docs/content/stable/faq/antivirus.md
Most endpoint protection tools (antivirus (AV) or endpoint detection and response (EDR)) work by intercepting file and process activity at the OS level. Common mechanisms include:
Real-time (on-access) scanning
Files are scanned when created, opened, modified, or deleted. In database workloads, this applies to every write, flush, compaction, and log operation.
Process and behaviour monitoring
Security agents observe patterns such as sustained high I/O, frequent file rewrites, and memory activity. Database engines naturally exhibit these patterns during regular operation.
File handling interference (in some configurations)
Scanners may briefly hold files open, delay close/unlink operations, or apply remediation actions. Even short interruptions at the filesystem layer can affect database stability and latency.
These behaviours are common across enterprise security products and are widely recognised as incompatible with high-throughput database storage paths unless exclusions are configured.
Use the following recommendations to minimize issues when running endpoint protection tools on VMs hosting YugabyteDB or YugabyteDB Anywhere.
Database workloads generate sustained high-frequency file activity due to:
Real-time scanning of these paths can result in:
These behaviours are commonly documented across enterprise databases and are not unique to YugabyteDB.
If the security policy requires anti-malware software to stay enabled, configure explicit exclusions for all YugabyteDB data and log directories: ATA storage (RocksDB files, WAL, intents, metadata), logs, local snapshots and backup staging areas.
Default paths (adjust to match your deployment):
/home/yugabyte/yb-data/
/mnt/*/yb-data/
/data*/yb-data/
/var/lib/yugabyte/
/home/yugabyte/master/logs/
/home/yugabyte/tserver/logs/
/home/yugabyte/controller/logs/
Any custom directories configured via:
/opt/yugabyte/node-agent/logs or /home/yugabyte/node-agent/logs
If your deployment uses custom mount points or non-default layouts, ensure those locations are excluded as well.
To preserve security visibility, exclusions should not usually include:
If required, {{% support-general %}} can help you validate an exclusion list based on your deployment configuration.
YugabyteDB Anywhere is the control plane that orchestrates universes, manages backups, executes automation tasks, handles credentials, and coordinates node agents. While YugabyteDB Anywhere is not on the hot data path like a YB-TServer, it still performs frequent file, process, and network activity that can be disrupted by aggressive AV, EDR, or endpoint scanning policies.
YugabyteDB Anywhere hosts typically perform:
Real-time scanning can interfere with this behaviour and may result in:
If security policy requires AV/EDR to remain enabled, configure path exclusions for YugabyteDB Anywhere's high-churn directories.
Exclude directories used for YugabyteDB Anywhere data, logs, backups, metadata, temporary working directories, support bundle generation, and runtime artifacts.
Typical YugabyteDB Anywhere paths for installations using the default layout:
If you use custom paths (that is, non-default install directories), ensure those are included.
Some YugabyteDB Anywhere workflows are particularly sensitive to scanning interference:
In environments where scanning interferes, symptoms often appear as:
These symptoms frequently resolve once exclusions are applied.
To preserve security posture, exclusions should not typically include:
Scope exclusions to YugabyteDB Anywhere-specific directories only.