The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

CPU Overload - How to trace what is responsible?

Discussion in 'General Discussion' started by SuperBaby, Dec 8, 2004.

  1. SuperBaby

    SuperBaby Well-Known Member

    Joined:
    Nov 27, 2003
    Messages:
    331
    Likes Received:
    0
    Trophy Points:
    16
    Location:
    Thailand
    cPanel Access Level:
    Website Owner
    Twitter:
    Using "top", it shows that our server was heavily overloaded by "Perl". I believe that it is a buggy CGI program. How do I know which file is causing the overloading? Which log file can I trace and what to look for?
     
  2. linux-image

    linux-image Well-Known Member

    Joined:
    Jun 8, 2004
    Messages:
    1,192
    Likes Received:
    1
    Trophy Points:
    38
    Location:
    India
    cPanel Access Level:
    Root Administrator
    on the "top" itself you will see the name of the program that is taking that resource.
     
  3. Host4u2

    Host4u2 Well-Known Member

    Joined:
    Mar 24, 2002
    Messages:
    248
    Likes Received:
    0
    Trophy Points:
    16
    via SSH, run "top" (no quotes) and do a SHIFT-P to Sort entries by CPU Usage. Also, via your WHM, look at "Sever Status/CPU/Memory/MySQL Usage" for hints.
     
  4. sb-host

    sb-host Member

    Joined:
    Apr 17, 2002
    Messages:
    8
    Likes Received:
    0
    Trophy Points:
    1
    I had a similar issue last week. Two perl processes kept running, and were consuming the CPU time. The owner was "perl", and there was no trace of it in WHM while looking at the CPU Use page.
    I finally did a "kill - [PID]" and it stopped the process, and it never came back. No ill effects were noted either.
    Glenn
     
    #4 sb-host, Dec 9, 2004
    Last edited: Dec 9, 2004
  5. AndyReed

    AndyReed Well-Known Member
    PartnerNOC

    Joined:
    May 29, 2004
    Messages:
    2,222
    Likes Received:
    3
    Trophy Points:
    38
    Location:
    Minneapolis, MN
    This is what is called "exploit". It is a way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it. Exploits are the root of the hacker culture. Hackers gain fame by discovering an exploit. Others gain fame by writing scripts for it. Legions of script-kiddies apply the exploit to millions of systems, whether it makes sense or not. Since people make the same mistakes over-and-over, exploits for very different systems start to look very much like each other. Most exploits can be classified under major categories: buffer overflow, directory climbing, defaults, Denial of Service.

    You need to protect your server and business!
     
Loading...

Share This Page