megabytes of swap space. The third line of output (Mem:) Displays physical memory. The total column does not show the physical memory used by the core (usually about 1MB). The Used column shows the total amount of memory used (the second row is not buffered). The free column shows all memory that is not in use. The shared column displays the total amount of memory shared by multiple processes. The Buffers column displays the current size of the disk cache. The five-line (Swap:) shows the inform
. (in kilobytes.) Res=code+data. %MEM shows the value of this column) SHR: shared memory used by the process. (in kilobytes) S: The state of the process. There are mainly the following types: D. Non-interruptible sleep S. Hibernate R. Running T. Being tracked or stopped Z. Zombie State (Zombies process)%cpu: The percentage of CPU that the process consumes%mem: The percentage of physical m
IP address of the login%DIR displays the current directory of the logged-in user%disk displays the current disk of the logged-on user%dfree Displays the current disk space of the logged-on user in MB%FUP displays the number of files uploaded by the logged-in user%fdown displays the number of files downloaded by the logged-on user%ftot Displays the total number of files uploaded and downloaded by the logged-in user%BUP Displays the number of bytes uploaded by the logged-on user, in
Parent Process ID
Ruser
Real user Name
Uid
User ID of the process owner
USER
User name of the process owner
GROUP
Group name of the process owner
Tty
The terminal name of the startup process. Processes that are not started from the terminal are displayed as?
PR
Priority level
NI
Nice value. A negative value indicates a high priority, and a positive value indicates a low priority
:
The type of the file system is NTFS.
CHKDSK is verifying files ...
File verification completed.
CHKDSK is verifying indexes ...
Index verification completed.
CHKDSK is verifying security descriptors ...
Security descriptor verification completed.
12372 kilobytes total disk spaces.
3 kilobytes in 1 user files.
2 kilobytes in 1 indexes.
4217
example, the following parameter shows that the dirty page (dirty pages) starts writing to the hard disk when it reaches all memory page 10%.
#/sbin/sysctl-n Vm.dirty_background_ratio10VmstatContinue to vmstat the introduction of some parameters, the previous Linux performance monitoring: The CPU introduced the vmstat part of the parameters, the other part of the introduction. The following data comes from a 256MB ram,512mb SWAP Xen VPS in Vpsee:# vmstat 1procs-----------memory------------
Tags: active results numerical techniques cached Zombie process description trace LinuxOne, freeDisplays the unused and used memory states of the current system, including physical memory, virtual swap file memory, shared memory segments, and buffers used by the system core, etc.1. Parameter description-B: Displays memory usage in bytes;-K: Displays memory usage in kilobytes;-M: Displays memory usage in megabytes;-G displays memory usage in gigabytes;
space
0.0% ni
User process priority scheduling CPU percentage
98.7% ID
Percentage of idle CPU
0.0% WA
Percentage of CPU time waiting for input and output
0.0% hi
Hardware CPU Interrupt Occupancy percentage
0.0% si
Soft interrupt Occupancy Percentage
0.0% St
Virtual machine Occupancy Percentage
MemMemory statistics, including physical memory, used memory, f
the value is longer than the number of server CPUs, then the CPU resources are insufficient.B, is the block's abbreviation, indicating the number of processes waiting for the resource. b means that the process is blocked by resources other than the CPU (hard disk or network), in a waiting state, the card is dead, B is blocked. For example, the speed is slow, the process wants to send you a packet, if the network speed quickly, only 1 seconds to send the finished. But now slow, it may take 10 se
. (Https://wiki.openstack.org/wiki/InstanceResourceQuota)Bandwidth Params:vif_inbound_average,vif_inbound_peak,vif_inbound_burst,vif_outbound_average,vif_outbound_peak, Vif_outbound_burstIncoming and outgoing traffic can be shaped independently. The bandwidth element can has at most one inbound and at most one outbound child elements. Leaving any of the these children element out result in the no QoS applied on that traffic direction. So if you want to shape only network's incoming traffic, use
.
Cache hit Ratio
The rate of cache hits and lookups.
Cached Cursor Counts
The number of cursors for the given type in the cache.
Cursor Cache Use count/sec
The number of times each cached cursor is used.
Cursor Memory Usage
The amount of memory (in kilobytes) that the cursor occupies.
Cursor requests/sec
The number of SQL cursor requests received by th
error message, date, and file size returned to the client browser.
Syntax:
Program code:
Parameters:
Errmsg custom SSI execution error message, which can be any method you like.
Display Mode of sizefmt file size. The default mode is byte mode ("bytes"), which can be changed to kilobytes ("abbrev ")
Timefmt time display mode, the most flexible configuration attributes.
Example: display the size of a non-existing
Nicstat is a powerful tool for monitoring network IO 1. View network card information 2. Check the network card interval 2 seconds, 2 times
Time column: Represents the response times for the current sample.
Lo and eth0: the NIC name.
RKB/S: The number of kilobytes per second received.
WKB/S: The number of kilobytes written per second.
RPK/S: The number of packets received per se
location.Stdout_logfile_maxbytes: When the standard output log file is reached, it is automatically rotated, in kilobytes, MB, GB. If set to 0, it means that the log file size is not limitedStdout_logfile_backups: The number of standard output log rotation backups, default is 10, if set to 0, do not back upStdout_capture_maxbytes: When the process is in stderr capture mode, the maximum bytes value of the FIFO queue can be written in
, but there are also security issues.
Forbidden Method:
Apache, will be access.conf in the "Options includes execcgi" This line of code deleted;
In IIS, to disable the #exec command, you can modify the SSIExecDisable metabase;
#config
Function: Specifies the format of the error message, date, and file size returned to the client browser.
Grammar:
Parameters:
ErrMsg Custom SSI Executes the error message, which can be any way you like.
SIZEFMT file size display, default to
Purpose: insert the output of an external program to the page. The input of a CGI program or a general application can be inserted, depending on whether the parameter is cmd or CGI.
Syntax:
Parameters:
CMD common applicationCGI script program
Example:
Note: As shown in the preceding example, this command is quite convenient, but there are also security problems.
Method prohibited:
Apache: Delete the "options except des execcgi" line of code in access. conf;To disable the # EXEC command in IIS
= parameters with-xmanagement (-xmanagement: class =, classpath =) You can specify a management class and its classpath. this option loads the class and causes its empty constructor to be called early in JVM startup. from the constructor, a new thread is then started, from which your management client is run.Bea jrockit Management Console-XMSSets the initial size of the heap. you shoshould set the initial heap size (-XMS) to the same size as the maximum heap size. this value can be specified in
1 TB = 1024 GB 1 GB = 1024 MB 1 MB = 1024kb 1kb = 1024 byte note: byte means B, that is, byte KB is a kilobytes of MB, that is, GB is a Gigabit, that is, a gigabit. Generally, they can be viewed as a kilobytes of data, the accuracy is that 1024 is the 10th power of 2. In the unit of storage capacity, bytes are the most basic unit, that is, what we usually call B (bytes). It has several expansion units, name
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.