10-01-2011
What's "a rush of traffic"? How big is it? 10 users? 10,000? If you're using HTTPS, the encryption/decryption is CPU-intensive, so a lot of users could very well peg your CPUs.
10 More Discussions You Might Find Interesting
1. AIX
after a long period of running, the network application's CPU load in our syst em increase slowly, the failed at the end. we use "truss" tool to trace the process, found that it processes something like "semop" ,"semctl","thread_waitlock","kread" kernel call . The trace log file looks like the... (0 Replies)
Discussion started by: Frank2004
0 Replies
2. UNIX for Advanced & Expert Users
Hi,
I am seeing very high kernel usage and very high load averages on my system (Although we are not loading much data to our database). Here is the output of top...does anyone know what i should be looking at?
Thanks,
Lorraine
last pid: 13144; load averages: 22.32, 19.81, 16.78 ... (4 Replies)
Discussion started by: lorrainenineill
4 Replies
3. HP-UX
Hi All.
In my production server the load is very high.
normally it used to be less than 1,but now it is more than 5.
I am new to unix all together.
I want to know what is the reason behind high load.
and if it is high what is the impact? (4 Replies)
Discussion started by: jyoti
4 Replies
4. Red Hat
Hi Buddies,
Thanx for reading my first post...
After googling a lot and searching so many forums I am feeling down a bit...
Please don't mind my ignorence, and my grammer ... :)
My server is running RHEL 2.6.9-5.EL. The cpu load is going higher than roof, almost 100 sometimes.
I am... (2 Replies)
Discussion started by: squid04
2 Replies
5. Solaris
Hi All
My Server is doing a very intense netowrk traffic operations and the cards are under very high pressure.
I need to call NETSTAT on the shell. Do you know whether this command, under high pressure, might have some impact on the server traffic or can I proceed without any problem? (2 Replies)
Discussion started by: manustone
2 Replies
6. UNIX for Advanced & Expert Users
I'm not sure if this belong in dummies or advanced so I made my best guess. Go easy on me if I get it wrong.
I'm trying to determine what a high load for my system is. I run a php/mysql web server with a dedicated host. The host has a Intel Xeon 3110 (Dual Core) processor.
Our load seems to... (5 Replies)
Discussion started by: vanguard
5 Replies
7. Shell Programming and Scripting
Hi ,
I am trying to :wall: my head while scripting ..I am really new to this stuff , never did it before :( .
how to find cpu's system high time and user time high in a script??
thanks , help would be appreciated !
:) (9 Replies)
Discussion started by: sushwey
9 Replies
8. Shell Programming and Scripting
Hi,
could someone give me an example for a debian server script? I need to check a process if the process has a high cpu load (top).
If yes the whole server needs to reboot.
Thats it, nothing more. ;)
Hope someone could help me.
Regards
woisch (2 Replies)
Discussion started by: woisch
2 Replies
9. Red Hat
Got two RHEL servers - one real and one virtual/cloud.
Both run apache web server.
When traffic is applied, CPU seems to go quite high on virtual one (20%) but real is not really affected. Worry is that a further increase in traffic will see a problem.
Experience of RHEL is limited. Whats... (2 Replies)
Discussion started by: psychocandy
2 Replies
10. UNIX for Dummies Questions & Answers
I have a 12 core linux cpu but the load is really high on this box, hovering around 50. What configuration changes do we need to make so that system have no bottleneck. (13 Replies)
Discussion started by: Moon1234
13 Replies
LEARN ABOUT DEBIAN
netsniff-ng
netsniff-ng(8) netsniff-ng-toolkit netsniff-ng(8)
NAME
netsniff-ng - the packet sniffing beast
SYNOPSIS
netsniff-ng -i|-d|--dev|--in <dev|pcap> -o|--out <dev|pcap|dir|txf> [-f|--filter <bpf-file>][-t|--type <type>][-F|--interval <uint>]
[-s|--silent][-J|--jumbo-support][-n|--num <uint>][-r|--rand] [-M|--no-promisc][-m|--mmap | -c|--clrw][-S|--ring-size <size>]
[-k|--kernel-pull <uint>][-b|--bind-cpu <cpu> | -B|--unbind-cpu <cpu>] [-H|--prio-high][-Q|--notouch-irq][-q|--less | -X|--hex |
-l|--ascii] [-v|--version][-h|--help]
DESCRIPTION
The first sniffer that invoked both, the zero-copy RX_RING as well as the zero-copy TX_RING for high-performance network I/O and
scatter/gather or mmaped PCAP I/O.
EXAMPLES
netsniff-ng --in eth0 --out dump.pcap
Capture traffic from interface 'eth0' and save it pcap file 'dump.pcap'
netsniff-ng --in any --filter http.bpf --payload
Capture HTTP traffic from any interface and print its payload on stdout
netsniff-ng --in wlan0 --bind-cpu 0,1
Capture all traffic from wlan0 interface. Schedule process on CPU 0 and 1.
OPTIONS
-i|-d|--dev|--in <dev|pcap>
Input source. Can be a network device or pcap file.
-o|--out <dev|pcap|dir|txf>
Output sink. Can be a network device, pcap file, a trafgen txf file or a directory. (There's only pcap to txf translation possible.)
-f|--filter <bpf-file>
Use BPF filter file from bpfc.
-t|--type <type>
Only handle packets of defined type:
- broadcast
- multicast
- others
- outgoing
-F|--interval <uint>
Dump interval in seconds. if -o is a directory, a new pcap will be created at each interval. The older files are left untouched.
(default value: 60 seconds)
-s|--silent
Do not print captured packets to stdout.
-J|--jumbo-support
Support for 64KB Super Jumbo Frames.
-n|--num <uint>
When zerp, capture/replay until SIGINT is received (default). When non-zero, capture/replay the number of packets.
-r|--rand
Randomize packet forwarding order (replay mode only).
-M|--no-promisc
Do not place the interface in promiscuous mode.
-m|--mmap
Mmap pcap file i.e., for replaying. Default: scatter/gather I/O.
-c|--clrw
Instead of using scatter/gather I/O use slower read(2)/write(2) I/O.
-S|--ring-size <size>
Manually set ring size in KB/MB/GB, e.g. '10MB'.
-k|--kernel-pull <uint>
Kernel pull from user interval in microseconds. Default is 10us. (replay mode only).
-b|--bind-cpu <cpu>
Bind to specific CPU (or CPU-range).
-B|--unbind-cpu <cpu>
Forbid to use specific CPU (or CPU-range).
-H|--prio-high
Run the process in high-priority mode.
-Q|--notouch-irq
Do not touch IRQ CPU affinity of NIC.
-q|--less
Print less-verbose packet information.
-X|--hex
Print packet data in hex format.
-l|--ascii
Print human-readable packet data.
-v|--version
Print version.
-h|--help
Print help text and lists all options.
AUTHOR
Written by Daniel Borkmann <daniel@netsniff-ng.org> and Emmanuel Roullit <emmanuel@netsniff-ng.org>
DOCUMENTATION
Documentation by Emmanuel Roullit <emmanuel@netsniff-ng.org>
BUGS
Please report bugs to <bugs@netsniff-ng.org>
2012-06-29 netsniff-ng(8)