Kubernetes资源监控与告警:从指标到行动的完整闭环

news2026/3/31 1:49:15
Kubernetes资源监控与告警从指标到行动的完整闭环没有监控的集群就是黑盒没有告警的监控就是摆设。监控体系架构一个完整的K8s监控体系包含三个层次┌─────────────────────────────────────────┐ │ 应用层监控 (APM) │ │ - 业务指标、链路追踪、日志 │ ├─────────────────────────────────────────┤ │ 中间件层监控 │ │ - 数据库、缓存、消息队列 │ ├─────────────────────────────────────────┤ │ Kubernetes层监控 │ │ - Pod、Node、Control Plane │ ├─────────────────────────────────────────┤ │ 基础设施层监控 │ │ - 服务器、网络、存储 │ └─────────────────────────────────────────┘Prometheus监控栈部署1. 完整监控架构# prometheus-stack.yaml apiVersion: v1 kind: Namespace metadata: name: monitoring --- # Prometheus配置 apiVersion: v1 kind: ConfigMap metadata: name: prometheus-config namespace: monitoring data: prometheus.yml: | global: scrape_interval: 15s evaluation_interval: 15s external_labels: cluster: production replica: {{.ExternalURL}} rule_files: - /etc/prometheus/rules/*.yml alerting: alertmanagers: - static_configs: - targets: [alertmanager:9093] scrape_configs: # Kubernetes API Server - job_name: kubernetes-apiservers kubernetes_sd_configs: - role: endpoints scheme: https tls_config: ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token relabel_configs: - source_labels: [__meta_kubernetes_namespace, __meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] action: keep regex: default;kubernetes;https # Kubelet - job_name: kubernetes-nodes kubernetes_sd_configs: - role: node scheme: https tls_config: ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt insecure_skip_verify: true bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token relabel_configs: - action: labelmap regex: __meta_kubernetes_node_label_(.) # Pod监控 - job_name: kubernetes-pods kubernetes_sd_configs: - role: pod relabel_configs: - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] action: keep regex: true - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] action: replace target_label: __metrics_path__ regex: (.) - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] action: replace regex: ([^:])(?::\d)?;(\d) replacement: $1:$2 target_label: __address__ - action: labelmap regex: __meta_kubernetes_pod_label_(.) - source_labels: [__meta_kubernetes_namespace] action: replace target_label: namespace - source_labels: [__meta_kubernetes_pod_name] action: replace target_label: pod # Service监控 - job_name: kubernetes-services kubernetes_sd_configs: - role: service metrics_path: /probe params: module: [http_2xx] relabel_configs: - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_probe] action: keep regex: true - source_labels: [__address__] target_label: __param_target - target_label: __address__ replacement: blackbox-exporter:9115 - source_labels: [__param_target] target_label: instance - action: labelmap regex: __meta_kubernetes_service_label_(.) - source_labels: [__meta_kubernetes_namespace] target_label: namespace - source_labels: [__meta_kubernetes_service_name] target_label: service # cAdvisor - job_name: kubernetes-cadvisor kubernetes_sd_configs: - role: node scheme: https tls_config: ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt insecure_skip_verify: true bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token metrics_path: /metrics/cadvisor relabel_configs: - action: labelmap regex: __meta_kubernetes_node_label_(.) --- # Prometheus Deployment apiVersion: apps/v1 kind: Deployment metadata: name: prometheus namespace: monitoring spec: replicas: 1 selector: matchLabels: app: prometheus template: metadata: labels: app: prometheus spec: serviceAccountName: prometheus containers: - name: prometheus image: prom/prometheus:v2.47.0 args: - --config.file/etc/prometheus/prometheus.yml - --storage.tsdb.path/prometheus - --storage.tsdb.retention.time15d - --web.console.libraries/usr/share/prometheus/console_libraries - --web.console.templates/usr/share/prometheus/consoles - --web.enable-lifecycle - --web.enable-admin-api ports: - containerPort: 9090 name: web volumeMounts: - name: config mountPath: /etc/prometheus - name: storage mountPath: /prometheus resources: requests: cpu: 500m memory: 2Gi limits: cpu: 2000m memory: 8Gi volumes: - name: config configMap: name: prometheus-config - name: storage persistentVolumeClaim: claimName: prometheus-storage2. 记录规则优化# recording-rules.yaml apiVersion: v1 kind: ConfigMap metadata: name: prometheus-recording-rules namespace: monitoring data: rules.yml: | groups: # 节点资源使用 - name: node_resources interval: 30s rules: - record: node:cpu_utilization:rate5m expr: | 100 - (avg by (instance) (irate(node_cpu_seconds_total{modeidle}[5m])) * 100) - record: node:memory_utilization:percent expr: | (1 - (node_memory_MemAvailable_bytes / node_memory_MemTotal_bytes)) * 100 - record: node:disk_utilization:percent expr: | (1 - (node_filesystem_avail_bytes{mountpoint/} / node_filesystem_size_bytes{mountpoint/})) * 100 - record: node:network_receive_bytes:rate5m expr: | sum by (instance) (irate(node_network_receive_bytes_total[5m])) - record: node:network_transmit_bytes:rate5m expr: | sum by (instance) (irate(node_network_transmit_bytes_total[5m])) # Pod资源使用 - name: pod_resources interval: 30s rules: - record: pod:cpu_utilization:percent expr: | (container_cpu_usage_seconds_total / kube_pod_container_resource_limits{resourcecpu}) * 100 - record: pod:memory_utilization:percent expr: | (container_memory_working_set_bytes / kube_pod_container_resource_limits{resourcememory}) * 100 - record: pod:restart_rate:5m expr: | rate(kube_pod_container_status_restarts_total[5m]) - record: pod:oom_kills:total expr: | increase(container_oom_events_total[1h]) # 集群整体指标 - name: cluster_resources interval: 60s rules: - record: cluster:cpu_allocatable:total expr: | sum(kube_node_status_allocatable{resourcecpu}) - record: cluster:cpu_request:total expr: | sum(kube_pod_container_resource_requests{resourcecpu}) - record: cluster:cpu_utilization:percent expr: | (cluster:cpu_request:total / cluster:cpu_allocatable:total) * 100 - record: cluster:pod_count:total expr: | count(kube_pod_info) - record: cluster:node_count:total expr: | count(kube_node_info)告警规则体系1. 分层告警策略# alert-rules.yaml apiVersion: v1 kind: ConfigMap metadata: name: prometheus-alert-rules namespace: monitoring data: alerts.yml: | groups: # P0 - 立即处理 - name: critical_alerts rules: - alert: KubernetesNodeNotReady expr: | kube_node_status_condition{ conditionReady, statustrue } 0 for: 5m labels: severity: critical priority: P0 annotations: summary: Kubernetes节点不可用 description: 节点{{ $labels.node }}已不可用超过5分钟 runbook_url: https://wiki/runbooks/node-not-ready - alert: KubernetesPodCrashLooping expr: | rate(kube_pod_container_status_restarts_total[15m]) 0 for: 5m labels: severity: critical priority: P0 annotations: summary: Pod反复重启 description: Pod {{ $labels.namespace }}/{{ $labels.pod }} 在过去15分钟内重启{{ $value }}次 - alert: KubernetesOutOfMemory expr: | container_memory_working_set_bytes / container_spec_memory_limit_bytes 0.95 for: 2m labels: severity: critical priority: P0 annotations: summary: Pod内存即将耗尽 description: Pod {{ $labels.pod }} 内存使用率超过95% - alert: KubernetesDiskPressure expr: | kube_node_status_condition{ conditionDiskPressure, statustrue } 1 for: 2m labels: severity: critical priority: P0 annotations: summary: 节点磁盘压力 description: 节点{{ $labels.node }}磁盘压力警告 # P1 - 1小时内处理 - name: high_priority_alerts rules: - alert: KubernetesCPUHigh expr: | 100 - (avg by (instance) (irate(node_cpu_seconds_total{modeidle}[5m])) * 100) 80 for: 10m labels: severity: warning priority: P1 annotations: summary: 节点CPU使用率过高 description: 节点{{ $labels.instance }} CPU使用率超过80% - alert: KubernetesMemoryHigh expr: | (1 - (node_memory_MemAvailable_bytes / node_memory_MemTotal_bytes)) * 100 85 for: 10m labels: severity: warning priority: P1 annotations: summary: 节点内存使用率过高 description: 节点{{ $labels.instance }} 内存使用率超过85% - alert: KubernetesDiskFull expr: | (1 - (node_filesystem_avail_bytes{mountpoint/} / node_filesystem_size_bytes{mountpoint/})) * 100 85 for: 5m labels: severity: warning priority: P1 annotations: summary: 节点磁盘使用率过高 description: 节点{{ $labels.instance }} 磁盘使用率超过85% - alert: KubernetesPodPending expr: | kube_pod_status_phase{phasePending} 1 for: 15m labels: severity: warning priority: P1 annotations: summary: Pod长时间Pending description: Pod {{ $labels.namespace }}/{{ $labels.pod }} 已Pending超过15分钟 # P2 - 4小时内处理 - name: medium_priority_alerts rules: - alert: KubernetesHighPodRestart expr: | increase(kube_pod_container_status_restarts_total[1h]) 3 for: 0m labels: severity: info priority: P2 annotations: summary: Pod重启次数较多 description: Pod {{ $labels.namespace }}/{{ $labels.pod }} 在过去1小时内重启超过3次 - alert: KubernetesNetworkReceiveHigh expr: | irate(node_network_receive_bytes_total[5m]) 1000000000 # 1GB/s for: 10m labels: severity: info priority: P2 annotations: summary: 网络接收流量过高 description: 节点{{ $labels.instance }} 网络接收流量超过1GB/s - alert: KubernetesResourceQuotaHigh expr: | kube_resourcequota{resourcerequests.cpu,typeused} / kube_resourcequota{resourcerequests.cpu,typehard} 0.85 for: 15m labels: severity: info priority: P2 annotations: summary: 资源配额使用率过高 description: 命名空间{{ $labels.namespace }} CPU配额使用率超过85% # P3 - 24小时内处理 - name: low_priority_alerts rules: - alert: KubernetesJobFailed expr: | kube_job_status_failed 1 for: 0m labels: severity: info priority: P3 annotations: summary: Job执行失败 description: Job {{ $labels.namespace }}/{{ $labels.job_name }} 执行失败 - alert: KubernetesCertificateExpiring expr: | (probe_ssl_earliest_cert_expiry - time()) / 86400 30 for: 0m labels: severity: info priority: P3 annotations: summary: 证书即将过期 description: 证书将在{{ $value }}天后过期2. Alertmanager配置# alertmanager-config.yaml apiVersion: v1 kind: ConfigMap metadata: name: alertmanager-config namespace: monitoring data: alertmanager.yml: | global: smtp_smarthost: smtp.example.com:587 smtp_from: alertsexample.com smtp_auth_username: alertsexample.com smtp_auth_password: password slack_api_url: https://hooks.slack.com/services/xxx pagerduty_url: https://events.pagerduty.com/v2/enqueue templates: - /etc/alertmanager/templates/*.tmpl route: receiver: default group_by: [alertname, priority, namespace] group_wait: 30s group_interval: 5m repeat_interval: 4h routes: # P0告警 - 立即电话通知 - match: priority: P0 receiver: p0-team group_wait: 0s repeat_interval: 5m continue: true # P1告警 - 短信邮件 - match: priority: P1 receiver: p1-team group_wait: 1m repeat_interval: 30m continue: true # P2告警 - 邮件Slack - match: priority: P2 receiver: p2-team group_wait: 5m repeat_interval: 2h # P3告警 - 仅邮件 - match: priority: P3 receiver: p3-team group_wait: 10m repeat_interval: 24h # 按命名空间路由 - match_re: namespace: production|core receiver: production-team routes: - match: severity: critical receiver: production-oncall inhibit_rules: # 高级别告警抑制低级别 - source_match: severity: critical target_match: severity: warning equal: [alertname, namespace] - source_match: alertname: KubernetesNodeNotReady target_match_re: alertname: KubernetesCPUHigh|KubernetesMemoryHigh equal: [instance] receivers: - name: default email_configs: - to: opsexample.com send_resolved: true - name: p0-team pagerduty_configs: - service_key: pagerduty-integration-key severity: critical description: {{ .GroupLabels.alertname }} slack_configs: - channel: #alerts-critical send_resolved: true title: P0 Alert: {{ .GroupLabels.alertname }} text: | {{ range .Alerts }} *Summary:* {{ .Annotations.summary }} *Description:* {{ .Annotations.description }} *Runbook:* {{ .Annotations.runbook_url }} {{ end }} webhook_configs: - url: http://phone-call-service:8080/call send_resolved: false - name: p1-team slack_configs: - channel: #alerts-high send_resolved: true title: ⚠️ P1 Alert: {{ .GroupLabels.alertname }} email_configs: - to: oncallexample.com send_resolved: true - name: p2-team slack_configs: - channel: #alerts-medium send_resolved: true title: P2 Alert: {{ .GroupLabels.alertname }} - name: p3-team email_configs: - to: teamexample.com send_resolved: trueGrafana仪表板1. 集群概览仪表板{ dashboard: { title: Kubernetes Cluster Overview, tags: [k8s, overview], timezone: browser, panels: [ { id: 1, title: Cluster CPU Utilization, type: stat, targets: [ { expr: cluster:cpu_utilization:percent, legendFormat: CPU Usage } ], fieldConfig: { defaults: { thresholds: { steps: [ {color: green, value: null}, {color: yellow, value: 70}, {color: red, value: 85} ] }, unit: percent } } }, { id: 2, title: Cluster Memory Utilization, type: stat, targets: [ { expr: (1 - (sum(node_memory_MemAvailable_bytes) / sum(node_memory_MemTotal_bytes))) * 100, legendFormat: Memory Usage } ] }, { id: 3, title: Node Status, type: table, targets: [ { expr: kube_node_status_condition{condition\Ready\}, format: table, instant: true } ] }, { id: 4, title: Pod Status by Namespace, type: piechart, targets: [ { expr: count by (namespace, phase) (kube_pod_status_phase), legendFormat: {{ namespace }} - {{ phase }} } ] }, { id: 5, title: Resource Usage Trend, type: graph, targets: [ { expr: cluster:cpu_utilization:percent, legendFormat: CPU }, { expr: (1 - (sum(node_memory_MemAvailable_bytes) / sum(node_memory_MemTotal_bytes))) * 100, legendFormat: Memory } ] } ] } }2. Pod资源详情仪表板# pod-dashboard.yaml apiVersion: v1 kind: ConfigMap metadata: name: grafana-pod-dashboard namespace: monitoring labels: grafana_dashboard: 1 data: pod-dashboard.json: | { dashboard: { title: Pod Resource Details, tags: [k8s, pod], templating: { list: [ { name: namespace, type: query, query: label_values(kube_pod_info, namespace) }, { name: pod, type: query, query: label_values(kube_pod_info{namespace~\$namespace\}, pod) } ] }, panels: [ { title: CPU Usage, type: graph, targets: [ { expr: sum(rate(container_cpu_usage_seconds_total{namespace\$namespace\, pod\$pod\, container!\\}[5m])) by (container), legendFormat: {{ container }} } ] }, { title: Memory Usage, type: graph, targets: [ { expr: container_memory_working_set_bytes{namespace\$namespace\, pod\$pod\, container!\\}, legendFormat: {{ container }} } ] }, { title: Network I/O, type: graph, targets: [ { expr: rate(container_network_receive_bytes_total{namespace\$namespace\, pod\$pod\}[5m]), legendFormat: Receive }, { expr: rate(container_network_transmit_bytes_total{namespace\$namespace\, pod\$pod\}[5m]), legendFormat: Transmit } ] }, { title: Restart Count, type: stat, targets: [ { expr: kube_pod_container_status_restarts_total{namespace\$namespace\, pod\$pod\}, legendFormat: {{ container }} } ] } ] } }自定义指标暴露1. 应用指标SDK示例# app_metrics.py from prometheus_client import Counter, Histogram, Gauge, Info, start_http_server import time import random # 定义指标 REQUEST_COUNT Counter( app_requests_total, Total requests, [method, endpoint, status] ) REQUEST_LATENCY Histogram( app_request_duration_seconds, Request latency, [method, endpoint], buckets[0.01, 0.025, 0.05, 0.1, 0.25, 0.5, 1.0, 2.5, 5.0, 10.0] ) ACTIVE_CONNECTIONS Gauge( app_active_connections, Number of active connections ) QUEUE_SIZE Gauge( app_queue_size, Current queue size, [queue_name] ) APP_INFO Info( app_info, Application information ) # 设置应用信息 APP_INFO.info({ version: 2.0.0, build_time: 2026-03-28, git_commit: abc123 }) def track_request(method, endpoint, status, duration): 追踪请求 REQUEST_COUNT.labels( methodmethod, endpointendpoint, statusstatus ).inc() REQUEST_LATENCY.labels( methodmethod, endpointendpoint ).observe(duration) def update_queue_size(queue_name, size): 更新队列大小 QUEUE_SIZE.labels(queue_namequeue_name).set(size) # 启动metrics服务器 if __name__ __main__: start_http_server(9090) print(Metrics server started on port 9090) # 模拟应用运行 ACTIVE_CONNECTIONS.set(100) while True: # 模拟请求 duration random.uniform(0.01, 0.5) track_request(GET, /api/users, 200, duration) # 模拟队列变化 update_queue_size(order_queue, random.randint(0, 1000)) time.sleep(1)2. 自定义指标ServiceMonitor# custom-metrics-servicemonitor.yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: name: custom-app-metrics namespace: monitoring labels: release: prometheus spec: namespaceSelector: matchNames: - production - staging selector: matchLabels: metrics: enabled endpoints: - port: metrics path: /metrics interval: 15s scrapeTimeout: 10s honorLabels: true metricRelabelings: - sourceLabels: [__name__] regex: app_(.*) targetLabel: component replacement: application - sourceLabels: [__name__] regex: db_(.*) targetLabel: component replacement: database日志监控集成1. Loki日志收集# loki-config.yaml apiVersion: v1 kind: ConfigMap metadata: name: loki-config namespace: monitoring data: loki.yml: | auth_enabled: false server: http_listen_port: 3100 ingester: lifecycler: address: 127.0.0.1 ring: kvstore: store: inmemory replication_factor: 1 chunk_idle_period: 5m chunk_retain_period: 30s schema_config: configs: - from: 2026-01-01 store: boltdb object_store: filesystem schema: v11 index: prefix: index_ period: 168h storage_config: boltdb: directory: /loki/index filesystem: directory: /loki/chunks limits_config: enforce_metric_name: false reject_old_samples: true reject_old_samples_max_age: 168h --- # Promtail配置 apiVersion: v1 kind: ConfigMap metadata: name: promtail-config namespace: monitoring data: promtail.yml: | server: http_listen_port: 9080 grpc_listen_port: 0 positions: filename: /tmp/positions.yaml clients: - url: http://loki:3100/loki/api/v1/push scrape_configs: - job_name: kubernetes-pods kubernetes_sd_configs: - role: pod pipeline_stages: - docker: {} relabel_configs: - source_labels: [__meta_kubernetes_pod_node_name] target_label: __host__ - action: labelmap regex: __meta_kubernetes_pod_label_(.) - source_labels: [__meta_kubernetes_namespace] target_label: namespace - source_labels: [__meta_kubernetes_pod_name] target_label: pod - source_labels: [__meta_kubernetes_pod_container_name] target_label: container总结完整的监控告警体系需要多层监控基础设施、K8s、应用全覆盖合理告警分层分级避免告警疲劳可视化Grafana仪表板直观展示自动化告警触发自动处理持续优化根据实际调整阈值记住监控不是目的快速发现和解决问题才是。

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/2462234.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

SpringBoot-17-MyBatis动态SQL标签之常用标签

文章目录 1 代码1.1 实体User.java1.2 接口UserMapper.java1.3 映射UserMapper.xml1.3.1 标签if1.3.2 标签if和where1.3.3 标签choose和when和otherwise1.4 UserController.java2 常用动态SQL标签2.1 标签set2.1.1 UserMapper.java2.1.2 UserMapper.xml2.1.3 UserController.ja…

wordpress后台更新后 前端没变化的解决方法

使用siteground主机的wordpress网站,会出现更新了网站内容和修改了php模板文件、js文件、css文件、图片文件后,网站没有变化的情况。 不熟悉siteground主机的新手,遇到这个问题,就很抓狂,明明是哪都没操作错误&#x…

网络编程(Modbus进阶)

思维导图 Modbus RTU(先学一点理论) 概念 Modbus RTU 是工业自动化领域 最广泛应用的串行通信协议,由 Modicon 公司(现施耐德电气)于 1979 年推出。它以 高效率、强健性、易实现的特点成为工业控制系统的通信标准。 包…

UE5 学习系列(二)用户操作界面及介绍

这篇博客是 UE5 学习系列博客的第二篇,在第一篇的基础上展开这篇内容。博客参考的 B 站视频资料和第一篇的链接如下: 【Note】:如果你已经完成安装等操作,可以只执行第一篇博客中 2. 新建一个空白游戏项目 章节操作,重…

IDEA运行Tomcat出现乱码问题解决汇总

最近正值期末周,有很多同学在写期末Java web作业时,运行tomcat出现乱码问题,经过多次解决与研究,我做了如下整理: 原因: IDEA本身编码与tomcat的编码与Windows编码不同导致,Windows 系统控制台…

利用最小二乘法找圆心和半径

#include <iostream> #include <vector> #include <cmath> #include <Eigen/Dense> // 需安装Eigen库用于矩阵运算 // 定义点结构 struct Point { double x, y; Point(double x_, double y_) : x(x_), y(y_) {} }; // 最小二乘法求圆心和半径 …

使用docker在3台服务器上搭建基于redis 6.x的一主两从三台均是哨兵模式

一、环境及版本说明 如果服务器已经安装了docker,则忽略此步骤,如果没有安装,则可以按照一下方式安装: 1. 在线安装(有互联网环境): 请看我这篇文章 传送阵>> 点我查看 2. 离线安装(内网环境):请看我这篇文章 传送阵>> 点我查看 说明&#xff1a;假设每台服务器已…

XML Group端口详解

在XML数据映射过程中&#xff0c;经常需要对数据进行分组聚合操作。例如&#xff0c;当处理包含多个物料明细的XML文件时&#xff0c;可能需要将相同物料号的明细归为一组&#xff0c;或对相同物料号的数量进行求和计算。传统实现方式通常需要编写脚本代码&#xff0c;增加了开…

LBE-LEX系列工业语音播放器|预警播报器|喇叭蜂鸣器的上位机配置操作说明

LBE-LEX系列工业语音播放器|预警播报器|喇叭蜂鸣器专为工业环境精心打造&#xff0c;完美适配AGV和无人叉车。同时&#xff0c;集成以太网与语音合成技术&#xff0c;为各类高级系统&#xff08;如MES、调度系统、库位管理、立库等&#xff09;提供高效便捷的语音交互体验。 L…

(LeetCode 每日一题) 3442. 奇偶频次间的最大差值 I (哈希、字符串)

题目&#xff1a;3442. 奇偶频次间的最大差值 I 思路 &#xff1a;哈希&#xff0c;时间复杂度0(n)。 用哈希表来记录每个字符串中字符的分布情况&#xff0c;哈希表这里用数组即可实现。 C版本&#xff1a; class Solution { public:int maxDifference(string s) {int a[26]…

【大模型RAG】拍照搜题技术架构速览:三层管道、两级检索、兜底大模型

摘要 拍照搜题系统采用“三层管道&#xff08;多模态 OCR → 语义检索 → 答案渲染&#xff09;、两级检索&#xff08;倒排 BM25 向量 HNSW&#xff09;并以大语言模型兜底”的整体框架&#xff1a; 多模态 OCR 层 将题目图片经过超分、去噪、倾斜校正后&#xff0c;分别用…

【Axure高保真原型】引导弹窗

今天和大家中分享引导弹窗的原型模板&#xff0c;载入页面后&#xff0c;会显示引导弹窗&#xff0c;适用于引导用户使用页面&#xff0c;点击完成后&#xff0c;会显示下一个引导弹窗&#xff0c;直至最后一个引导弹窗完成后进入首页。具体效果可以点击下方视频观看或打开下方…

接口测试中缓存处理策略

在接口测试中&#xff0c;缓存处理策略是一个关键环节&#xff0c;直接影响测试结果的准确性和可靠性。合理的缓存处理策略能够确保测试环境的一致性&#xff0c;避免因缓存数据导致的测试偏差。以下是接口测试中常见的缓存处理策略及其详细说明&#xff1a; 一、缓存处理的核…

龙虎榜——20250610

上证指数放量收阴线&#xff0c;个股多数下跌&#xff0c;盘中受消息影响大幅波动。 深证指数放量收阴线形成顶分型&#xff0c;指数短线有调整的需求&#xff0c;大概需要一两天。 2025年6月10日龙虎榜行业方向分析 1. 金融科技 代表标的&#xff1a;御银股份、雄帝科技 驱动…

观成科技:隐蔽隧道工具Ligolo-ng加密流量分析

1.工具介绍 Ligolo-ng是一款由go编写的高效隧道工具&#xff0c;该工具基于TUN接口实现其功能&#xff0c;利用反向TCP/TLS连接建立一条隐蔽的通信信道&#xff0c;支持使用Let’s Encrypt自动生成证书。Ligolo-ng的通信隐蔽性体现在其支持多种连接方式&#xff0c;适应复杂网…

铭豹扩展坞 USB转网口 突然无法识别解决方法

当 USB 转网口扩展坞在一台笔记本上无法识别,但在其他电脑上正常工作时,问题通常出在笔记本自身或其与扩展坞的兼容性上。以下是系统化的定位思路和排查步骤,帮助你快速找到故障原因: 背景: 一个M-pard(铭豹)扩展坞的网卡突然无法识别了,扩展出来的三个USB接口正常。…

未来机器人的大脑:如何用神经网络模拟器实现更智能的决策?

编辑&#xff1a;陈萍萍的公主一点人工一点智能 未来机器人的大脑&#xff1a;如何用神经网络模拟器实现更智能的决策&#xff1f;RWM通过双自回归机制有效解决了复合误差、部分可观测性和随机动力学等关键挑战&#xff0c;在不依赖领域特定归纳偏见的条件下实现了卓越的预测准…

Linux应用开发之网络套接字编程(实例篇)

服务端与客户端单连接 服务端代码 #include <sys/socket.h> #include <sys/types.h> #include <netinet/in.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <arpa/inet.h> #include <pthread.h> …

华为云AI开发平台ModelArts

华为云ModelArts&#xff1a;重塑AI开发流程的“智能引擎”与“创新加速器”&#xff01; 在人工智能浪潮席卷全球的2025年&#xff0c;企业拥抱AI的意愿空前高涨&#xff0c;但技术门槛高、流程复杂、资源投入巨大的现实&#xff0c;却让许多创新构想止步于实验室。数据科学家…

深度学习在微纳光子学中的应用

深度学习在微纳光子学中的主要应用方向 深度学习与微纳光子学的结合主要集中在以下几个方向&#xff1a; 逆向设计 通过神经网络快速预测微纳结构的光学响应&#xff0c;替代传统耗时的数值模拟方法。例如设计超表面、光子晶体等结构。 特征提取与优化 从复杂的光学数据中自…