You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-perf.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,7 +151,7 @@ The following steps can be used to troubleshoot and mitigate these issues:
151
151
## Troubleshoot performance issues using Hot Event Sources
152
152
153
153
**Applies to:**
154
-
- Performance issues in files and executables which are consuming most CPU cycles.
154
+
- Performance issues in files and executables which are consuming most CPU cycles in the entire filesystem.
155
155
156
156
Hot event sources is a feature that allows customers to identify which process or directory is responsible for high resource consumption. To investigate which process/executable is generating the most noise, follow the steps below.
157
157
@@ -204,7 +204,7 @@ The output of which will look similar to the following (JSON);
204
204
]
205
205
}
206
206
```
207
-
And similarly output on the console looks like the following (this is just a snippet of the entire output). Here the first row is the count (frequency of occurrence) and the second is the file path.
207
+
And similarly output on the console looks like the following (this is just a snippet of the entire output). Here, the first row is the count (frequency of occurrence) and the second is the file path.
208
208
209
209
```console
210
210
Total Events: 11179 Time: 12s. Throughput: 75.3333 events/sec.
@@ -221,8 +221,9 @@ And similarly output on the console looks like the following (this is just a sni
In this example, after 18s the command shows that bin/psql and bin/postgres executables generate the most activity.
278
+
276
279
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in `count` row and add a global process exclusion (in case of executable) or a global file/folder exclusion (in case of file) for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
277
280
278
281
## Troubleshoot performance issues using eBPF Statistics
@@ -288,7 +291,7 @@ To collect current statistics using eBPF statistics, run:
288
291
mdatp diagnostic ebpf-statistics
289
292
```
290
293
291
-
The output is always on the console and would look similar to the following (this is only a snippet of the entire output):
294
+
The output is directly shown on the console and would look similar to the following (this is only a snippet of the entire output):
292
295
293
296
```console
294
297
Top initiator paths:
@@ -309,6 +312,7 @@ To collect current statistics using eBPF statistics, run:
309
312
288 : 19
310
313
41 : 15
311
314
```
315
+
This command monitors the system for 20 seconds and shows the results. Here the top initiator path (postgresql/12/bin/psql) shows the path of the process that generated the most system calls.
312
316
313
317
To improve the performance of Defender for Endpoint on Linux, locate the one with the highest `count` in the `Top initiator path` row and add a global process exclusion for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
0 commit comments