
å æ¥ã®JVM Operations Casual TalksãGCãã¡ã¢ãªç®¡çã«ã¤ãã¦ã¾ã¨ã¾ã£ãçºè¡¨ããã¢ãã¿ãªã³ã°ã®ææ³ãªã©ã®è©±ãèãã¦ããä¼ã§ããã å¾®å¦ã«æèãé«ã¾ã£ã¦ããã¨ããã§ãã¡ã¢ãªä½¿ç¨éãGCã®çµ±è¨æ å ±ãåå¾ãã¦ãGrowthForecastã§ã°ã©ããä½ã£ã¦ãããã¹ã¯ãªãããæ¸ãã¾ãããããPlaãããFluentdç³»ã®ãã¤ã§ã https://github.com/kazeburo/jstat2gf ãã®å ãã¿ã¯ JVM Operation Casual Talksã§ã®ã¢ãªã¹ããã®çºè¡¨ã«ã§ã¦ããã°ã©ãã§ãããããç°¡åã«ä½ãããã¼ã«ã«ãªãã¾ãã æJVMã®ããã»ã¹ã«å¯¾ãã¦å®è¡ããã¨ããããªæãã®ã°ã©ãã«ãªãã¾ããä¸ãããNEWé åããOLDé åããPermamenté åãã1ç§ãããã®Full GCã®åæ°ãã1ç§ãããã®Full GCã«ããã£ãæéãã¨ãªã£ã¦ãã¾ãã ãªããF
The Heartbleed issue is actually worse than it might immediately seem (and it seems pretty bad already). In case youâve been out of the loop, Heartbleed (CVE-2014-0160) is a vulnerability in OpenSSL that allows any remote user to dump some of the contents of the serverâs memory. And yes, thatâs really bad. The major concern is that a skilled user could craft an exploit that could dump the RSA priv
ãã®é ã¯GraphiteããInfluxDBãrrdtoolã«åã£ã¦ä»£ãããã¤ã¤ãããã§ãããããrrdtoolã®ã³ãã³ã弿°ã¯ããã£ã¦ã¿ãã¨æå¤ã¨æ¥½ãããã®ã§ã(人ã«ããã¾ãã)ããã®ããã "rrdtool 誰ãä¸çªãã£ãããã°ã©ãæãããé¸ææ¨©"â æ¡åç¿å¸ (@shoichimasuhara) April 4, 2014 ã¨ãæãã¤ãã§è¨ãã¾ããããã¨ããããåºã®å£ã¨ãããå座ã¨ããããã¨ãããããã£ã¦è¦ãã ããã£ã¦ã¿ããã¨æãã¾ã MRTG ã¨ããããæ¸ããªããããªæã MRTGã®ã°ã©ãã彷彿ã¨ããã¾ãããã³ãã³ãã©ã¤ã³ã¯ãã¡ã rrdtool graph shoichi.example.com_loadavg5_1.png \ --title "load average 5 of shoichi.example.com" \ --start end-1w --end now \
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}