What scenarios can cloud monitoring services be applied to? When we choose ECS, we often see cloud monitoring and other products in the commodity bar. So what exactly is cloud monitoring? What are the main monitoring scenarios? Today I will talk with you briefly! Cloud monitoring is the whole process of integrating approval, supervision and management methods according to the information technology attributes of the cloud or the operation contents and steps in the system architecture. In addition, cloud monitoring applies manual or automatic IT supervision and management methods to ensure that the cloud system architecture or service platform operates in the best way, which is part of Internet security and process management.
Generally, mobile software that displays centralized browsing and operation of cloud system architecture is completed according to full automatic supervision. The cloud manager can query the running status and running status of all machines, devices or components according to the cloud. In short, the cloud monitoring service project is to show customers a systematic monitoring and management platform for scalable virtual machines, network bandwidth and other resources. It enables customers to fully grasp the application status of resources in the cloud and the operation of business processes, and immediately respond to abnormal alerts to ensure the smooth operation of business processes. So, what is the purpose of the cloud monitoring service project?
1. CPU utilization technicians must master the utilization rate of each CPU in the system software, and monitor the CPU occupied by the current task of the virtual machine to ensure that the operation of daily tasks is not easily endangered. Set CPU threshold warning. When the CPU load is too large, an alarm will be given and displayed to the technician for solution;
2. The utilization rate of running memory is the same as that of CPU. Technicians must master the utilization rate of ECS memory, monitor the status of running memory occupied by the current process directory, and set threshold warnings. When the application is too high, technicians can immediately know;
3. The system file volume business system must use storage space to store and solve it. If the memory is insufficient, all service items may not work properly. Therefore, technicians should always monitor the spare capacity of storage space. Generally speaking, the indoor space utilization rate of documents should not exceed 85%. Once it exceeds 85%, the administrator should solve it immediately. On the management mode page, customers can also distinguish the size of the threshold according to the relative mark;
4. Characteristic analysis of computer hard disk Since hard disk is a common factor that endangers the characteristics of system software, technicians must collect the information content of disk performance input and output to distinguish ECS; Improvement index value of all system software characteristics
5. The resource record records the application data information of the characteristic resources of the network server, and then analyzes it to see if there is any abnormal change in the total traffic of the network port within a certain time range. If high or low, you must check the security of the database; First, I sorted out which scenarios can be monitored by the cloud monitoring service project. I look forward to helping you with the relevant content!