Why is the server so slow? CPU, RAM, and disk I/O resources are exhausted, and ram is used up
Machine running is slow because it consumes too many system-specific resources. The main resources of the system include CPU, RAM, disk I/O, and network.
Note: This content is excerpted from the "DevOps Troubleshooting: Best Practices for Linux server Operations" book
System load
The average system load is probably the first basic metric to use when solving problems that cause the
Requirements: Use the free command to accurately monitor RAM utilizationKnowledge: GREP,FREE,AWK,BCThe script is as follows[[email protected] scripts]# cat mem.sh #!/bin/bash-# free-m represents output in m units, and if the memory is large enough,
1. Purpose and significanceThis is the optimization of the evaluation method.The importance of RAM as the place where all content is loaded when the hand is running is self-evident.Knowing the amount of RAM left on the phone after it is turned on
Free Windows and Linux VPS Providers 2017After surfing many days, I-finally found some VPS providers that give us VPS servers with free of charge without have to Pay anything.1. Desktone–vmware Horizon AirFree Windows and Linux VPS Providers
1, what is Linux?
To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify (
Top: The command provides real-time status monitoring of the system's processor. It displays a list of the most "sensitive" tasks for the CPU in the system.This command can be used on a per-CPU basis. Memory usage and execution time sorting
I and Linux-general Linux technology-Linux technology and application information. The following is a detailed description. Translation: linky_fan @ www.linuxfans.org
Making the distribution, Part 1
Birth of the Gentoo Linux
Me and Linux
Nowadays,
File System of embedded devices
The system needs a method for storing and retrieving information in a structured format, which requires the participation of the file system. Ramdisk (see references) is a mechanism for creating and mounting a file
Privilege Escalation using the Use-After-Free (UAF) vulnerability in the Linux Kernel
Last month, the CVE-2016-0728 Local Elevation of Privilege Vulnerability let everyone's eyes again focused on Linux kernel security. Like CVE-2015-3636, CVE-2015-73
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.