- 积分
- 347
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2012-10-25
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
![Rank: 3](https://cdn.hh010.com/static/image/common/star_level1.gif) ![Rank: 3](https://cdn.hh010.com/static/image/common/star_level1.gif) ![Rank: 3](https://cdn.hh010.com/static/image/common/star_level1.gif)
|
请教各位大神 我公司的核心交换机6509出现cpu使用率高达99%,出现这个问题是公司DBA在两台数据库服务器上拷贝数据使用的scp,只要使用scp协议拷贝数据核心交换机cpu使用率就99%,而使用sftp协议就不会出现这个问题,cpu使用率高的时候查看过进程主要是交换机的IN PUT进程cpu使用率高,交换机ios为s72033-advipservicesk9_wan-mz.122-33.SXI14.bin,debug过看日志都是这两台数据库之间的ack包,而且发包非常多,有大神知道为什么用scp协议就会出现这个问题吗?
CPU utilization for five seconds: 99%/61%; one minute: 99%; five minutes: 99%
日志
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, output feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK, IPsec or interface ACL checked on pre-encrypted cleartext packets(31), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), g=10.1.104.85, len 1500, forward
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, post-encap feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK, MTU Processing(4), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, post-encap feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK, IP Protocol Output Counter(5), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, post-encap feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK, IP Sendself Check(8), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, post-encap feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK, HW Shortcut Installation(15), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, sending full packet
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656844129, ack=2198243737, win=223 ACK
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85, len 1500, input feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656845577, ack=2198243737, win=223 ACK, MCI Check(55), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: FIBipv4-packet-proc: route packet from Vlan101 src 10.1.101.67 dst 10.1.104.85
Aug 6 16:10:22: FIBipv4-packet-proc: packet routing succeeded
Aug 6 16:10:22: IP: tableid=0, s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), routed via FIB
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, output feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656845577, ack=2198243737, win=223 ACK, IP Post Routing Processing(22), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, output feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656845577, ack=2198243737, win=223 ACK, IPsec or interface ACL checked on pre-encrypted cleartext packets(31), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), g=10.1.104.85, len 1500, forward
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656845577, ack=2198243737, win=223 ACK
Aug 6 16:10:22: IP: s=10.1.101.67 (Vlan101), d=10.1.104.85 (Vlan104), len 1500, post-encap feature
Aug 6 16:10:22: TCP src=22, dst=36245, seq=1656845577, ack=2198243737, win=223 ACK, MTU Processing(4), rtype 1, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
|
|