This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion
Parents Reply Children
  • I've seen this kind of thing before and haven't figured it out: sometimes the CPU usage goes up for hours at a time and then return to more normal. My first thought is that some process is doing something like recreating one of its databases in the background, but that probably doesn't make sense. (I'm thinking of major MacOS upgrades that can often burn CPU for the first day or so because of updates to indexing, uploads to iCloud/iPhotos, etc. Probably not the same kind of mechanism going on here.)

  • I might have found something. I noticed openssl repeatedly in top on the virtualized XG that's showing increased CPU. So I went on and investigated. It appears that every 20 seconds openssl is trying to generate something:


    while : ; do pgrep -lf openssl ; sleep 0.5; done
    
    4956 openssl genrsa -aes128 -out /tmp/hbtrust.901Y38Gn_m/server.key -F4 -rand /dev/urandom -passout pass:ozaywt5Xxlu1F8_d5X 4096
    4956 openssl genrsa -aes128 -out /tmp/hbtrust.901Y38Gn_m/server.key -F4 -rand /dev/urandom -passout pass:ozaywt5Xxlu1F8_d5X 4096
    4956 openssl genrsa -aes128 -out /tmp/hbtrust.901Y38Gn_m/server.key -F4 -rand /dev/urandom -passout pass:ozaywt5Xxlu1F8_d5X 4096
    4956 openssl genrsa -aes128 -out /tmp/hbtrust.901Y38Gn_m/server.key -F4 -rand /dev/urandom -passout pass:ozaywt5Xxlu1F8_d5X 4096
    4956 openssl genrsa -aes128 -out /tmp/hbtrust.901Y38Gn_m/server.key -F4 -rand /dev/urandom -passout pass:ozaywt5Xxlu1F8_d5X 4096
    ~20 seconds
    5130 openssl genrsa -aes128 -out /tmp/hbtrust.rOckAvqxgb/server.key -F4 -rand /dev/urandom -passout pass:eq4Kntm2LePbMIItgw 4096
    ...
    5130 openssl genrsa -aes128 -out /tmp/hbtrust.rOckAvqxgb/server.key -F4 -rand /dev/urandom -passout pass:eq4Kntm2LePbMIItgw 4096
    ~20 seconds
    5347 openssl genrsa -aes128 -out /tmp/hbtrust.tZT4TgMZWx/server.key -F4 -rand /dev/urandom -passout pass:9jvJJ83hprZ4KlQQAzyc4Q 4096
    ...
    5347 openssl genrsa -aes128 -out /tmp/hbtrust.tZT4TgMZWx/server.key -F4 -rand /dev/urandom -passout pass:9jvJJ83hprZ4KlQQAzyc4Q 4096
    ~20 seconds
    5607 openssl genrsa -aes128 -out /tmp/hbtrust.U5TMYmug4p/server.key -F4 -rand /dev/urandom -passout pass:Dy4tYYloBN_W3A3h8SWZ 4096
    ...
    5607 openssl genrsa -aes128 -out /tmp/hbtrust.U5TMYmug4p/server.key -F4 -rand /dev/urandom -passout pass:Dy4tYYloBN_W3A3h8SWZ 4096
    
      PID  PR  NI  VIRT  RES  SHR S %CPU %MEM    TIME+  COMMAND
     6873  20   0  5960 2252 2044 R 99.4  0.1   0:02.01 openssl
    

    You get the pattern.

    I'm not seeing that on HW Appliances running 18.5.2.

  • I see the same thing on my VM. Hardware version like you mentioned does not have this issue.

  • Its trying to generate encrypted key and until it successfully generates, it keeps trying every 20secs. Generally it should be successful pretty fast and in first go. We tried reproducing on our VM setup and could not reproduce the issue.

    Please try to provide access to your system.

  • How would you like to access system? I can provide access......let me know.

  • Thanks! One suggestion when communicating with customers: could you please say "provide access via Diagnostics > Support Access"? This makes it clear that it's a safe, limited, one-button-click ON/OFF option. I had a run-around with an engineer on a call who kept saying they'd need access to the system but I would not have to provide a password.

    Those of us who have not dealt with Sophos support asking for access probably don't remember the switch, and we're thinking providing logins, passwords, making login available from the WAN, and all kinds of painful thoughts. So specifying the method up front would avoid the shock (and defensiveness) of thinking we're being asked to provide WAN-accessible accounts/logins/passwords.

    Appreciate your help, and not trying to criticize. Actually, just wanting to make your life a bit easier.