This is an automated email from the ASF dual-hosted git repository.

liujun pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/dubbo-website.git


The following commit(s) were added to refs/heads/master by this push:
     new 59c9769  Insert space after dot robustness.md (#1006)
59c9769 is described below

commit 59c9769bab2847f7d2b05829a78f36f1d0f14088
Author: duyetpt <[email protected]>
AuthorDate: Sat Dec 11 16:02:43 2021 +0700

    Insert space after dot robustness.md (#1006)
---
 content/en/docs/v2.7/dev/principals/robustness.md | 34 +++++++++++------------
 1 file changed, 17 insertions(+), 17 deletions(-)

diff --git a/content/en/docs/v2.7/dev/principals/robustness.md 
b/content/en/docs/v2.7/dev/principals/robustness.md
index 734223b..bbd3422 100644
--- a/content/en/docs/v2.7/dev/principals/robustness.md
+++ b/content/en/docs/v2.7/dev/principals/robustness.md
@@ -15,7 +15,7 @@ Here are some Dubbo principle and method of use.
 
 ## The log
 
-Logging is one of the most commonly used way to find, discover problems.Log 
quality is often neglected, there is no log on using expressly agreed 
upon.Attaches great importance to the use of the Log, and improve the 
concentration of the Log information.Log too much, too much chaos, could lead 
to useful information.
+Logging is one of the most commonly used way to find, discover problems. Log 
quality is often neglected, there is no log on using expressly agreed upon. 
Attaches great importance to the use of the Log, and improve the concentration 
of the Log information. Log too much, too much chaos, could lead to useful 
information.
 
 To effectively use this tool to note:
 
@@ -24,38 +24,38 @@ To effectively use this tool to note:
 * WARN that can restore the problem without human intervention.
 * The ERROR says requires human intervention.
 
-With such agreement, the regulatory system found in the ERROR log file of the 
string will call the police, and to minimize the occurrence.Excessive alarm can 
let a person tired, make the person lose vigilance in alarm, make the ERROR 
log.Along with artificial, regularly check the WARN level information to assess 
the degree of "subhealth" system.
+With such agreement, the regulatory system found in the ERROR log file of the 
string will call the police, and to minimize the occurrence. Excessive alarm 
can let a person tired, make the person lose vigilance in alarm, make the ERROR 
log. Along with artificial, regularly check the WARN level information to 
assess the degree of "subhealth" system.
 
 ### In the log, as much as possible to collect key information
 
 What is the key information?
 
-* Site information at the time of the problem, namely the screening questions 
to use information.Such as service invocation fails, to give the use of Dubbo 
version, the service provider's IP, which is used in the registry;Which service 
invocation, which method and so on.This information if not given, then later 
artificial collection, problem after the site may have already can't recover, 
increase the difficulty of the problem.
-* If possible, the cause of the problem and the solution is given.This makes 
maintenance and problem solving becomes simple, rather than seeking savvy 
(often the implementer) for help.
+* Site information at the time of the problem, namely the screening questions 
to use information. Such as service invocation fails, to give the use of Dubbo 
version, the service provider's IP, which is used in the registry; Which 
service invocation, which method and so on. This information if not given, then 
later artificial collection, problem after the site may have already can't 
recover, increase the difficulty of the problem.
+* If possible, the cause of the problem and the solution is given. This makes 
maintenance and problem solving becomes simple, rather than seeking savvy 
(often the implementer) for help.
 
 ### Don't duplicate records many times the same or a class of problems
 
-The same or a kind of abnormal log continuous there dozens of times, still can 
often see.The human eye is easy to miss under the different important log 
information.Try to avoid this situation.Will appear in the foreseeable, it is 
necessary to add some logic to avoid.
+The same or a kind of abnormal log continuous there dozens of times, still can 
often see.The human eye is easy to miss under the different important log 
information. Try to avoid this situation. Will appear in the foreseeable, it is 
necessary to add some logic to avoid.
 
-As a symbol for a question, a problem after log Settings after sign and avoid 
a repeat of the log.The problem clear sign after recovery.
+As a symbol for a question, a problem after log Settings after sign and avoid 
a repeat of the log. The problem clear sign after recovery.
 
 Although a bit troublesome, but do ensure log information concentration, the 
more effective for monitoring.
 
 ## Limit set
 
-Resources are limited, CPU, memory, IO, etc.Don't cry because it is outside of 
the request, the data is not limited.
+Resources are limited, CPU, memory, IO, etc. Don't cry because it is outside 
of the request, the data is not limited.
 
 ### The size of the thread pool (ExectorService) and saturated strategy
 
-The Server end ExectorService set limit for processing requests.Use limited 
queue ExecutorService task waiting queue, avoid resource depletion.When the 
task waiting queue saturated, choose a suitable saturated strategy.This ensures 
smooth degradation.
+The Server end ExectorService set limit for processing requests. Use limited 
queue ExecutorService task waiting queue, avoid resource depletion. When the 
task waiting queue saturated, choose a suitable saturated strategy. This 
ensures smooth degradation.
 
 In Dubbo, saturated strategy is to discard data, waiting for the result is 
only a request timeout.
 
-Saturated, the specification has reached the maximum load, the service 
provider to logging in the operation of the saturated strategy of the problem, 
in order to monitor warnings.Remember to be careful not to repeat many times 
record well.(note that the default saturation strategy will not have these 
additional operation.)According to the frequency of the alarm, has decided to 
increase adjustment, etc., avoid system problems are ignored.
+Saturated, the specification has reached the maximum load, the service 
provider to logging in the operation of the saturated strategy of the problem, 
in order to monitor warnings. Remember to be careful not to repeat many times 
record well. (note that the default saturation strategy will not have these 
additional operation.) According to the frequency of the alarm, has decided to 
increase adjustment, etc., avoid system problems are ignored.
 
 ### The collection capacity
 
-If to ensure element is controlled on the collection and is small enough, then 
you can rest assured use.This is most of the situation.If can't guarantee 
anything, use a bounded set.When reach the boundary, choose a suitable strategy.
+If to ensure element is controlled on the collection and is small enough, then 
you can rest assured use.This is most of the situation. If can't guarantee 
anything, use a bounded set. When reach the boundary, choose a suitable 
strategy.
 
 ## Fault tolerant - retry - recovery
 
@@ -63,27 +63,27 @@ High availability components to tolerate its dependence on 
the failure of the co
 
 ### Dubbo service registry
 
-The service registry using the database to store the information service 
providers and consumers.Different registry registry cluster through the 
database to synchronize data, to perceive other providers on the 
registry.Registry would ensure a provider and consumer data in memory, the 
database is unavailable, independent of the normal operation of foreign 
registry, just can't get other registry data.When the database recovery, retry 
logic will modify memory write data back to the database [...]
+The service registry using the database to store the information service 
providers and consumers. Different registry registry cluster through the 
database to synchronize data, to perceive other providers on the registry. 
Registry would ensure a provider and consumer data in memory, the database is 
unavailable, independent of the normal operation of foreign registry, just 
can't get other registry data. When the database recovery, retry logic will 
modify memory write data back to the datab [...]
 
 ### Service consumers
 
-After the message service provider list from the registry, will save the 
provider list to memory and disk file.Consumers can function properly after 
this registry is down, even in the registry during outage restart 
consumers.Consumers started, find the registry is not available, will read the 
list stored in the disk file provider.Retry logic to ensure the registry after 
recovery, update the information.
+After the message service provider list from the registry, will save the 
provider list to memory and disk file. Consumers can function properly after 
this registry is down, even in the registry during outage restart consumers. 
Consumers started, find the registry is not available, will read the list 
stored in the disk file provider. Retry logic to ensure the registry after 
recovery, update the information.
 
 ## Retry delay strategy
 
-On a bit of the subproblem.Dubbo encountered two related scenario.
+On a bit of the subproblem. Dubbo encountered two related scenario.
 
 ### On the database lock
 
-Registration center will regularly update the database of a record timestamp, 
such cluster other registry perceive it is alive.Overdue registry and its 
associated data will be cleared.Database is normal, the mechanism as well.But 
the database load is high, its every action is slow.This occurs:
+Registration center will regularly update the database of a record timestamp, 
such cluster other registry perceive it is alive. Overdue registry and its 
associated data will be cleared. Database is normal, the mechanism as well. But 
the database load is high, its every action is slow. This occurs:
 
-A registry that B expired, delete B data.B find their data, to write their own 
data repeatedly.These repeated operation and increase load the database, 
deterioration.
+A registry that B expired, delete B data. B find their data, to write their 
own data repeatedly. These repeated operation and increase load the database, 
deterioration.
 
 Use the following logic:
 
-When data is deleted B found themselves fail (write), choose to wait for this 
period of time and try again.Can choose to retry time exponentially, such as 
first class 1 minute, the second for 10 minutes, 100 minutes for the third time.
+When data is deleted B found themselves fail (write), choose to wait for this 
period of time and try again. Can choose to retry time exponentially, such as 
first class 1 minute, the second for 10 minutes, 100 minutes for the third time.
 This decrease after operation, ensure database can cooling Down (Cool Down).
 
 ### The Client reconnection registry
 
-When a registry downtime, other Client will receive events at the same time, 
and to reconnect to another registry.The Client number is relatively more, will 
be the impact of the registry.Avoid method can be a Client reconnection random 
delay for 3 minutes, when the reconnection spread out.
+When a registry downtime, other Client will receive events at the same time, 
and to reconnect to another registry. The Client number is relatively more, 
will be the impact of the registry. Avoid method can be a Client reconnection 
random delay for 3 minutes, when the reconnection spread out.

Reply via email to