article thumbnail

Evaluating the Evaluation: A Benchmarking Checklist

Brendan Gregg

A co-worker introduced me to Craig Hanson and Pat Crain's performance mantras, which neatly summarize much of what we do in performance analysis and tuning. These have inspired me to summarize another performance activity: evaluating benchmark accuracy. If the benchmark reported 20k ops/sec, you should ask: why not 40k ops/sec?

article thumbnail

Crucial Redis Monitoring Metrics You Must Watch

Scalegrid

Key metrics like throughput, request latency, and memory utilization are essential for assessing Redis health, with tools like the MONITOR command and Redis-benchmark for latency and throughput analysis and MEMORY USAGE/STATS commands for evaluating memory. It depends upon your application workload and its business logic.

Metrics 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Evaluating the Evaluation: A Benchmarking Checklist

Brendan Gregg

A co-worker introduced me to Craig Hanson and Pat Crain's performance mantras, which neatly summarize much of what we do in performance analysis and tuning. These have inspired me to summarize another performance activity: evaluating benchmark accuracy. If the benchmark reported 20k ops/sec, you should ask: why not 40k ops/sec?

article thumbnail

How to Assess MySQL Performance

HammerDB

As database performance is heavily influenced by the performance of storage, network, memory, and processors, we must understand the upper limit of these key components. For the network, we can use Iperf to assess the network bandwidth between the client and the database server to ensure it will be enough to meet our peak requirement.

article thumbnail

Dynatrace Application Security detects and blocks attacks automatically in real-time

Dynatrace

WAFs protect the network perimeter and monitor, filter, or block HTTP traffic. A perfect OWASP benchmark score for injection attacks – 100% accuracy and zero false positives – impressively proves the precision of our approach. Compared to intrusion detection systems (IDS/IPS), WAFs are focused on the application traffic.

Traffic 228
article thumbnail

Automated incident management and remediation drive organizational resiliency

Dynatrace

What device are they using over what type of network? “We were able to … fine-tune our systems in a very performant way,” notes Hood. Insights gained by analyzing the data collected through Dynatrace include the following: User demographics. Where is a user coming from? Are our digital assets too large? Accessibility.

article thumbnail

What Adrian Did Next?—?Part 2?—?Sun Microsystems

Adrian Cockcroft

The early days at Sun Cambridge were special, I absorbed a lot about networking and the technical side of the role from my fellow systems engineer Martin Baines, and we were driving all over the region in cool company cars (I had a Citroen BX 16V) selling a really hot product.

Tuning 52