Solved

nhttp processs using lot of CPU

Posted on 2001-07-29
5
1,471 Views
Last Modified: 2013-12-18
My http process has started to use 50% of the CPU.

Even when there is no one else logged in the server as soon as the process starts it uses 50%, as we have dual 700MHz processors I feel this is a little high!

Has anyone any idea what is going on and how to stop it!

Andy
0
Comment
Question by:a_murray
  • 2
5 Comments
 
LVL 10

Accepted Solution

by:
zvonko earned 200 total points
ID: 6332208
which release, wich protocols (http, ssl)?

when you do not start or do stop the http task with: tell http quit
what are the tasks less running then with: load http

also which Agent tasks are loaded when you load http?
to see this do following steps:
tell http quit
tell amgr quit
set conf Debug_AMgr=*
load amgr
(...wait untill completed message of all agents loding apears)
show tasks
load http
show tasks


Good luck,
zvonko
0
 
LVL 10

Expert Comment

by:zvonko
ID: 6632117
Hello Andy,

any progress here?
0
 

Author Comment

by:a_murray
ID: 6634877
We are due to rebuild the server soon anyway (we are moving it to a partitioned setup) so I might leave it until then!

I'll let you know how it goes.
0
 
LVL 63

Expert Comment

by:Zvonko
ID: 10476325
a_murray,
No comment has been added lately (835 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: Award points to zvonko http:#6332208
Please leave any comments here within 4 days.

-- Please DO NOT accept this comment as an answer ! --

Thanks,

Zvonko
EE Cleanup Volunteer
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

You’ve got a lotus Domino web server, and you have been told that “leverage browser caching” is a must do. This means that we have to tell the browser everywhere in the web to use cache. In other words, we set (and send) an expiration date in the HT…
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now