Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Btop is a much-improved take on the Linux top command

Researcher by Researcher
July 30, 2022
in Networking
0
Btop is a much-improved take on the Linux top command
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


If you’re on the hunt for an improved version of the Linux top command, Jack Wallen believes btop is the way to go.

server configuration command lines on a monitor
Image: ronstik/Adobe Stock

Open source: Must-read coverage

Over the years, I cannot tell you how many times I’ve had to use the Linux top command to troubleshoot problems on server and desktop deployments. It seems like top should be able to do more, which is why I’m always on the lookout for a replacement of that command.

On the desktop, there’s GNOME System Monitor, which is a well-designed GUI that makes managing processes simple. But even GNOME System Monitor has its limitations.

So when I came across a tool named btop, I was thrilled that it took that old standby and gave it much-needed features. Not only does btop list out various system usages including memory, disks, network and processes, but it also allows for interaction with the mouse. Even on a server installation, you can point and click your way around btop to view processes as a tree, hide or reveal certain displays, and access an options menu where you can tweak the look and feel of the display.

SEE: Top Linux commands admins needs to know (TechRepublic Premium)

The btop features list includes:

  • A game-inspired menu system
  • Full mouse support
  • Arrow keys process selection
  • Detailed stats for the selected process
  • Process filters
  • Easily switch between sorting options
  • Signal send to the selected process
  • Configuration via menu
  • Auto-scaling graph for network I/O
  • Shows IO activity/speeds for disks
  • Battery meter
  • Custom presets

What you’ll need to install and use btop

Btop can be installed on just about any Linux distribution from default repositories. I’ll demonstrate the installation on both a Ubuntu-based distribution and an RHEL-based distribution. Other than having a running instance of Linux, you’ll also need a user with sudo privileges. Let’s get to the installation.

How to install btop

On a Ubuntu-based distribution, which for me is Pop!_OS, the installation is accomplished with the command:

sudo apt-get install btop -y

If you’re on an RHEL-based Linux distribution such as Fedora or Rocky Linux, the installation command is:

sudo dnf install btop -y

How to use btop

From the terminal window, issue the command:

btop

You should immediately be greeted by the btop app (Figure A).

Figure A

Btop is running on Pop!_OS.

Using your mouse, you can click on any section to hide or reveal details and your arrow keys to navigate to a process. If you select a process, click your keyboard’s Enter key to reveal the details (Figure B).

Figure B

The details for containerd are revealed in btop.

If you click Menu at the top left, you can then select Options to access the configuration options available for the app (Figure C).

Figure C

The btop Options menu.

The menu is fairly straightforward, so you shouldn’t have any problem figuring out any of the options.

And that, my fellow Linux admins and enthusiasts, is how to get a much-improved version of top on your desktops and servers. Trust me when I tell you btop will have you leaving top behind without so much as a second of regret.

Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.



Source link

Related articles

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
MX Linux makes sharing folders with Samba as simple as it gets

MX Linux makes sharing folders with Samba as simple as it gets

August 10, 2022
Tags: BtopCommandLinuxmuchimprovedTop
Share76Tweet47

Related Posts

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
0

Today’s hybrid work environments make it increasingly difficult to monitor, secure and optimize network connectivity and application performance. 40% of...

MX Linux makes sharing folders with Samba as simple as it gets

MX Linux makes sharing folders with Samba as simple as it gets

August 10, 2022
0

Jack Wallen shows you how easy it is to share directories to your local network through Samba with MX Linux....

To Upgrade, or Simply Renew? That is the Question.

To Upgrade, or Simply Renew? That is the Question.

August 9, 2022
0

Cisco DNA for SD-WAN and Routing subscription software has been around for the better part of three years now. If...

Cisco Wireless 3D Analyzer: High Level View on Latest Innovations

Cisco Wireless 3D Analyzer: High Level View on Latest Innovations

August 8, 2022
0

Wireless connections are ubiquitous and have become a part of our daily lives no differently than electricity. Planning, maintaining, and...

Cisco DNA Center Release 2.3.3 – What’s New?

Cisco DNA Center Release 2.3.3 – What’s New?

August 5, 2022
0

Ever have one of those days where you’ve almost reached the office and you realize you left your laptop at...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved