Solved

How to debug NT services for CPU spikes?

Posted on 2009-05-08
5
260 Views
Last Modified: 2013-12-03
Looking for some guidelines for troubleshooting CPU spikes caused by NT services. I've created the dumps on the service in question, using DebugDiag but reading dump using WinDbg tool does not appear to be an easy task. I need to get to the source level and see where the spike is orginating from. I do not have access to source code of that service.  There is vast information on the net but looking for a right direction ... Thanks for your help in advance
0
Comment
Question by:ExcUsr2008
  • 3
  • 2
5 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 24342969
>>I need to get to the source level and see where the spike is orginating from.
>>I do not have access to source code of that service.

Sorry, but these two points contradict each other. You cannot get to a source level if you don't have the source or at least teh sympol information files.
0
 

Author Comment

by:ExcUsr2008
ID: 24346633
If i download the symbols from http://msdl.microsoft.com/download/symbols, would that work? Thanks for your response.  
0
 
LVL 86

Expert Comment

by:jkr
ID: 24349731
Hm, what kind of service is that? If it is not from MS, then the answer is "No".
0
 

Author Comment

by:ExcUsr2008
ID: 24349752
Like i mentioned in my question, it is a NT Service, developed using .net framework (not sure of the version), thanks.
0
 
LVL 86

Accepted Solution

by:
jkr earned 500 total points
ID: 24350039
Well, usually MS has only symbol files for services created by MS. So if that is not the case and the vedor refuses to provide these files to you, it is quite unlikely that you can get down to the source level. It will be possible for you to tell what Windows APIs are called during these spikes, but...
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Entering time in Microsoft Access can be difficult. An input mask often bothers users more than helping them and won't catch all typing errors. This article shows how to create a textbox for 24-hour time input with full validation politely catching …
Performance in games development is paramount: every microsecond counts to be able to do everything in less than 33ms (aiming at 16ms). C# foreach statement is one of the worst performance killers, and here I explain why.
This is Part 3 in a 3-part series on Experts Exchange to discuss error handling in VBA code written for Excel. Part 1 of this series discussed basic error handling code using VBA. http://www.experts-exchange.com/videos/1478/Excel-Error-Handlin…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now