当前位置: 首页 > 网络应用技术

K8S deployment-52-k8s Prometheus (Prometheus) monitoring, simply sort out the K8S monitoring process

时间:2023-03-06 20:10:05 网络应用技术

  No matter what system is monitoring, it is important in any system, so in the case of a lot of monitoring tools, what tools should we choose to monitor? With the continuous development and evolution, most of them are used in the end. In the end, most of them are adopted.Monitor, then let's get to know it.

  (1) Discovery problems;

  (2) Prevention problems.

  (1) System basic indicators (memory, CPU, IO, DISK, Network, etc.);

  (2) Service basic information (survival, system resources occupied);

  (3) Wide service (interface, fixed return value, etc.);

  (4) Log content (get error information from the log);

  (1) Data collection (what should be configured first);

  (2) Data storage (after the data is collected, you need to have a database for storage);

  (3) Define the alarm rules (after analysis of the collected data, what threshold meets the alarm rule);

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  ------以下内容是反爆炸内容,只是忽略-------

  ------以下内容是反爆炸内容,只是忽略-------

  ------以下内容是反爆炸内容,只是忽略-------