You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-perf.md
+13-16Lines changed: 13 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,14 +29,14 @@ search.appverid: met150
29
29
30
30
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
31
31
32
-
This document provides instructions on how to narrow down performance issues related to Defender for Endpoint on Linux using the available diagnostic tools to be able to understand and mitigate the existing resource shortages and the processes that are making the system into such situations. Performance problems are mainly caused by bottlenecks in one or more hardware subsystems, depending on the profile of resource utilization on the system. Sometimes applications are sensitive to disk I/O resources and may need more CPU capacity, and sometimes some configurations are not sustainable, and may trigger too many new processes, and open too many file descriptors.
32
+
This document provides instructions on how to narrow down performance issues related to Defender for Endpoint on Linux using the available diagnostic tools to be able to understand and mitigate the existing resource shortages and the processes that are making the system into such situations. Bottlenecks in one or more hardware subsystems mainly cause performance problems, depending on the profile of resource utilization on the system. Sometimes applications are sensitive to disk I/O resources and may need more CPU capacity, and sometimes some configurations are not sustainable, and may trigger too many new processes, and open too many file descriptors.
33
33
34
34
Depending on the applications that you are running and your device characteristics, you may experience suboptimal performance when running Defender for Endpoint on Linux. In particular, applications or system processes that access many resources such as CPU, Disk, and Memory over a short timespan can lead to performance issues in Defender for Endpoint on Linux.
35
35
36
36
> [!WARNING]
37
-
> Before starting, **please make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance.
37
+
> Before starting, **make sure that other security products are not currently running on the device**. Multiple security products may conflict and impact the host performance.
38
38
39
-
There are 3 distinct ways to troubleshoot noisy processes and directories using exclusions provided by the Diagnostic tools from Microsoft Defender for Endpoint on Linux:
39
+
There are three distinct ways to troubleshoot noisy processes and directories using exclusions provided by the Diagnostic tools from Microsoft Defender for Endpoint on Linux:
40
40
1. Using Real-time Protection Statistics
41
41
2. Using Hot Event Sources
42
42
3. Using eBPF Statistics
@@ -60,10 +60,10 @@ The following steps can be used to troubleshoot and mitigate these issues:
60
60
Configuration property updated
61
61
```
62
62
63
-
If your device is managed by your organization, real-time protection can be disabled by your administrator using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
63
+
If your organization manages your device, your administrator can disable real-time protection using the instructions in [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
64
64
65
65
> [!NOTE]
66
-
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
66
+
> If the performance problem persists while real-time protection is off, the origin of the problem could be the endpoint detection and response (EDR) component. In this case, please follow the steps from the **Troubleshoot performance issues using Microsoft Defender for Endpoint Client Analyzer** section of this article.
67
67
68
68
2. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on Linux.
69
69
@@ -153,10 +153,9 @@ The following steps can be used to troubleshoot and mitigate these issues:
153
153
**Applies to:**
154
154
- Performance issues in files and executables which are consuming most CPU cycles in the entire filesystem.
155
155
156
-
Hot event sources is a feature that allows customers to identify which process or directory is responsible for high resource consumption. To investigate which process/executable is generating the most noise, follow the steps below.
157
-
156
+
Hot event sources is a feature that allows customers to identify which process or directory is responsible for high resource consumption. To investigate which process/executable is generating the most noise, follow these steps.
158
157
> [!NOTE]
159
-
> These commmands require you to have root permissions. Ensure that sudo can be used.
158
+
> These commands require you to have root permissions. Ensure that sudo can be used.
160
159
161
160
First, check the log level on your machine.
162
161
@@ -177,8 +176,7 @@ To collect current statistics (for files),
177
176
```bash
178
177
sudo mdatp diagnostic hot-event-sources files
179
178
```
180
-
The output of which will look similar to the following on the console (this is just a snippet of the entire output). Here, the first row is the count (frequency of occurrence) and the second is the file path.;
181
-
179
+
The output looks similar to the following on the console (this is just a snippet of the entire output). Here, the first row shows the count (frequency of occurrence) and the second shows the file path.
182
180
```console
183
181
Total Events: 11179 Time: 12s. Throughput: 75.3333 events/sec.
184
182
=========== Top 684 Hot Event Sources ===========
@@ -223,15 +221,14 @@ The output of which will look similar to the following on the console (this is j
223
221
}
224
222
```
225
223
226
-
In the above example, we can see that the file /mnt/RamDisk/postgres_data/pg_wal/0000000100000014000000A5 generates the most activity.
227
-
224
+
In the example, we can see that the file /mnt/RamDisk/postgres_data/pg_wal/0000000100000014000000A5 generates the most activity.
The output of which will look similar to the following on the console;
231
+
The output looks similar to the following on the console.
235
232
236
233
```console
237
234
Total Events: 47382 Time: 18s. Throughput: 157 events/sec.
@@ -278,14 +275,14 @@ This is the output saved in the hot event source report in json;
278
275
```
279
276
In this example, after 18s the command shows that the executables; /usr/lib/postgresql/12/bin/psql and /usr/lib/postgresql/12/bin/postgres (deleted) generate the most activity.
280
277
281
-
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in `count` row and add a global process exclusion (in case of executable) or a global file/folder exclusion (in case of file) for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
278
+
To improve the performance of Defender for Endpoint on Linux, locate the path with the highest number in the count row and add a global process exclusion (if it's an executable) or a global file/folder exclusion (if it's a file) for it. For more information, see [Configure and validate exclusions for Defender for Endpoint on Linux](linux-exclusions.md).
282
279
283
280
## Troubleshoot performance issues using eBPF Statistics
284
281
285
282
**Applies to:**
286
283
- All file/ process events, including system call based performance issues.
287
284
288
-
eBPF (extended Berkeley Packet Filter) statistics command gives insights into the top event/process that's generating the most file events, along with their syscall ids. When system calls are being made from the system, there is a high amount of workload geenrated on your system. eBPF statistcs can be used to identify such issues.
285
+
eBPF (extended Berkeley Packet Filter) statistics command gives insights into the top event/process that's generating the most file events, along with their syscall IDs. When system calls are being made from the system, there's a high amount of workload generated on your system. eBPF statistics can be used to identify such issues.
289
286
290
287
To collect current statistics using eBPF statistics, run:
291
288
@@ -340,7 +337,7 @@ Configure Microsoft Defender for Endpoint on Linux with exclusions for the proce
340
337
The XMDEClientAnalyzer support tool contains syntax that can be used to limit the number of events being reported by the auditD plugin. This option will set the rate limit globally for AuditD causing a drop in all the audit events.
341
338
342
339
> [!NOTE]
343
-
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This could reduces the number of events for other subscribers as well.
340
+
> This functionality should be carefully used as limits the number of events being reported by the auditd subsystem as a whole. This the number of events for other subscribers as well.
344
341
345
342
The ratelimit option can be used to enable/disable this rate limit.
0 commit comments