-
Notifications
You must be signed in to change notification settings - Fork 8k
Logs
Eric Zhao edited this page Jul 4, 2019
·
11 revisions
All interception logs will be recorded in ${user_home}/logs/csp/sentinel-block.log
:
2014-06-20 16:35:10|1|sayHello(java.lang.String,long),FlowException,default,origin|61,0
2014-06-20 16:35:11|1|sayHello(java.lang.String,long),FlowException,default,origin|1,0
-
2014-06-20 16:35:10
: timestamp -
1
: index -
sayHello(java.lang.String,long)
: resource name -
XXXException
,type of rules to take effect.FlowException
for flow control,DegradeException
for circuit breaking,SystemException
for system adaptive protection,ParamFlowException
for parameter flow control -
default
for callers defined in rules -
origin
,for the real caller of the request -
61,0
,61 for block times; 0 has no meaning, which can be ignored
Metrics of resources are recorded in {user_home}/logs/csp/{app_name}_{pid}_metrics.log
:
1529573107000|2018-06-21 17:25:07|sayHello(java.lang.String,long)|10|3601|10|0|2
-
1529573107000
: the timestamp of this record; -
2018-06-21 17:25:07
: formatted date/time; -
sayHello(java.lang.String,long)
: resource name; -
10
: passed request count (passQps
); -
3601
: blocked count; -
10
: complete count (successfully handled by Sentinel); -
0
: business exception count; -
2
: the average response time (ms)
Other info is recorded in ${user_home}/logs/csp/sentinel-record.log.xxx
.
-
文档
-
Documents
- Read Me
- Introduction
- How to Use
- How it Works
- Flow Control
- Parameter Flow Control
- Cluster Flow Control
- API Gateway Flow Control
- Circuit Breaking
- Adaptive System Protection
- Metrics
- General Configuration
- Dynamic Rule Configuration
- Dashboard
- Integrations with open-source frameworks
- Contribution Guideline