The entire microservice cluster is not available , So network monitoring needs to be refined to traffic 、 Data packets 、 Packet loss 、 Misstatement 、 The number of connections, etc .
Application monitoring : It mainly monitors the operation of the application , Including application run time 、http Service port 、 service url、http Service response code 、http Service response time 、SQL、 A cache hit 、TPS、QPS etc. . about Java application , It also needs to include JVM Operation of the :JDK edition 、 Memory usage ( Heap memory 、 Non heap memory, etc )、GC etc. Java Virtual machine operation .
Business monitoring : It mainly monitors the implementation of some core businesses , It's intrusive to the business , The indicators of each service are different , Different monitoring methods are different , It's usually buried code . For example, monitoring login registration 、 Commodity information 、 Inventory 、 Place an order 、 payment 、 Delivery and other business .
2、 health
The general health check-up is done by a heartbeat test , There are usually two kinds of :
One is to establish TCP link , perform ping/pong call . This way needs to be established with the monitoring system in the service TCP link , Monitoring components need to be embedded in the service , There's an intrusion into the service . But because of its high efficiency , And it's targeted , There will be no underreporting .
One is to listen to the service port , In this way, you only need to add monitoring plug-ins in the container or virtual machine , There's no intrusion into the service , But since port availability and service availability are not a concept , So there will be cases of underreporting .
3、 Exception collection
There are two kinds of anomalies , Logical and behavioral anomalies . Logical exception means that there is abnormal logic in the code , For example, the common NPE; Abnormal behavior refers to the unexpected user behavior , Both of these situations are harmful to the system . So we need to collect these anomalies , And be able to locate the location of the exception . The purpose of abnormal information collection is to locate the problem , So the information reported must be comprehensive and easy to locate . Therefore, it is necessary to protect the exception code in the reported information , You can customize a certain length of string , Easy to position . And then we have to report the parameters , Used to restore the site . And report abnormal information , Used to analyze anomalies .
边栏推荐
- [C language] address book (dynamic version)
- 29.学习Highcharts 使用百分比的堆叠柱形图
- Error:svn: E155010: ‘/Users/.../Desktop/wrokspace/xxx‘ is scheduled for addition, but is missing
- The interviewer asked the thread safe list, and I'm not afraid after reading it!
- Shuffle, partition and read of tfrecord
- Key points of data management
- Lua basic grammar learning
- Use of date
- Buuctf childrsa Fermat theorem
- Socket interaction process of four waves
猜你喜欢

4小时定单破20000+,自称“百万内最豪华”,国产品牌飘了?

Redis hash underlying data structure

主数据管理理论与实践

TOGAF10标准读书会首场活动圆满举办,精彩时刻回顾!

Can Siemens PLC collect analog data of multiple slave stations in real time and wirelessly?

Character stream learning 14.3

Introduction to several common usage scenarios of message queue
![[RoarCTF2019]RSA](/img/0e/8c8371ccf40094e5b03e502d6ae851.png)
[RoarCTF2019]RSA

Notes on Shangpin project in shangsilicon Valley (I)

How to bold font in Latex & how to make circle serial number
随机推荐
Monologue of a software Investor: why don't I pursue fast-growing companies
Character stream learning 14.3
Socket interaction process of four waves
Realize today's news website based on native JS
Construction and application of super large scale knowledge map of ants
Elk log analysis system installation and deployment
Which one is better to request to merge -- three skills of interface request merging, and the performance directly explodes the table
基于原生js实现今日新闻网站
Bank marketing predicts the success rate of a customer's purchase of financial products
解密 OOM 崩溃下降 90% 的秘密~
Calling dht11/22 temperature and humidity sensor in Proteus simulation Arduino
Unity implements simple Sketchpad drawing function (notes)
Can Siemens PLC collect analog data of multiple slave stations in real time and wirelessly?
Notes on Shangpin project in shangsilicon Valley (I)
BUUCTF-RSA4
NDK series (6): let's talk about the way and time to register JNI functions
[NCTF2019]babyRSA1
Why does redis cluster use reverse proxy? Just read this one
BUUCTF-Baby RSA
Flutter pull_ to_ refresh-1.6.0/lib/src/internals/slivers. dart:164:13: Error: Method not found: ‘descr