CPU steal time is the percentage of time a virtual CPU within a cloud server involuntarily waits on a physical CPU for its processing time. Learn more.
CLI tools can be used to efficiently monitor network traffic on Linux. Go through different scenarios in which they can be used.
Linux top commands help you monitor CPU and memory usage, disk I/O operations, network activity, port configuration, and a lot more. Learn how these top commands can help sysadmins.
The top command can become one of the most useful tools in your arsenal. Learn more about the most-used commands, understanding the top UI and metrics.
Learn how TLS works, the various protocols it supports, how it implements data encryption, and why it’s important to enable it on Linux systems to secure data.
TCP guarantees that network packets are received in the order they have been sent, without duplication. In this article, we will explore how TCP window scaling works, along with its advantages and disadvantages.
Network engineers and security experts need to have a good understanding of TCP flags and how they are used. Learn more.
Mastering network tools will help sysadmin to debug network issues faster. In this article, we will walk through different tools, and how we can use them properly to troubleshoot and resolve network problems.
Paging and memory swapping are two common memory management techniques for the allocation and deallocation of memory. Learn pertinent issues with page faults and memory swaps as commonly occurring exceptions.
Network file sharing (NFS) is a protocol used for sharing files and directories between computers on a network. Learn about the use cases, issues, and troubleshooting.
The netstat command is a tool for network diagnostics, configurations, and other port-scanning activities. Learn more
Threads are used to speed up the execution of processes by increasing parallelism. Learn about threads and processes in a Linux system, how to increase the maximum number of threads, and common commands for checking the number of threads per process.
When a process is consuming excessive system resources, killing it may be your best option. Learn the process of finding the PID for a given process and then killing the process using a few simple commands.
Devices use hardware interrupts to interact with the CPU. Learn how Linux kernels handle them.
IOPS and throughput are useful for assessing storage performance. Learn the relation between IOPS and throughput, and how to measure them.
Inodes keep track of all the files on a Linux system. Learn more about inodes, their limitations, and troubleshooting them.
Monitoring CPU utilization and CPU load is essential for optimizing performance. Learn how to monitor CPU load with common commands, the impact of high CPU load, and how to bring it under control for improved system performance.
Tracking and monitoring CPU efficiency are essential for handling system processes and resources. Learn mroe about the causes and effects of high CPU utilization.
CPU steal time is the percentage of time a virtual CPU within a cloud server involuntarily waits on a physical CPU for its processing time. Learn more.
We couldn't find any articles matching that topic.
Try using a differentkeyword or click the desired category on the left pane.