后台消息
vi /var/spool/mail/root
----- 进制转换 -----
printf命令 输出格式 输入参数
10 <- 16
printf %d’\n’ 0x6c76
16 <- 10
printf %x’\n’ 27766 #输出6c76
备注
1.10<-16时, 输入参数添加0x表示16进制
2.%x’\n’, 输出到控制台时, 添加换行符
----- 查看cpu -----
a.查看物理cpu个数:cat /proc/cpuinfo |grep “physical id”|sort |uniq|wc -l
b.查看逻辑cpu个数:cat /proc/cpuinfo |grep “processor”|wc -l
c.查看cpu多少核:cat /proc/cpuinfo
sar
mpstat
iostat
dstat
每秒cpu使用率情况获取
dstat -c
----- 最占cpu的进程获取 -----
dstat --top-cpu
----- 查看内存 -----
cat /proc/meminfo
----- 查看磁盘 -----
sata(150M/s左右)、sas(300M/s)、ssd(最快)
iostat
vmstat
----- 查看磁盘占用读写 -----
iostat -x 1 10
查看rkB/s和%util
iotop
类似 top
pidstat -d 1
uid pid kB/rd/s kB/wr/s kB_ccwr/s Command
查看pid kB/rd/s kB/wr/s Command
----- 查看线程 -----
top -Hp 27752
ps -Lp 27752 cu
ps -Lp 23491 cu|sort -nk 4
#按cpu降序
----- 查系统并发文件 -----
ulimit -n
cat/proc/sys/fs/file-max
cat /etc/security/limits.conf
查系统负载
top、uptime、w、cat /proc/loadavg
netstat -anp|grep 80 |wc -l && netstat -anp|grep 8283 |wc -l && netstat -anp|grep 8284 |wc -l && netstat -anp|grep 8285 |wc -l && netstat -anp|grep 8286 |wc -l
tail -s 10 -f prd.jv.gaoyong.co_nginx.log|grep -oP ‘request_time":\d{1,2}.\d{1,4}’
tail -s 10 -F prd.jv.gaoyong.co_nginx.log|grep -oP ‘request_time":\d{1,2}.\d{1,4}’
watch -n 1 “netstat -anp|grep 80 |wc -l && netstat -anp|grep 8283 |wc -l”
watch -n 1 “netstat -anp|grep 80 |wc -l && netstat -anp|grep 8283 |wc -l && netstat -anp|grep 8284 |wc -l && netstat -anp|grep 8285 |wc -l && netstat -anp|grep 8286 |wc -l”
“http_systemVersion”:“5.0.5”,“request_method”:“POST”,“sum”:1}
----- 查看tcp连接数量概况 -----
netstat -n | awk ‘/^tcp/ {++S[$NF]} END {for(a in S) print a, S[a]}’
查看10秒以上日志
grep -oP ‘request_time":\d{2}.\d{1,4}’ prd.jv.gaoyong.co_nginx.log
grep -oP ‘request_time":\d{2}.\d{1,4}’ prd.jv.gaoyong.co_nginx.log|wc -l
查看5秒以上日志
grep -oP ‘request_time"😦\d{2}|[56789]).\d{1,4}’ prd.jv.gaoyong.co_nginx.log
grep -oP ‘request_time"😦\d{2}|[56789]).\d{1,4}’ prd.jv.gaoyong.co_nginx.log|wc -l
查看5秒以上日志的url
grep -P ‘request_time"😦\d{2}|[56789]).\d{1,4}’ prd.jv.gaoyong.co_nginx.log | grep -oP ‘“request”:“[^”]*"’
查看超时5秒和10秒的
grep -oP ‘request_time"😦\d{2}|[56789]).\d{1,4}’ prd.jv.gaoyong.co_nginx.log|wc -l &&
grep -oP ‘request_time":\d{2}.\d{1,4}’ prd.jv.gaoyong.co_nginx.log|wc -l
grep -oP ‘request_time"😦\d{2}|[56789]).\d{1,4}’ prd.jv.gaoyong.co_nginx.log-20200628_15|wc -l && grep -oP ‘request_time":\d{2}.\d{1,4}’ prd.jv.gaoyong.co_nginx.log-20200628_15|wc -l
grep -oP ‘request_time"😦\d{2}|[56789]).\d{1,4}’ prd.jv.gaoyong.co_nginx.log-20200628_16|wc -l && grep -oP ‘request_time":\d{2}.\d{1,4}’ prd.jv.gaoyong.co_nginx.log-20200628_16|wc -l
?request_time":\d{1,2}.
?request_time":[1-9]{1,2}.
95.223
47.115.53.220
prd-java-script.monitor01 47.115.171.154 172.30.95.15 8g 4 脚本
gy-jv-app-prd-M-2p001 47.115.53.220 172.30.95.223 16g 4 应用
gy-jv-app-prd-M-1p002 120.79.167.164 172.30.25.95 16g 4 应用
gy-jv-app-prd-M-2p002 8.129.190.133 172.30.95.222 16g 4 应用
cd /gylm/servers/thirdparty-dubbo
rm-wz9plj737rqw9842arw.mysql.rds.aliyuncs.com
trace com.gylm.netty.handler.HttpServerNettyHandler doChannelRead -n 5
trace com.gylm.netty.handler.HttpServerNettyHandler doChannelRead ‘#cost>10000’ -n 3
trace com.gylm.netty.handler.HttpServerNettyHandler doInvokeRef ‘#cost>3000’ -n 3
trace com.gylm.order.service.impl.order.OrderDubboServiceImpl allOrderTabSwitch
trace com.gylm.thirdparty.service.impl.TeamOrderProfitsServiceImpl teamProfitsStatis ‘#cost>1000’ -n 5
----- 搜索文件里的关键字 -----
find ./servers-task/ -type f -iname “.Properties" -o -iname ".yml” -o -iname “*.xml”|xargs grep “jdbc”
-iname 是忽略大小写
-o 或者
----- 搜索文件并删除动作 -----
find /gylm/logs -type f -mtime +3 -exec rm {} ;