[dotnet-trace][CollectLinux] Add capability to probe .NET processes for UserEvents IPC Command Support #5657
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR gives
dotnet-trace collect-linuxthe option--probeto display which .NET processes are capable of parsing an EventPipe UserEvents IPC Command without collecting a trace. The option is compatible with-p|--process-idand-n|--nameto probe a single .NET process. It is also compatible with-o|--outputto generate a csv file ordered with supported processes first followed by unsupported in the formatpid,processName,supportsCollectLinux(e.g.1234,MyApp,true).This also changes the behavior of
collect-linuxwhen tracing a single process from a silent failure to erroring with a message indicating that the single .NET process' runtime is not > 10.0.0.Support is determined as .NET Runtime 10.0.0 Release and onward.
Probe option
Example outputs
One process that running .NET 10.0.0 and another using a preview.
Printing csv to console
Writing results to csv file
Generated csv
Targeting a single process running .NET runtime 10.0.0
Targeting a single process older than .NET runtime 10.0.0 release