The appearance processes Command
If CPU appliance is high, you will generally charge abundant added detail than the show
cpu acceptance command provides.This is area the appearance processes command comes in.
This command identifies every action active on the PIX firewall, how much
memory is it using, and CPU cycles.This advice is calm from the time
the PIX firewall was started. As apparent in Bulk 10.25, the achievement of this command
is voluminous; in fact, this is an abbreviated advertisement of the absolute output
from a PIX 501 firewall, the everyman end of the PIX firewalls. Here we do not
explain every row of this of the display, but we do altercate how to adapt what
you see in the columns. A abundant assay of this command is accessible on
Cisco’s Web armpit at www.cisco.com/warp/public/110/pix_shproc.html.
The aboriginal appearance in Column A refers to the antecedence of the process, which
can be ranked (highest antecedence to everyman priority): Critical,High,Medium, or
Low.The abutting two characters in Column A accredit to the accepted operating accompaniment of
the process, which can be any of the ethics apparent in Table 10.5.
www.syngress.com
Figure 10.25 Achievement of the appearance processes Command
Troubleshooting and Performance Ecology • Chapter 10 607
Table 10.5 Action Operating States
Value Accompaniment Description
* Currently running.
E Waiting For an accident to action or complete
(i.e., access-list or monitoring)
S Ready to run Gave up processor time allotment (idle)
rd Ready to run Conditions for activation accept occurred
we Waiting Watching for assertive action to occur
sa Sleeping Until a set time occurs, like 2 PM
si Sleeping For a set time
sp Sleeping For a set time (alternate)
st Sleeping Time cessation will activate
hg Hung Crash or error; eventually will clear
xx Dead Terminated and to be deleted
Columns B and C are the adverse and assemblage pointers for the action in question.
This is basically how the action is differentiated from added processes.
Column D identifies the cilia chain acclimated by the process, and this chain is
shared with added processes.The runtime bulk in Column E is how abundant CPU
time in milliseconds the action has captivated back it started.The SBASE
column denoted by F shows the starting abode amplitude for the process, and
Column G shows the arrangement of used/total accessible amplitude in bytes allocated to the
process. Bad processes will attack to access the amplitude acclimated by added processes.
Column H identifies the action name.
This command is actual advantageous to actuate the processes that are demography up
too abounding CPU cycles.To bulk this out, affair the appearance processes command twice,
waiting about 1 minute in between. For the action that you doubtable to be a
problem, decrease the Runtime bulk from the additional command from the
Runtime bulk from the aboriginal command.The aftereffect indicates the bulk of CPU
time (in milliseconds) the candy has accustomed during that 1 minute. It is
important to accept that some processes are appointed to run at certain
times, and others alone run back they accept advice to process.The 577poll
process about has the better runtime of all processes because this is the one
that acclamation Ethernet interfaces to see if they accept any abstracts that needs to be
processed.