{"id":11827,"date":"2020-06-19T14:22:35","date_gmt":"2020-06-19T18:22:35","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=11827"},"modified":"2024-07-02T05:14:12","modified_gmt":"2024-07-02T09:14:12","slug":"server-performance-monitoring","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/","title":{"rendered":"Server Performance Monitoring <br>is not just about CPU and Memory Monitoring"},"content":{"rendered":"<div class=\"inner_content\">\n<h2>Important KPIs and Server Monitoring Metrics<\/h2>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/server-performance-monitoring.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-11846\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/server-performance-monitoring.png\" alt=\"Server Monitoring is more than CPU and Memory monitoring.\" width=\"300\" height=\"200\" border=\"0\" \/><\/a><em>Updated Nov 2022: Additional links were added to this article and the content reviewed as up to date.\u00a0<\/em><\/p>\n<p>IT applications are vital for today\u2019s digital economy and for the business to succeed, these applications must be highly available and performing well. <a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\">Application performance<\/a> degradations can occur for several reasons. There may be code-level issues, database slowness, or network bandwidth constraints. IT applications run on servers and if the server is not sized correctly or is under-performing, application performance will degrade as well. Therefore, it is vitally important to monitor the <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/server-monitoring\">performance of all the servers<\/a> in your data center. In this blog, we will explore what the most important metrics for server monitoring are and why.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11845\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/server-cpu-monitoring.png\" alt=\"Server CPU monitoring \" width=\"100\" height=\"100\" border=\"0\" \/>Historically, the key factors affecting server performance have been utilization of server CPU and memory resources. If the CPU usage of a server is highly utilized (close to 100%) or there is high memory utilization (so there is very little free memory available on the server), the performance of applications running on that server will degrade. IT administrators should also be able to determine what are the top CPU and memory-consuming processes on the server so that they can troubleshoot and fix the resource usage issue quickly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11837\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/memory-monitoring.png\" alt=\"Server memory monitoring\" width=\"100\" height=\"100\" border=\"0\" \/>While CPU and memory monitoring are no doubt important, as server operating systems have evolved, it is important to track several other performance indicators about server operating systems that can be indicative of performance bottlenecks. This blog highlights 10 key performance indicators other than CPU and memory utilization that need to be monitored regarding server performance. These KPIs apply for any type of server, irrespective of the operating system it is running &#8211; whether Microsoft Windows, IBM AIX, HPUX, Linux variants, Oracle Solaris, etc.<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"10\">\n<tbody>\n<tr>\n<th class=\"problems-list-title\" valign=\"top\">\n<h2 style=\"font-size: 17px; margin: 0; padding: 0; font-weight: bold;\">10 Areas of Server Monitoring that are as important as CPU and Memory Monitoring<\/h2>\n<\/th>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<ol class=\"ol_style_line\">\n<li><a href=\"#question1\" rel=\"question1\">Server Uptime Monitoring<\/a><\/li>\n<li><a href=\"#question2\" rel=\"question2\">Disk Activity Monitoring<\/a><\/li>\n<li><a href=\"#question3\" rel=\"question3\">Page File Monitoring<\/a><\/li>\n<li><a href=\"#question4\" rel=\"question4\">Context Switches Monitoring<\/a><\/li>\n<li><a href=\"#question5\" rel=\"question5\">Time Synchronization Monitoring<\/a><\/li>\n<li><a href=\"#question6\" rel=\"question6\">Monitoring Usage of Handles<\/a><\/li>\n<li><a href=\"#question7\" rel=\"question7\">Process Activity Monitoring <\/a><\/li>\n<li><a href=\"#question8\" rel=\"question8\">Network Activity Monitoring <\/a><\/li>\n<li><a href=\"#question9\" rel=\"question9\">TCP Activity Monitoring<\/a><\/li>\n<li><a href=\"#question10\" rel=\"question10\">OS Log Monitoring <\/a><\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table id=\"question1\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>1<\/td>\n<td>\n<h2 class=\"table-title\">Monitoring Server Uptime<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11847\" style=\"margin-top: 0; margin-bottom: 0;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/server-monitoring-uptime.png\" alt=\"Server monitoring for uptime\" width=\"100\" height=\"100\" border=\"0\" \/>Uptime is the amount of time for which a system has been up and operational. Uptime can be measured since the system last booted. It can be measured during each polling cycle as well. Monitoring uptime is important because:<\/p>\n<ul>\n<li>This metric can alert you to a situation where the system is currently operational but may have gone down and rebooted recently (e.g., you may have inadvertently configured the system to auto-apply OS updates and the system may have rebooted in the middle of a workday, and thus impacting users).<\/li>\n<li>Many organizations have a practice of rebooting systems periodically. By monitoring system uptime, administrators can get notified if a system has failed to reboot during the configured reboot cycle.<\/li>\n<\/ul>\n<p>You may like to read an overview of Server Uptime Monitoring, see: <a href=\"https:\/\/www.eginnovations.com\/blog\/server-uptime-monitoring\/\">What is Server Uptime Monitoring? (eginnovations.com)<\/a>.<\/p>\n<table id=\"question2\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>2<\/td>\n<td>\n<h2  class=\"table-title\">Monitoring Disk Activity<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-11840\" style=\"margin-bottom: 0;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity-300x159.jpg\" alt=\"Dashboard for monitoring server disk activity \" width=\"300\" height=\"159\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity-300x159.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity-800x423.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity-310x164.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity-140x74.jpg 140w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-disk-actxivity.jpg 813w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>The disk subsystem of a server is almost as important as the compute and memory subsystems. Disk activity is the amount of time that a disk drive is actively processing requests. There are several key metrics about the disk subsystem that must be monitored:<\/p>\n<ul>\n<li><strong>Disk busy time<\/strong> indicates the percentage of time that the disk is active. If this value approaches 100%, expect requests that are accessing the disk to start queueing up. From a diagnosis perspective, it is important to know whether a disk is busy due to read or write operations.<\/li>\n<li><strong>IOPs<\/strong>: I\/O operations to the disk reflect the workload on the disk drive. Tracking the workload over time can help identify times when the disk subsystem is experiencing heavy load.<\/li>\n<li><strong>Disk read\/write times<\/strong>: This represents the time taken to read\/write blocks from the disk. The lower the value, better the performance.<\/li>\n<li><strong>Disk queue length<\/strong>: When a disk is not able to cope up with the requests it is receiving, additional requests are placed in the disk queue. For best performance, the disk queue length should be less than 100. This keeps the time spent by a request when it is waiting to be serviced to a minimum.<\/li>\n<li><strong>Split IOPs<\/strong>: Splitting of a file is often performed to better utilize disk space. This process often results in the disk having to spend more time and I\/O resources in servicing requests. This is because, splitting scatters a file across blocks, forcing the disk to perform multiple read\/write operations to service a request. This, in turn, significantly increases the disk I\/O activity on a server, thereby slowing down critical operations. By monitoring the amount of split I\/O on a disk, an administrator can <a href=\"https:\/\/www.eginnovations.com\/product\/proactive-monitoring-software-tools\">proactively capture a condition<\/a> where a disk is heavily fragmented.<\/li>\n<\/ul>\n<div class=\"tips-box\" style=\"display: inline-block; margin-top: 0!important; margin-bottom: 20px; padding: 10px 20px 10px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-11832\" style=\"margin-top: 30px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/disk-system-monitoring.png\" alt=\"Disk system monitoring\" width=\"75\" height=\"75\" border=\"0\" \/>While it is important to monitor how the disk subsystem is performing, for additional diagnosis, it is important to track disk activity at the file level. For example, to determine which files are seeing the highest amount of I\/O activity. Monitoring tools, such as <a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\">eG Enterprise<\/a> have the ability to detect and report on file level I\/O activity that can affect application performance.<\/div>\n<p>Monitoring the performance of the disk subsystem is extremely important for workloads that are heavily I\/O intensive. For example, database servers and file servers make extensive use of disk resources and hence, it is especially important to review disk subsystems performance metrics closely for such servers.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\/free-trial\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner.jpg\" alt=\"\" width=\"850\" height=\"165\" class=\"aligncenter size-full wp-image-30545\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner-300x58.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner-768x149.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner-800x155.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner-310x60.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/one-monitor-it-banner-140x27.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<table id=\"question3\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>3<\/td>\n<td>\n<h2  class=\"table-title\">Monitoring Page File Usage<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/page-file-usage.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-11844\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/page-file-usage-300x155.png\" alt=\"Monitoring page file usage \" width=\"300\" height=\"155\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/page-file-usage-300x155.png 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/page-file-usage-310x160.png 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/page-file-usage-140x72.png 140w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/page-file-usage.png 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>The paging file of an OS extends its memory capacity. Data that has not been used or accessed recently is stored in the paging file. Additionally, operations that exceed the limited RAM space of the OS are automatically sent to the paging file to be stored. Ideally, the paging file size should be 1.5 times the physical memory of the server at a minimum and up to 4 times the physical memory at the most to ensure system stability.<\/p>\n<p>It is important to monitor the paging file usage of the OS. If the usage of the paging file is close to 100%, it means that the paging file of the system is not sufficiently large.<\/p>\n<div class=\"tips-box\" style=\"display: inline-block; margin-top: 0!important; margin-bottom: 20px; padding: 10px 20px 10px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-11831\" style=\"margin-top: 20px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/caution.png\" alt=\"Caution image\" width=\"75\" height=\"75\" border=\"0\" \/>When the paging file usage is 90% or higher, the system and applications will not be able to function properly, and applications will experience slowness. You want your paging file to be large enough so that at any given time, only 50% to 75% of it is being used at the most although even lower numbers are preferred.<\/div>\n<table id=\"question4\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>4<\/td>\n<td>\n<h2  class=\"table-title\">Monitoring Context Switches<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>A context switch occurs when the kernel switches the processor from one process or thread to another. Context switching is generally computationally intensive. Excessive context switching takes up important CPU resources and can be one of the most expensive operations on an OS. Hence, servers must be configured and operated to avoid unnecessary context switching to the extent possible.<\/p>\n<p>A high number of context switches could be due to a lot of running busy processes and a few idle ones. If CPU usage is low and context switches are high, then you will need to identify and isolate the application that is causing the context switches. It is most likely that the increased context switch rate is due to an application bug.<\/p>\n<p>The figure below shows the context switches on a server tracked over a week. In this example, an application upgrade happened right around the time that the context switch rate of the server increased almost four-fold. If such a change were to happen on all the virtual machines (VMs) running on a hypervisor, the impact on the hypervisor\u2019s compute utilization would be dramatic. A server monitoring tool must be able to identify and alert administrators to such anomalies. In this example, the increased context switch rate was due to a bug in the application that was upgraded.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-context-switches.jpg\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11948\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-context-switches.jpg\" alt=\"Monitoring for context switches\" width=\"917\" height=\"578\" border=\"0\" \/><\/a><\/p>\n<p><center style=\"margin-top: -35px;\"><em>Sudden increase in context switches on a server indicates a problem<\/em><\/center><\/p>\n<table id=\"question5\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>5<\/td>\n<td>\n<h2  class=\"table-title\">Monitoring Time Synchronization<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11851\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/time-synchronization-monitoring.png\" alt=\"Server Monitoring for time synchronization\" width=\"100\" height=\"100\" border=\"0\" \/>When multiple systems on the same network share files or communicate with one another, different activities they perform may be time-bound or may need to be performed in sequence. System clocks are often used for this purpose and if the system clocks on different systems do not reflect the same time, the results could be disastrous.<\/p>\n<p>For example, if machines share files over a local network, their clocks should be synchronized to determine when exactly the files were modified. Inaccurate clocks could create version conflicts or cause data to be overwritten. In a Microsoft Windows domain, timestamps are used for resolving <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/active-directory-monitoring\">Active Directory<\/a> replication conflicts. Kerberos authentication is also heavily dependent on timestamps. Timestamps are used to protect against replay attacks\u2014where an authentication packet is intercepted on the network and then resent later to authenticate on the original sender&#8217;s behalf. When a Windows server receives a Kerberos authentication request, it compares the timestamp in the request to its local time. If the difference between the local time and the timestamp is too big, the authentication request is rejected and Kerberos authentication fails.\u00a0For Kerberos to work correctly, the clocks on all the systems in a Windows domain must be synchronized.<\/p>\n<div class=\"tips-box\" style=\"display: inline-block; margin-top: 0!important; margin-bottom: 20px; padding: 10px 20px 10px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-11830\" style=\"margin-top: 20px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/bell.png\" alt=\"Bell image\" width=\"96\" height=\"96\" border=\"0\" \/> Monitoring tools must monitor clock offsets of a system with respect to a reference clock, e.g., an Active Directory server\u2019s clock. While small offsets are often acceptable, if there is a large offset between any system\u2019s clock and the reference clock, administrators need to be alerted to such abnormalities.<\/div>\n<table id=\"question6\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>6<\/td>\n<td>\n<h2 class=\"table-title\">Monitoring Usage of Handles<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>We tend to think of CPU, memory, and disk as the main resources on a server. There are other forms of resources too \u2013 file descriptors, network sockets, processes, jobs, etc. All these resources are finite as well \u2013 there are only a limited number of files that can be open at the same time on a server. The term handle is used to refer to a resource that applications reference.<\/p>\n<p>Applications are expected to request and receive resources, to use them, and then return them to the OS. A handle leak occurs when an application does not return the handle after use to the OS. One cause of a handle leak is a program error \u2013 a developer opening a file object but forgetting to close it. Handle leaks can also be caused by exceptions. Exception blocks may not have the cleanup routines that the main block of code has included.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/handles-usage.jpg\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11924\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/handles-usage.jpg\" alt=\"Handles Usage\" width=\"640\" height=\"54\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/handles-usage.jpg 640w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/handles-usage-300x25.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/handles-usage-310x26.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/handles-usage-140x12.jpg 140w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Frequent\/repeated occurrences of handle leaks over an extended period imply that many handles may be marked in-use and thus unavailable. This can cause the server performance to degrade or may even cause it to crash.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11836\" style=\"margin-top: 15px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/magnifying-glass.png\" alt=\"Magnifying Glass image\" width=\"100\" height=\"100\" border=\"0\" \/>To avoid such disasters, administrators must track handle usage over time. If the count of open handles increases consistently, it is indicative of a handle leak. Administrators may want to dig deeper and even identify the processes with the maximum number of open handles. Killing such processes or patching the programs that spawned such processes can help reduce the leak.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/ebooks\/eg-enterprise-buyer-experience-report-application-performance-management\"><img decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/eg-software2023-reviews-banner.jpg\" alt=\"\" class=\"aligncenter size-full wp-image-30546\" \/><\/a><\/p>\n<table id=\"question7\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>7<\/td>\n<td>\n<h2  class=\"table-title\">Monitoring Process Activity<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Processes running on a server need to be monitored. A silent killer is a leakage of processes. For example, application starts spawning new processes regularly without exiting previously started ones. This can result in 1000s of processes running on the server. Multi-tasking across 1000s of processes can severely reduce the performance of the server. Hence, it is important to track the current process count on a server.<\/p>\n<p>Resource usage per process should be monitored as well. This often helps with diagnosis: when a server is using memory excessively, which are the processes responsible for the memory leak?<\/p>\n<table id=\"question8\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>8<\/td>\n<td>\n<h2 class=\"table-title\">Monitoring Network Traffic<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11843\" style=\"margin-top: -10px; margin-bottom: 0;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/network-activity-monitoring.png\" alt=\"Network activity monitoring\" width=\"100\" height=\"100\" border=\"0\" \/>Server performance can also be impacted by a malfunctioning network card. Track the number of errors seen on each network interface card of the server to determine the ones that are seeing excessive packet drops.<\/p>\n<p>At the same time, it is important to track the bandwidth used on each interface. If the bandwidth usage is close to the maximum speed of the network interface, this can indicate a bottleneck that affects performance.<\/p>\n<p>Also compare the bandwidth used on each interface and make sure that network traffic is being routed through the primary interface you expect to use. Excessive traffic over a backup interface may indicate a routing table issue on the server that must be resolved.<\/p>\n<table id=\"question9\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>9<\/td>\n<td>\n<h2 class=\"table-title\">Monitoring TCP Activity<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/tcp-activity-monintoring.png\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-11848\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/tcp-activity-monintoring.png\" alt=\"Process for monitoring TCP activity\" width=\"200\" height=\"250\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/tcp-activity-monintoring.png 200w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/tcp-activity-monintoring-140x175.png 140w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a>Most common enterprise applications are connection-oriented, and TCP is the transport protocol that they use. Therefore, performance of the TCP layer can affect application performance.<\/p>\n<p>HTTP, SMTP, SQL and other types of connections use TCP underneath. So, when TCP performance degrades, so does the performance of applications that use them.<\/p>\n<p>To track TCP performance, it is important to monitor the following metrics:<\/p>\n<ul>\n<li>The <strong>rate of connections<\/strong> to and from the server. Not only does this indicate the workload on the server, it may also be indicative of times when the server is under attack.<\/li>\n<li><strong>Connection drops<\/strong> on the server should be tracked. Excessive connection drops may be a cause for concern.<\/li>\n<li>Probably, the most important performance metric to track for TCP is the <strong>percentage of retransmissions<\/strong> For good TCP performance, retransmissions should be at a minimum. A value up to 5% may be acceptable, but any number over 10% can significantly impact application latency and throughput. Retransmissions occur when a segment is sent by the server, but an acknowledgement is not received by the server from the client. In that case, the server has to retransmit the segment after a timeout period.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-tcp-transmissions.png\" data-rel=\"lightbox-image-6\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-11842\" style=\"margin-bottom: 0;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-tcp-transmissions-282x300.png\" alt=\"Usual process for monitoring TCP transmissions\" width=\"282\" height=\"300\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-tcp-transmissions-282x300.png 282w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-tcp-transmissions-310x329.png 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-tcp-transmissions-140x149.png 140w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-tcp-transmissions.png 320w\" sizes=\"auto, (max-width: 282px) 100vw, 282px\" \/><\/a><\/p>\n<p><center style=\"margin-top: -20px;\"><em>Retransmissions over a TCP connection<\/em><\/center>Common reasons for retransmissions include network congestion where packets are dropped (either a TCP segment is lost on its way to the destination, or the associated ACK is lost on the way back to the sender), tight router QoS rules that give preferential treatment to certain protocols, and TCP segments that arrive out of order at their destination, usually because the order of segments became mixed up on the way from the sender to the destination.<\/p>\n<div class=\"tips-box\" style=\"display: inline-block; margin-top: 0!important; margin-bottom: 20px; padding: 10px 20px 10px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-11849\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/thinking.png\" alt=\"Man thinking\" width=\"100\" height=\"100\" border=\"0\" \/>Retransmissions are not just harmful because they involve timeouts and retransmission. TCP uses a windowing mechanism. The window represents the number of segments sent that have yet to be acknowledged. During normal transmission, the window size doubles as the sender receives acknowledgements. But when a retransmission happens, the window size contracts by half. Repeated retransmissions can result in a severe reduction in throughput.<\/div>\n<p>Compare retransmissions across groups of servers. If multiple servers are experiencing high retransmissions, this may be a signal that the issue is network related. Otherwise, the issue may be specific to a server and its configuration, e.g., a faulty NIC card.<\/p>\n<table id=\"question10\" class=\"new_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>10<\/td>\n<td>\n<h2 class=\"table-title\">Monitoring OS Log Files<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-11835\" alt=\"log-img\" style=\"margin-top: -5px; margin-bottom: 0;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/log-image.png\" width=\"90\" height=\"90\" border=\"0\" \/>It is not possible to fully instrument every component of a server operating system. Details of any faults experienced, crashes seen, and other types of abnormalities are logged by the operating systems in logs.<\/p>\n<p>Microsoft Windows has System, Security, and Application log files. Events of different types and from different sources are logged here. Events are marked as being verbose, informational, warning, or critical.<\/p>\n<p>On Unix servers too, system log and cron log files stored in the \/var\/log directory provide insights into abnormal events that have occurred on the server. Syslog is another common form of logging operating system anomalies.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-library-large.jpg\" data-rel=\"lightbox-image-7\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-11841\" style=\"margin-top: -0px; margin-bottom: 0;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/monitoring-library-300x172.jpg\" alt=\"Monitoring library screen showing server status\" width=\"300\" height=\"172\" border=\"0\" \/><\/a>It is not possible for administrators to manually analyze logs from 100s of servers to identify issues. Periodic monitoring, analysis and alerting of log events can bring abnormalities on the server to light. Examples of problems that can be detected by using log monitoring include:<\/p>\n<ul>\n<li>Repeated crashes of an application or a faulty library<\/li>\n<li>Failed logons to a server<\/li>\n<li>Disk read failures due to a faulty disk drive<\/li>\n<li>Failure to apply group policies<\/li>\n<li>DNS name resolution failures<\/li>\n<li>Printing issues<\/li>\n<li>Security-related errors<\/li>\n<li>Time synchronization issues<\/li>\n<li>Patch update failures<\/li>\n<\/ul>\n<div class=\"containers mb-4\" style=\"clear:both\">\n \t<div class=\"fixed-free-trial-div mb-3\" id=\"fixedsectioninfo_blog_btn\">\n \t\n \t<style>.containers_hide_row,.all_blogs_bottom{\n \tdisplay:none;\n   \n}\t<\/style>\n                <div class=\"box-style container row pt-4 pb-4  animatedParent animateOnce\" data-sequence=\"100\" style=\"border-bottom: 1px solid #ddd;border-top: 1px solid #ddd;background: #4b4b4b;padding: 15px 15px 0 15px;border-radius: 12px;\">\n                \n                <div class=\"text-center animated fadeIn go\"> \n                <p class=\"text-center mb-4\" style=\"    color: #fff;\">\n\neG Enterprise is an Observability solution for Modern IT. Monitor digital workspaces, <br\/>web applications, SaaS services, cloud and containers from a single pane of glass.\n<\/p>\n                <\/div>\n                    <div class=\"text-center pb-1 animated fadeIn go\" data-id=\"8\">\n                        <a class=\"border-btnhead-eg\"  href=\"https:\/\/www.eginnovations.com\/it-monitoring\/free-trial\"> <span style=\"font-family: GraphikMedium!important;color: #fff;\">Free Trial<\/span><\/a>\n                        <a href=\"https:\/\/www.eginnovations.com\/product\" class=\" border-btnhead-eg\" style=\"width:230px;   \"> <svg width=\"24\" height=\"24\" style=\"margin-top:-3px\" version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 26.5 26.5\" style=\"enable-background:new 0 0 26.5 26.5;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st2{fill:#fff !important;stroke:#fff !important;stroke-miterlimit:10;}\n\t\n\t\t.border-btnhead:hover .st2 {\n  fill: #ffffff !important;\n  stroke: #ffffff;\n}\n<\/style>\n<g>\n\t<g>\n\t\t<path class=\"st2\" d=\"M13.3,25.8c-6.9,0-12.5-5.6-12.5-12.5S6.4,0.8,13.3,0.8s12.5,5.6,12.5,12.5S20.2,25.8,13.3,25.8z M13.3,1.8\n\t\t\tC6.9,1.8,1.8,6.9,1.8,13.3S7,24.8,13.3,24.8s11.5-5.2,11.5-11.5S19.6,1.8,13.3,1.8z M11.2,18.1c-0.2,0-0.4-0.1-0.6-0.2\n\t\t\tc-0.3-0.2-0.6-0.6-0.6-1V9.7c0-0.4,0.2-0.8,0.6-1c0.3-0.2,0.8-0.2,1.2,0l6.2,3.6c0.3,0.2,0.6,0.6,0.6,1s-0.2,0.8-0.6,1l-6.2,3.6\n\t\t\tC11.6,18,11.4,18.1,11.2,18.1z\"\/>\n\t<\/g>\n<\/g>\n<\/svg> <span style=\"font-family: GraphikMedium!important;color: #fff;\">&nbsp;See the platform<\/span><\/a>\n                    <\/div>\n                <\/div>\n                \n                 <\/div>\n            <\/div>\n<h2>Conclusion<\/h2>\n<p>In conclusion, it should be clear from the above discussion that server performance monitoring must focus on much more than just CPU, memory, and disk space utilization. The basic principles discussed in this blog apply for any server operating system. Having a comprehensive server monitoring and management strategy is the first and foremost step to ensure that your IT infrastructure and the applications it supports are working well.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Important KPIs and Server Monitoring Metrics Updated Nov 2022: Additional links were added to this article and the content reviewed as up to date.\u00a0 IT applications are vital for today\u2019s digital economy and for the business to succeed, these applications must be highly available and performing well. Application performance degradations can occur for several reasons. [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":11912,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[409,366,383,388,382,368],"tags":[664,1117,1127,1128,1134,1118,665,662,1123,539,1119,1125,1124,1126,1120,699,1131,449,1130,1121,1116,380,1132,1534,234,1533,452,235,1129,1136,1135,451,1535,1122,1133,1063,294,700],"class_list":["post-11827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eg-enterprise","category-end-to-end-monitoring-e2e","category-it-infrastructure-monitoring","category-managed-service-providers-msps","category-unified-monitoring","category-vmware-monitoring","tag-aix-monitoring","tag-cpu-utilization","tag-disk-activity","tag-disk-busy","tag-handle-leak","tag-high-cpu","tag-hpux-monitoring","tag-linux-monitoring","tag-log-monitoring","tag-logicmonitor","tag-memory-leak-detection","tag-monitor-logs","tag-monitor-os-logs","tag-monitor-uptime","tag-monitoring-handles","tag-nagios","tag-os-hangs","tag-os-monitoring","tag-os-slow","tag-page-file-monitoring","tag-page-file-usage","tag-scom","tag-server-hang","tag-server-monitor","tag-server-monitoring-2","tag-server-monitoring-tools","tag-server-performance","tag-server-performance-monitoring","tag-server-slow","tag-solarwinds","tag-splunk","tag-system-management","tag-system-monitoring-tools","tag-tcp-monitoring","tag-time-synchronization","tag-virtual-machine","tag-windows-monitoring","tag-zabbix"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Server Monitoring \u2013 KPIs &amp; Metrics | eG Innovations<\/title>\n<meta name=\"description\" content=\"Server monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Server Performance Monitoring \u2013 KPIs &amp; Metrics | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"Server performance monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs and monitoring metrics\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T18:22:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-02T09:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/social-banner.jpg\" \/>\n<meta name=\"author\" content=\"Priya Balasubramaniam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Server Performance Monitoring \u2013 KPIs &amp; Metrics | eG Innovations\" \/>\n<meta name=\"twitter:description\" content=\"Server performance monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs and monitoring metrics\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/social-banner.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Priya Balasubramaniam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Server Monitoring \u2013 KPIs & Metrics | eG Innovations","description":"Server monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Server Performance Monitoring \u2013 KPIs & Metrics | eG Innovations","og_description":"Server performance monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs and monitoring metrics","og_url":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2020-06-19T18:22:35+00:00","article_modified_time":"2024-07-02T09:14:12+00:00","og_image":[{"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/social-banner.jpg","type":"","width":"","height":""}],"author":"Priya Balasubramaniam","twitter_card":"summary_large_image","twitter_title":"Server Performance Monitoring \u2013 KPIs & Metrics | eG Innovations","twitter_description":"Server performance monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs and monitoring metrics","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/social-banner.jpg","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Priya Balasubramaniam","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/"},"author":{"name":"Priya Balasubramaniam","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/2f03ec1faec73e471fd1e4064d9336cd"},"headline":"Server Performance Monitoring is not just about CPU and Memory Monitoring","datePublished":"2020-06-19T18:22:35+00:00","dateModified":"2024-07-02T09:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/"},"wordCount":2670,"commentCount":0,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/thumbnail21.jpg","keywords":["AIX monitoring","CPU utilization","disk activity","disk busy","handle leak","high CPU","HPUX monitoring","Linux monitoring","Log monitoring","LogicMonitor","memory leak detection","monitor logs","monitor OS logs","monitor uptime","monitoring handles","Nagios","OS hangs","OS Monitoring","OS slow","page file monitoring","page file usage","SCOM","server hang","server monitor","server monitoring","server monitoring tools","server performance","server performance monitoring","server slow","solarwinds","splunk","system management","system monitoring tools","tcp monitoring","time synchronization","virtual machine","windows monitoring","Zabbix"],"articleSection":["eG Enterprise","End-to-End Monitoring (E2E)","IT Infrastructure Monitoring","Managed Service Providers (MSPs)","Unified Monitoring","VMware Monitoring"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/","url":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/","name":"Server Monitoring \u2013 KPIs & Metrics | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/thumbnail21.jpg","datePublished":"2020-06-19T18:22:35+00:00","dateModified":"2024-07-02T09:14:12+00:00","description":"Server monitoring in your data center is critical to ensuring top performance of key applications. Learn these important KPIs.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/thumbnail21.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/06\/thumbnail21.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/server-performance-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Server Performance Monitoring is not just about CPU and Memory Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/2f03ec1faec73e471fd1e4064d9336cd","name":"Priya Balasubramaniam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9a8c10eba39c603ea64258caa20ef6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9a8c10eba39c603ea64258caa20ef6b?s=96&d=mm&r=g","caption":"Priya Balasubramaniam"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/priyavb\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/11827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=11827"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/11827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/11912"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=11827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=11827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=11827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}