1.3.4 - high cpu load - client login
-
@UWPVIOLATOR As long as things are “usable” you might have better luck just running:
UPDATE `hosts` SET `hostPubKey`= '', `hostSecToken` = '';
The hostSecTime is irrelevant at that point.
I don’t think simply clearing them will fix the problem though. I suspect what’s happening is the hosts are being “kicked” out because there’s simply too many.
Another way to achieve the “reset all” would be:
Put all hosts into a group.
From the group you can then reset all data (whether or not there is data to be reset).
-
We tried to put them all into one group before. We have to many hosts and it crashes.
Will try UPDATE
hosts
SEThostPubKey
= ‘’,hostSecTok
= ‘’;We want to leave FOG alone today since we can do imaging while the GPO is in effect. We will then schedule an update to RC10 or newest. Then see if it stays stable. Then start removing the GPO site by site to see if we crash it again.
Did you see the mpm_prefork.conf file I posted below? Does that look right?
-
ERROR 1054 (42S22): Unknown column ‘hostSecTok’ in ‘field list’
-
@UWPVIOLATOR Edited the original, sorry i missed the en at the end.
-
Query OK, 4023 rows affected (0.15 sec)
Rows matched: 21413 Changed: 4023 Warnings: 0 -
What is this doing that it is pulling so much resources? Happening multiple times a day.
-
could you verify for me the path listed for “Snapin Path” in your Storage management master node
-
@Junkhacker /opt/fog/snapins
Sorry for the confusion earlier with us all participating here, I should’ve introduced myself.
-
@andjjru i’m not entirely familar with that part of the code, but the md5sum task must be part of the image replicator service. i knew we did that for snapins, but i didn’t think we did it for images. anyway, perhaps you should try disabling IMAGEREPLICATORGLOBALENABLED until most of the clients have had a chance to check in and reset their keys
-
@Junkhacker Alright I disabled IMAGEREPLICATORGLOBALENABLED and that process went away. Thanks.
-
@UWPVIOLATOR said in 1.3.4 - high cpu load - client login:
What is this doing that it is pulling so much resources? Happening multiple times a day.
Not long ago, a week or so, a change was made so the entire images got hashed instead of just the first 10 megs.
Turn the occurrence of this way down:
Web Interface -> FOG Configuration -> FOG Settings -> FOG Linux Service Sleep Times -> IMAGEREPSLEEPTIME
Set that to something like 24 hours.The default is 600 seconds. What I’m guessing is you have a ton of images and it takes hours to hash them all - thus your FOG Server is always slammed.
-
@Wayne-Workman I will go back to using 10mb. It wasn’t using the first 10mb though. Because it was constantly pinging for traffic across ftp. It only checked the filesizes originally. While this worked, it failed to detect changes in files like d1.partitions that might have been updated.
So I re-added the “file hash” checking as a means but made it so the hashing was done at the “local” node’s rather than at the single “side”.
I am trying to check things out.
I’m thinking about testing the last 10mb of the file though as it’s fully possible the first 10 mb would be the same, but much less likely that the last 10 mb would be.
-
@Tom-Elliott This appears to work for hashing the last 10 megs. Also works for files that are sub-10MB
[root@fog-server Acerbase]# tail -c 10485760 d1p1.img | md5sum 326ea3163c9bc3e202fa323e47f02b23 -
-
@Wayne-Workman I’m probably going to go with sha512sum to ensure less potential of collision (while md5 shouldn’t have too many).
-
@Tom-Elliott Doesn’t really matter what you choose now that we’re only going to hash the last 10 megs. Speed differences in them won’t be noticeable.
-
Updated working-1.3.5.
I want to push up RC-11, but want to hear more back about the init’s (which will have to wait until at least tomorrow I think.)
-
Good News! CPU load was low all day today. Mid day we turned the FOG Service back on at a few sites. We will monitor this tomorrow morning then add more clients back and report back.
What we did.
Disabled IMAGEREPLICATORGLOBALENABLED
Increased MaxRequestWorkers from 150 to 500 in mpm_prefork_module
Reset all host encryption UPDATEhosts
SEThostPubKey
= ‘’,hostSecToken
= ‘’; -
Do you guys think it’s suitable to solve this yet, or just hold for a little bit?
Would you guys mind jumping on the working branch to see if the changes there will help fix the issue more directly? I believe the high load was coming from the constant md5summing that was happening for each image every cycle the replicator service was running.
I’ve switched out to using the first and last 10 mb of the files at both the remote and local systems, hash those together (Thanks @Wayne-Workman and @Junkhacker) and compare. So it’s still entirely possible that load can still get high (if it has to replicate multiple images/snapins at the same time) but it should be less CPU intensive during the “checking” processes.
-
We had <25% of clients enabled this morning. We need to clean up the snapshots on the server before we can update. It might be this afternoon or Monday.
We’re still going to re-enable clients in steps just to be safe. By Tuesday morning all clients should be running again.
Thanks again for all your time and effort!
-
One thing we notice that is still not working is WOL to Groups. WOL works for individual hosts but not for WOL to a Group. Also Report Management does not return anything for any of the reports.