<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Audit high CPU in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192552#M32260</link>
    <description>&lt;P&gt;It's sort of possible. Check out the description of cpview in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk101878" target="_self"&gt;sk101878&lt;/A&gt;. Specifically, you can use cpview's history logging to view&amp;nbsp;&lt;EM&gt;some&lt;/EM&gt; information from previous dates. This functionality is enabled by default on recent versions, but was not enabled by default on older versions. It also has limitations. For example, it samples every few minutes, so a spike between two samples may not be visible.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Sep 2023 14:34:13 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2023-09-13T14:34:13Z</dc:date>
    <item>
      <title>Audit high CPU</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192545#M32258</link>
      <description>&lt;P&gt;Hello, everybody.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know if it is possible to "investigate" the "root-cause" of a high CPU consumption of a GW (which is part of a Cluster), weeks ago?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a customer, who for some strange reason, wants to know, why his CPU "shot" in terms of consumption, but about 6 weeks ago.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to check this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your comments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 13:57:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192545#M32258</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-09-13T13:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Audit high CPU</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192549#M32259</link>
      <description>&lt;P&gt;Gather a CPinfo &amp;amp; HCP and review them with TAC based on the specific incident time line.&lt;/P&gt;
&lt;P&gt;Hopefully there is data/clues for the period in question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 14:29:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192549#M32259</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-09-13T14:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: Audit high CPU</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192552#M32260</link>
      <description>&lt;P&gt;It's sort of possible. Check out the description of cpview in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk101878" target="_self"&gt;sk101878&lt;/A&gt;. Specifically, you can use cpview's history logging to view&amp;nbsp;&lt;EM&gt;some&lt;/EM&gt; information from previous dates. This functionality is enabled by default on recent versions, but was not enabled by default on older versions. It also has limitations. For example, it samples every few minutes, so a spike between two samples may not be visible.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 14:34:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192552#M32260</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-09-13T14:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Audit high CPU</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192564#M32263</link>
      <description>&lt;P&gt;The &lt;STRONG&gt;cpview&lt;/STRONG&gt; (via the -t historical mode) and &lt;STRONG&gt;sar&lt;/STRONG&gt; commands automatically maintain 30 days of historical data.&amp;nbsp; Further back than that you will need to rely on logfiles assuming they have not already rolled off such as:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;/var/log/messages*&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;/var/log/spike_detective/spike_detective.log&lt;/P&gt;
&lt;P&gt;If you have the monitoring blade enabled with the right options on your gateway you can also try a System Counters...Firewall History or&amp;nbsp;System Counters...System History report and set the timeframe for "since system installed".&amp;nbsp; You may be able to also&amp;nbsp; construct a custom SmartView Monitor historical report that goes back more than 30 days.&amp;nbsp; Beyond that there isn't much else to look at if you need to go back more than 30 days unless you have SmartEvent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 15:36:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Audit-high-CPU/m-p/192564#M32263</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-09-13T15:36:56Z</dc:date>
    </item>
  </channel>
</rss>

