All Products
Search
Document Center

Application Real-Time Monitoring Service:View container metrics for a pod

Last Updated:Mar 11, 2026

When applications run in Kubernetes pods, resource bottlenecks such as CPU throttling, memory pressure, or network packet loss can degrade performance without clear symptoms at the application layer. The Container monitoring tab in ARMS displays pod-level CPU, memory, and network metrics so you can correlate infrastructure resource consumption with application behavior and identify the root cause faster.

Prerequisites

Before you begin, make sure that you have:

Open the container monitoring tab

  1. Log on to the ARMS console.

  2. In the left-side navigation pane, choose Application Monitoring > Applications.

  3. On the Applications page, select a region in the top navigation bar and click the name of the application.

    If the Java icon icon is displayed in the Language column, the application is connected to Application Monitoring. If a hyphen (-) is displayed, the application is connected to Managed Service for OpenTelemetry.

  4. In the left-side navigation pane, click Application Details.

  5. On the Application Details page, select a pod, set the time period, and then click the Container monitoring tab.

Available metrics

The Container monitoring tab contains four metric sections. Each section displays time-series charts for the selected pod and time period.

CPU

The CPU section displays the following metrics:

MetricDescription
Cumulative CPU usageThe accumulated CPU consumption of the pod over the selected time period. Compare this value against the CPU quota to determine whether the pod is approaching its allocation limit. A consistently high ratio may indicate that you need to increase the CPU request or limit for the pod.
CPU quotaThe CPU resource quota allocated to the pod.
CPU metrics

Memory

The Memory section displays physical memory metrics:

MetricDescription
Memory usageThe physical memory consumed by the pod. If usage consistently approaches the quota, the pod risks OOMKill (out-of-memory termination). Consider increasing the memory limit or optimizing application memory consumption.
Memory quotaThe memory resource quota allocated to the pod.
Memory metrics

Network traffic

The Network Traffic (Bytes) section tracks the data volume transmitted and received by the pod:

MetricDescription
Received network traffic (bytes)Inbound data volume. A sudden spike may indicate an unexpected traffic surge or a distributed denial-of-service (DDoS) event.
Sent network traffic (bytes)Outbound data volume. A sustained increase can indicate growing response payloads or excessive logging to external services.
Network traffic metrics

Network packets

The Network Packets (Count) section provides packet-level statistics to help identify transmission issues:

MetricDescription
Number of discarded network packets among the sent network packetsOutbound packets dropped before transmission. Non-zero values may indicate network congestion or buffer overflow.
Number of sent network packetsTotal outbound packets transmitted by the pod.
Number of discarded network packets among the received network packetsInbound packets dropped before delivery to the application.
Number of errors that have occurred when network packets were sentErrors encountered during outbound packet transmission. Persistent errors suggest NIC or driver issues.
Number of errors that have occurred when network packets were receivedErrors encountered during inbound packet reception.
Network packets metrics

Interact with charts

All metric charts on the Container monitoring tab support the following interactions:

ActionHow to
View exact valuesHover over any data point to see the metric value and timestamp.
Zoom into a time rangeClick and drag across the chart to select a specific time window. The chart rescales to show only the selected period.
Filter by metricClick a metric name in the legend to show or hide that metric on the chart.

Investigate a metric spike:

  1. Identify the spike in one of the metric charts.

  2. Click and drag across the spike to zoom into the relevant time window.

  3. Hover over the peak to read the exact value and timestamp.

  4. Switch between the CPU, memory, and network sections to check whether the spike correlates with changes in other resource dimensions. For example, a memory usage spike accompanied by increased network traffic may indicate a sudden influx of requests.