Benchmarking Java

Deploying your application to production might be complicated, due to an increasing amount of elements and tools you need to consider during this process.

You need to make sure your application will run as efficient as it can, while ensuring your information is kept safe. We’ve built OverOps specifically for JVM production environments, to run seamlessly at high scale while keeping our users and their information secured.

In the following post we’ll explain how OverOps is built to fit in your production environment, with 2 key points in mind: performance (overhead) and security.

How Do We Keep Overhead Low While Running In-Depth Analysis?

OverOps can perform under extreme performance restrictions in your production and staging environments. It runs on your server as a Java micro-agent (per JVM) and a daemon collector process (per machine), when the 2 combined detect all events (caught and uncaught exceptions, HTTP errors, and log errors and warnings) inside your app. OverOps collects the code and variable data needed to reproduce and fix these errors in production.

OverOps supports all JVM-based languages and doesn’t require you to change your code or build configurations in order to use it. We designed it to leverage cloud computing power to do all the heavy lifting such as complicated analysis and processing tasks, so that your server will only be marginally affected. The detection of exceptions, HTTP and log errors and warnings is done directly from the JVM, without needing to access log file.

Our technology enables OverOps to remain below 3% CPU and IO overhead for minimal effect on your production environment. This allows you to use OverOps where it matters most – in your production servers.

Takipi Workflow

How it Works?

There are 6 methods we use to reduce overhead:

1. Capped CPU overhead (< 3%)

OverOps employs self-throttling at the JVM level, a dynamic process that regulates the rate at which application processing is conducted. We combine it with continuous guidance provided by the central code analysis.

OverOps only reacts to errors, and does not affect normal code execution. Even if one of your transactions is experiencing a high degree of failures (expected or unexpected), OverOps’s micro-agent will react to ensure there’s no impact to throughput.

2. RAM Overhead

OverOps’s installed components only use a 200-400MB, pre allocated block of memory during their operation, making sure RAM consumption will not increase uncontrollably, and it will remain virtually unnoticed. OverOps’s RAM consumption doesn’t affect the JVM that’s being monitored.

3. Capped Network overhead (< 50MB per hour)

Error information captured by the JVM agent is placed into shared memory, and sent to storage by the daemon process. The information needed to display the in-depth error analysis is highly compact and will never use more than 50MB of network resources per hour.

4. No dependency on OverOps

OverOps’s Java micro-agent is not dependent on the availability of OverOps’s central analysis service or the local collector process. That way, even if these become unavailable, the micro-agent will enter a dormant state that will not affect the execution of code inside the JVM.

OverOps’s micro-agent collects statistics on exceptions and error logging directly from the JVM, regardless of how events are eventually logged. OverOps does not access or upload log files from your machine.

5. Garbage Collection

Unlike other tools, OverOps runs at the native JVM level and does not allocate Java objects at run-time. The information is placed directly in shared memory outside the managed heap, to ensure that no overhead is added to your application’s garbage collection (GC) time.

6. Disk Space

OverOps’s JVM micro-agent is designed to use only a few MB of your disk space, it’s combined with a daily maintenance job to clear unused files and a predefined disk space limitation enforced by the OverOps daemon. Apart from the micro-agent, disk usage is around 400MB and will never affect the JVM that’s being monitored.

Performance and Overhead

Meet Our 5 Security Layers

In order to keep your information safe, we implement multiple levels of encryption and administration while making sure you have complete visibility and control over how data is collected and managed.

We’re using 5 main layers to ensure the security, protection and privacy of collected code and data.

1. Data Redaction

OverOps enables you to filter out personal and business sensitive information, before it leaves your machine. We offer two modes for redacting variable data at runtime: pattern, and identifier based filtering.

Pattern filtering asynchronously scans all collected variable values against sets of predefined regular expression patterns, identifying values such as phone numbers, credit cards or any personal information about your users. You can pick out of a default list, or add any other sensitive regex patterns that might be critical for you or your users.

Identifier filtering redacts all data collected from predefined variables, fields, and classes in your application. Just like Pattern filtering, you’ll be able to create your own customized list and specify the exact class names that should never be collected.

Both redaction modes are enabled by default.

Data Redaction
OverOps’s default sensitive regex pattern redaction

2. Private Encryption

We encrypt information using 256­bit AES encryption and a set of private keys known only to you, that can only be viewed by you locally. In order to offload work from your local JVM and efficiently analyze errors, we convert bytecode at runtime into an encrypted abstract graph structure.

Our conversion process removes all jar, package, class, field, method and variable names from your code, along with any other Java or third-party frameworks. It also removes all logical and numeric operators, number and string constants, and code attributes.

OverOps’s abstract graph structure cannot be reversed engineered or executed, so you can be certain your information will not reach unwanted hands. This structure is the fastest method of collecting code fragments and variable values in order to maintain low CPU and IO overhead.

3. Data Storage

OverOps offers three modes for storing code and variable data collected on your machines:

  • On-premise – Code and variables are redacted for PII (Personally Identifiable Information) and privately encrypted. This information is stored and analyzed locally, so it stays behind your firewall and doesn’t leave your network

On Prem

  • Hybrid – Code and variables collected are redacted for PII, encrypted locally and stored on your machine. Only the metadata is sent out to OverOps’s cloud for analysis


  • Hosted – Code and variables are collected on your machine, redacted for PII and encrypted locally, using your private encryption key. After this process, your encrypted information is stored in the cloud (AWS)


4. User and Access Point Control

The administrator of each cluster, which is defined by the installation key, has full control over the information and the team members who are exposed to it.

You or your admin can control which team members have access to the error analyses collected from monitored machines, and you’re able to set the IP address range from which authenticated users can access the service to a specific network or VPN.

5. Secure Transport

Communication between OverOps’s daemon process and our central analysis service, which is hosted on AWS, are made over signed HTTPS outbound on port 443 to a set of fixed IP addresses. You are not required to open an inbound port for communications.

Security Layers

Fast, Reliable and Secure

OverOps was specifically build for production environments with performance and security as a top priority above all things. Every new version and feature goes through a rigorous testing process to ensure there’s no negative effect on performance and that all data is safe and secure.

If you have any further questions or concerns, please feel free to reach out with any issue on

I write about Java, Scala and everything in between. Lover of gadgets, apps, technology and tea.