Detailed explanation of iostat commands for real-time IO monitoring in CentOSIntroduction
Iostat is mainly used to monitor the IO load of system devices. iostat displays the statistics from the start of the system when it is run for the first time. After iostat is run, statistics from the last run of the command are displayed. You can specify the number and time of statistics to obtain the required statisti
similarities with supermarket queues:r/s+w/s similar to the total number of people who have beenAverage Queue Length (AVGQU-SZ) is similar to the number of average queueing people in a unit timeAverage service time (SVCTM) is similar to the cashier's payment speedAverage wait time (await) is similar to the average wait time per personAverage I/O data (AVGRQ-SZ) is similar to the average number of things each person buysThe I/O operation rate (%util) is similar to the time scale at which a perso
.
System
Inch
Number of interrupts per second, including clock interrupts.
Sc
The number of context switches per second.
The larger the 2 values above, the greater the CPU time that is consumed by the kernel.
Cpu
us
The percentage of user process execution time. This value is higher, which indicates that the user process consumes more CPU time, but we should consider optimizing the
IntroductionMost of the IO statistics tools under Linux, such as Iostat, Nmon, and so on, are only counted to the Per Device's read and write situations, and if you want to know how each process uses IO, it's a bit cumbersome.Iotop is a top class tool used to monitor disk I/O usage. Iotop has a UI similar to top, which includes information about PID, user, I/O, process, and so on.ExampleJust run it straight.IotopThe output is as followsTotal DISK READ: 6.01/s | Total DISK write: 3.85
the process%MEM: The process uses a percentage of memory command: The command to pull up the processIO Case Statistics (-D)With the-D option, we can view the statistics for process IO:linux:~ # pidstat-d 1 2Linux 2.6.32.12-0.7-default (Linux) 06/18/12 _x86_64_17:11:36 PID kb_rd/s kb_wr/s kb_ccwr/s command17:11:37 14579 124988.24 0.00 0.00 dd17:11:37 PID kb_rd/s kb_wr/s kb_ ccwr/s command17:11:38 14579 105441.58 0.
zabbix3.0.4 using Percona-monitoring-plugins plug-ins to monitor the detailed implementation of mysql5.6Because Zabbix's own MySQL monitoring does not provide the key that can be used directly, so generally do not use, the industry's classmates use Percona monitoring Plugins to monitor the way of MySQLPercona has impro
look down when I deploy the Heapster, by looking at the mirror of the Heapster container group to discover:Many people think is the problem of HTTPS or k8s configuration, so go to the flurried to configure the insecure HTTP way, resulting in more and more deep pits, more and more low transparency, it is impossible, I also get a long time, are more than retwist, here omit 10,000 words ... , when these paths have been traveled, re-read the following text:Only to find the issue of permissions, Hea
for garbage collection. But after the collection is complete, these objects still exist, indicating that references to this class have not been released in some places!4. Find out where the Testbean classes are used and do not release themRight-click on the Cn.test.TestBean object to select "Take Heap Snapshot for Selection" and observe its heapNext:Click "OK":Right-click in the class and select "Use Selected Objects" in the menu that appears:The following window appears:Select "Allocations" an
template, the following accessoriesSecond, import the corresponding CPU, IO, hard disk and other performance monitoring template files, enter Perfmon in the run, click the Data Collector = "user-defined, such asRight-click, new Data Collector, select Import from Template, asClick Next, select System performance, click Browser, select the CPU information corresponding to the performance template collector, asClick Finish, you will create a CPU collect
system processing.SVCTM: The average time that the system processes each request, excluding the time consumed in the request queue.%UTIL:I/O requests account for the percentage of the CPU, the higher the ratio, the more saturated the description.1. When the value of Avgqu-sz is low, the equipment utilization is higher.2. When the value of%util is close to 1%, it indicates that the device bandwidth is already full.To determine the system bottleneck, it is sometimes necessary to combine several S
clear document structure and easy management and development.
Using events to listen for binding events
Another way to bind events is to bind the event listener with either AddEventListener () or attachevent (). The following detailed description, event monitoring.
Event Monitoring
With regard to event monit
As a system administrator, I am most concerned about the importance of online systems that do not shut down or stop network services without my knowledge, and that the services or hosts that fail may sometimes take a long time to know. Especially when it comes to holidays, system administrators are nervous. To change this passive situation, I recommend the network monitoring software Nagios, personally think its biggest advantage is that it can send f
screen filtering function, enter the characters to filter, such as IP, press ENTER, the screen will only show this IP-related traffic information;Press L to toggle the scale on the top of the display screen, and the flow graph bar will change depending on the scale;Press J or press K to scroll up or down the screen to display the connection record;Press 1 or 2 or 3 to sort by the three-column traffic data displayed on the right;Sort by Sort by > According to the host name or IP of the remote ta
, and ifstat KB, this b is byte, Byte is 8 times times the bit. Beginners are apt to be misled.Order to enter IftopAfter entering the iftop screen some operation command (note case) press H to toggle whether to display Help, press N to toggle display the IP or host name of the machine, press S to toggle whether the host information is displayed, press D to toggle whether the host information of the remote target hosts is displayed, or toggle the display format to 2 lines/1 lines per t Show only
the host information is displayed, press D to toggle whether the host information of the remote target hosts is displayed, or toggle the display format to 2 lines /1 rows/Only send traffic/only show receive traffic, press N to toggle display port number or port service name, press S to toggle whether to display local ports information, press D to toggle display port information for remote target host, press p to toggle whether port information is displayed , toggle pause by P continue to displa
can.This means: I want to monitor GZ users.Command: terminate the corresponding processTop: Enter this command and press ENTER to see the process being executed. K: Then enter the "K" carriage return and enter the process ID number to end.Iv. Linux monitoring network statusOverview: This command can be used to monitor those IP links to Linux, if it is illegal users, you can kill these IP.Use: Displays the network statistics command netstat, which is
The topas command of AIX performance monitoring parses the most comprehensive dynamics of the operating system in detail, and the convenient performance view is the topas command. The topas output is used as an example below, briefly describe the performance monitoring of the AIX System for the reference of O M engineers and system administrators. In addition, 1. view the error message errpt in the operati
secondRepresents the number of pages per second that are removed from physical memory or written to the page.Paging RateNumber of pages read to physical memory or written to pagefile (s), PersecondThe number of pages per second read into physical memory or written to the paging file.Swap-in RateNumber of processes being swappedThe number of processes exchanged to memory per second.Swap-out RateNumber of processes being swappedThe number of processes that are swapped out of memory per second.Sys
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.