HPE GreenLake Administration
- Community Home
- >
- Storage
- >
- Midrange and Enterprise Storage
- >
- HPE EVA Storage
- >
- High CPU utilisation by Secure Path agent on Solar...
HPE EVA Storage
1829456
Members
1836
Online
109992
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-17-2004 09:50 PM
11-17-2004 09:50 PM
High CPU utilisation by Secure Path agent on Solaris 8 host
Hi All,
Ever since I installed Secure Path V3.0D on a Solaris 8 host with all the latest patches, secure path agents is displaying high CPU utilisation patterns.
Any information would be appreciated?
Regards,
Saket
Ever since I installed Secure Path V3.0D on a Solaris 8 host with all the latest patches, secure path agents is displaying high CPU utilisation patterns.
Any information would be appreciated?
Regards,
Saket
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-16-2005 02:17 PM
01-16-2005 02:17 PM
Re: High CPU utilisation by Secure Path agent on Solaris 8 host
I am also experiencing this issue with the same environmental factors as well. Did you find a resolution?
Thanks...
Thanks...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-16-2005 02:49 PM
01-16-2005 02:49 PM
Re: High CPU utilisation by Secure Path agent on Solaris 8 host
Max,
I logged a call with HP in regard to this. Prior to that, we established that Nessus scanning which is performed on all our production host was actually causing the spagent to get into a silly state and causing high CPU. Even if you try to telnet to the ports used by "spagent", you can hike up the CPU utilisation which is scary, as any one with malicious inentions can just telnet a number of times to spagent's ports to bring your production service to its knees effectively bringing it down.
After much investigation, HP acknowledged this fact and have provided with a modified binary file for "spagent" as a bug-fix.
The updated binary seems to have fixed this issue. However, I do not believe the updated binary has been released on HP's web site yet as it still needs to go through their proper testing/certification, etc.
You may want to liaise with your HP support center and make them aware of it if they are not already.
Good luck.
I logged a call with HP in regard to this. Prior to that, we established that Nessus scanning which is performed on all our production host was actually causing the spagent to get into a silly state and causing high CPU. Even if you try to telnet to the ports used by "spagent", you can hike up the CPU utilisation which is scary, as any one with malicious inentions can just telnet a number of times to spagent's ports to bring your production service to its knees effectively bringing it down.
After much investigation, HP acknowledged this fact and have provided with a modified binary file for "spagent" as a bug-fix.
The updated binary seems to have fixed this issue. However, I do not believe the updated binary has been released on HP's web site yet as it still needs to go through their proper testing/certification, etc.
You may want to liaise with your HP support center and make them aware of it if they are not already.
Good luck.
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP