Identifying process that is consuming kernel memory

Posted on 2011-03-02
Medium Priority
Last Modified: 2012-05-11
I need assistance identifying specifically what process/program is consuming resources until, ultimately, the multiple failures occur due to "insufficient resources".

I have generated tracking logs of memory usage using Performance Monitor and here is what I have learned so far.  On boot the system is fine and paged kernel memory usage will run in the 60 MB range.  During the evening the pooled paged memory usage will ramp up to about 120 MB and plateau there.  Each evening in which I do a backup the memory usage ramps up to a new plateau. It never goes back down.   Ultimately if I do not reboot the memory usage will hit the mid 300s and things go very bad quickly!

The ramping up appears to coincide with the period when the backup program is backing up local files on the server.  It does not appear to occur when the backup program is backing up files from client servers over the network.  Some testing I have done seems to indicate this problem is related to the antivirus program but this is not conclusive and I need to test further.  The antivirus is supposedly configured to trust the backup program and I believe this is to prevent it from scanning all the files while they were being backed up.  I will be contacting support representatives for the backup and antivirus programs but my gut experience tells me the better evidence I have in hand, the better chance I have of getting satisfaction from them.  Due to my experience with these vendors I am not looking forward to either call.

I am going to continue monitoring and testing but am hoping that someone out there can point me to a tool or method that will identify what specifically has claimed all that memory and won't give it back.

I should mention that this is a Windows 2003 Server file and mail server running Exchange Server 2003, Retrospect Server backup software and McAfee Security as a Service antivirus software.  The memory consumption does not begin when the Exchange store is backup up but rather when the files are being backed up.

Question by:fakaul
  • 3
  • 2
LVL 11

Expert Comment

ID: 35019994
You can try to monitor with perfmon the process you suspect.
For each process, look at paged memory, non-paged memory, or others counters.
I think you will find the one where the memory grow but is never free.

LVL 30

Expert Comment

by:Sudeep Sharma
ID: 35021542
Try Process Hacker:


Assisted Solution

fakaul earned 0 total points
ID: 35021907

I do not see counters for the Anti-virus software or the backup software listed in PerfMon.  I will see if I can find some that can be installed.  I have also just learned about a tool called POOLMON that looks promising.  I will check it and Process Hacker out.

We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

LVL 11

Accepted Solution

Tasmant earned 1000 total points
ID: 35025396
there is no special counters for your programs, but there is "processus" counter, on which you can choose what you want to monitor, and choose for which instance you want monitor (ie antivirus process, or backup process ...). You just have to identify the process, or if they don't run the time you choose counter, you will have to run the process to add it.

Author Comment

ID: 35062587
I am following up on using the process counters and will let you know how it works out.

Author Closing Comment

ID: 35331341
This information was helpful, especially combined with the PoolMon tool I located independently

Featured Post

WEBINAR: GDPR Implemented - Tips & Lessons Learned

Join the WatchGuard team on Thursday, March 29th as we recount some valuable lessons learned in weighing the needs of a business against the new regulatory environment, look ahead at the two months left before implementation, and help you understand the steps you can take today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Office 365 has multiple features and services which are specially designed to help businesses to reduce their dependence on on-premises IT resources. It also offers great flexibility and enhanced security. But like any other data, Office 365 mailbo…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question