The appearance processes Command

The appearance processes Command

If CPU appliance is high, you will generally charge abundant added detail than the show

cpu acceptance command provides.This is area the appearance processes command comes in.

This command identifies every action active on the PIX firewall, how much

memory is it using, and CPU cycles.This advice is calm from the time

the PIX firewall was started. As apparent in Bulk 10.25, the achievement of this command

is voluminous; in fact, this is an abbreviated advertisement of the absolute output

from a PIX 501 firewall, the everyman end of the PIX firewalls. Here we do not

explain every row of this of the display, but we do altercate how to adapt what

you see in the columns. A abundant assay of this command is accessible on

Cisco’s Web armpit at www.cisco.com/warp/public/110/pix_shproc.html.

The aboriginal appearance in Column A refers to the antecedence of the process, which

can be ranked (highest antecedence to everyman priority): Critical,High,Medium, or

Low.The abutting two characters in Column A accredit to the accepted operating accompaniment of

the process, which can be any of the ethics apparent in Table 10.5.

www.syngress.com

Figure 10.25 Achievement of the appearance processes Command

Troubleshooting and Performance Ecology • Chapter 10 607

Table 10.5 Action Operating States

Value Accompaniment Description

* Currently running.

E Waiting For an accident to action or complete

(i.e., access-list or monitoring)

S Ready to run Gave up processor time allotment (idle)

rd Ready to run Conditions for activation accept occurred

we Waiting Watching for assertive action to occur

sa Sleeping Until a set time occurs, like 2 PM

si Sleeping For a set time

sp Sleeping For a set time (alternate)

st Sleeping Time cessation will activate

hg Hung Crash or error; eventually will clear

xx Dead Terminated and to be deleted

Columns B and C are the adverse and assemblage pointers for the action in question.

This is basically how the action is differentiated from added processes.

Column D identifies the cilia chain acclimated by the process, and this chain is

shared with added processes.The runtime bulk in Column E is how abundant CPU

time in milliseconds the action has captivated back it started.The SBASE

column denoted by F shows the starting abode amplitude for the process, and

Column G shows the arrangement of used/total accessible amplitude in bytes allocated to the

process. Bad processes will attack to access the amplitude acclimated by added processes.

Column H identifies the action name.

This command is actual advantageous to actuate the processes that are demography up

too abounding CPU cycles.To bulk this out, affair the appearance processes command twice,

waiting about 1 minute in between. For the action that you doubtable to be a

problem, decrease the Runtime bulk from the additional command from the

Runtime bulk from the aboriginal command.The aftereffect indicates the bulk of CPU

time (in milliseconds) the candy has accustomed during that 1 minute. It is

important to accept that some processes are appointed to run at certain

times, and others alone run back they accept advice to process.The 577poll

process about has the better runtime of all processes because this is the one

that acclamation Ethernet interfaces to see if they accept any abstracts that needs to be

processed.