In this post, let’s discuss how to detect whether your application’s memory is under-allocated or not in a proactive manner. Studying the garbage collection behavior of the application will clearly indicate whether your application’s memory is under-allocated or over-allocated than the actual requirement.
All Posts by this author
This article goes into an outage the online application GCeasy experienced on October 11, and what the monitoring tool AWS CloudWatch showed. AWS CloudWatch clearly indicated two things: Problem and symptom, and the time frame since the problem started.
This post discusses what triggers this ‘kill Process or sacrifice child’ OutOfMemoryError and potential solutions to diagnose this problem. When processes in the host tend to consume more memory than the available memory in the RAM, Operating System based on its internal heuristics computations will kill certain processes.
Due to Garbage Collection enterprises are wasting millions of dollars even without even knowing that they are wasting it. The intent of this post is to bring visibility on how several millions of dollars are wasted due to garbage collection. Learn what Garbage is, how much enterprises are wasting, and why.
Garbage Collection is automatic on all modern platforms – Java, .NET, Golang, Python. So, do you have to worry about it? This article showcases and justifies the importance of Garbage Collection analysis and what you and your teams ought to know about it.
This article is part of a tutorial series by Ram Lakshmanan, in which you will learn how to simulate various performance problems. You will learn how to simulate a StackOverflow error, find out how to diagnose it, and most importantly, how to solve the problem.
For certain monitoring tools like yCrash, you need to pass your application process ID as input. In this article, Ram Lakshmanan will guide you through how to find your Java application process ID in both Linux/Unix and Windows operating systems – simply follow these steps.
In this chaos engineering tutorial from Ram Lakshmanan, you will learn how to simulate CPU consumption to spike up to 100% on a host (or container). CPU consumption will spike up whenever a thread goes on an infinite loop. Find out how to diagnose a CPU spike.
In this article, learn about the following process states in Unix/Linux: RUNNING & RUNNABLE, INTERRRUPTABLE_SLEEP, UNINTERRRUPTABLE_SLEEP, STOPPED, and ZOMBIE. Find out how to find them, how to kill the SLEEPING process, the ZOMBIE process, and more.
Using the simple Java application Buggy App, you can simulate various performance problems in your environment. This article will examine some use cases, how to download the application, and what common performance problems you can simulate through Buggy App.
What are the Garbage Collection (GC) log, Thread Dump, and Heap Dump in the Java Virtual Machine (JVM)? In this article let us try to understand these 3 critical artifacts, where to use them, how does it look, how to capture them, how to analyze them and their differences.
In this article, Ram Lakshmanan shares a few tips to tune G1 Garbage collector to obtain optimal performance that are simple, yet effective. Tune your application to get optimal performance with these tips, methods, and explanations. G1 has been the default GC algorithm since Java 9.
This article by Ram Lakshmanan examines an example of how to troubleshoot a CPU spike within a major trading application in North America. See what was causing the issue, how it was fixed, and what lessons you can take away.
There are way too many JVM arguments for anyone to digest and comprehend. The grand total might easily be more than 1,000 JVM arguments! In this article, we are highlighting seven important JVM arguments that you may find useful and what their positive impacts are.