Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

CPU Overload - How to trace what is responsible?

Discussion in 'General Discussion' started by SuperBaby, Dec 8, 2004.

  1. SuperBaby

    SuperBaby Well-Known Member

    Joined:
    Nov 27, 2003
    Messages:
    337
    Likes Received:
    0
    Trophy Points:
    166
    Location:
    Thailand
    cPanel Access Level:
    Website Owner
    Twitter:
    Using "top", it shows that our server was heavily overloaded by "Perl". I believe that it is a buggy CGI program. How do I know which file is causing the overloading? Which log file can I trace and what to look for?
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  2. linux-image

    linux-image Well-Known Member

    Joined:
    Jun 8, 2004
    Messages:
    1,191
    Likes Received:
    1
    Trophy Points:
    168
    Location:
    India
    cPanel Access Level:
    Root Administrator
    on the "top" itself you will see the name of the program that is taking that resource.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. Host4u2

    Host4u2 Well-Known Member

    Joined:
    Mar 24, 2002
    Messages:
    248
    Likes Received:
    0
    Trophy Points:
    316
    via SSH, run "top" (no quotes) and do a SHIFT-P to Sort entries by CPU Usage. Also, via your WHM, look at "Sever Status/CPU/Memory/MySQL Usage" for hints.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  4. sb-host

    sb-host Member

    Joined:
    Apr 17, 2002
    Messages:
    8
    Likes Received:
    0
    Trophy Points:
    301
    I had a similar issue last week. Two perl processes kept running, and were consuming the CPU time. The owner was "perl", and there was no trace of it in WHM while looking at the CPU Use page.
    I finally did a "kill - [PID]" and it stopped the process, and it never came back. No ill effects were noted either.
    Glenn
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
    #4 sb-host, Dec 9, 2004
    Last edited: Dec 9, 2004
  5. AndyReed

    AndyReed Well-Known Member
    PartnerNOC

    Joined:
    May 29, 2004
    Messages:
    2,222
    Likes Received:
    4
    Trophy Points:
    193
    Location:
    Minneapolis, MN
    This is what is called "exploit". It is a way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it. Exploits are the root of the hacker culture. Hackers gain fame by discovering an exploit. Others gain fame by writing scripts for it. Legions of script-kiddies apply the exploit to millions of systems, whether it makes sense or not. Since people make the same mistakes over-and-over, exploits for very different systems start to look very much like each other. Most exploits can be classified under major categories: buffer overflow, directory climbing, defaults, Denial of Service.

    You need to protect your server and business!
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice