Processes
The Processes tab displays a real-time snapshot of active system-level processes running inside your application container at the time of the scan. This data is essential for understanding what the container is executing and identifying potential anomalies.
How To Access
My Apps → Active Apps → App Details → Manage App → Local App Management → Processes
Navigate to the My Apps tab, select an application from Active Apps, click Manage App, then go to the Local App Management section and open the Processes tab.
Backend Selector
At the top you'll find a FluxNode IP selector, letting you choose which node you want to inspect or control. This allows you to manage individual node instances of your app. A reload button is also available to refresh the list of currently active FluxNodes running your application.

What You'll See
The data in this tab presents standard process data similar to output from Linux's ps
command, including:
UID
The user ID that owns the process.
PID
The process ID — a unique identifier for each running process.
PPID
The parent process ID — helps track which process started the current one.
C
CPU utilization of the process.
STIME
The start time of the process.
TTY
Terminal associated with the process (if any).
TIME
Total CPU time consumed by the process.
CMD
The full command line that launched the process.

Why This Is Useful
Validate Expected Processes: Confirm that only your app and its intended components are running.
Detect Anomalies or Threats: Unexpected or unknown processes—especially under
root
—can indicate misconfigurations or security concerns.Debug Startup Issues: Trace parent-child process relationships to identify failed or orphaned components.
Audit Container Activity: Combine with File Changes and Network data to reconstruct container behavior.
Example Insights
If you see:
/bin/bash /entrypoint.sh
/opt/timpi/TimpiUI
/opt/timpi/TimpiCollector
You can infer that:
The container uses a custom startup script.
It launches two application components (UI and Collector).
All processes are running as
root
, which may require review for security hardening.
Last updated