- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Today one of our old CloudGuard gateways started burning an abnormal amount of CPU.
The process I found was "sklnctl".
/opt/CPotelcol/sklnctl collector --upgrade /opt/CPotelcol/config.json --skip-validation --deprecated was the full command running, and appeared to have been launched by /var/log/AutoUpdater/metadata/diagnostics/CPotelcol/CPotelcol_AutoUpdate/68/product_scripts/post_action.sh
Hi All, A new release of Skyline in AutoUpdater was released to legacy versions ( Out of support versions, R80.10, R80.20, R80.30 ) - with older kernel which doesn't support Skyline (2.16), unintentionally, Please run the following workaround to resolve the issue,
1) kill -9 $(pidof sklnctl)
2) autoupdatercli disable CPotelcol
We are working on an immediate fix to this problem that should resolve the issue.
We are working on releasing a new version in the upcoming days that should prevent the occurrence of this issue - We will publish an SK on this issue as well.
This is also happening on one of my lab VMs. R80.30 simple firewall
got alerts in vmware for CPU usage
sklnctl @ 300% CPU in top
Thanks, I see another one doing the same thing, I can leave it a while if more info is needed but I can't leave it like that when we enter business hours in ~90min or so.
Belay that, two more now pegged at 100%.
Hi All, A new release of Skyline in AutoUpdater was released to legacy versions ( Out of support versions, R80.10, R80.20, R80.30 ) - with older kernel which doesn't support Skyline (2.16), unintentionally, Please run the following workaround to resolve the issue,
1) kill -9 $(pidof sklnctl)
2) autoupdatercli disable CPotelcol
We are working on an immediate fix to this problem that should resolve the issue.
I'm experiencing this problem with 4 x 15400 in version 80.10. It's been about 10 hours since the sklnctl process started using 500% of cpu and I had already seen the process, but now in the post I ran it safely and killed it and disabled it. It's back to normal.
Let's wait for new information. Thanks
@Rodrigo_Mezetti Please apply the workaround Elad mentioned to fix this. Also, R80.10 is out of support for a while now.
We are working on releasing a new version in the upcoming days that should prevent the occurrence of this issue - We will publish an SK on this issue as well.
Hi Elad, please share the SK once is published.
customer is asking us for an official statement of the issue.
Thanks.
I had a remote session with Elad earlier today. During the session Elad noticed, that terminating sklnctl on it's own is insufficuent, as AutoUpdater keeps on trying to re-install it. As a result, steps that Elad suggested were to comment Check Point Open Telemetry Connector component from /opt/AutoUpdater/latest/conf/products_config.xml and kill AutoUpdater process (which will restart)
Below is the action plan that my customer enacted on their gateways:
Step 1) Disable CPotelcol AutoUpdater Component
[Expert@R8030host:0]# autoupdatercli disable CPotelcol
Updates state changed to off for component CPotelcol
[Expert@R8030host:0]#
Step 2) Edit /opt/AutoUpdater/latest/conf/products_config.xml and comment out the session for CPotelcol
[Expert@R8030host:0]# cd /opt/AutoUpdater/latest/conf
[Expert@R8030host:0]# vi products_config.xml
[Expert@R8030host:0]# diff -u products_config.xml.orig products_config.xml
--- products_config.xml.orig 2023-10-03 11:55:12.000000000 +0000
+++ products_config.xml 2023-10-03 11:56:11.000000000 +0000
@@ -415,7 +415,7 @@
</Product>
<Product name="diagnostics">
<Components>
- <Component name="CPotelcol" display_name="Check Point Open Telemetry Collector">
+ <!-- <Component name="CPotelcol" display_name="Check Point Open Telemetry Collector">
<Versions>
<unversioned branch="CPotelcol_AutoUpdate"/>
</Versions>
@@ -430,7 +430,7 @@
</postActions>
<postVerify script="post_verify.sh"/>
</InstallationPlan>
- </Component>
+ </Component> -->
<Component name="CPviewExporter" display_name="Check Point CPview Metrics Exporter">
<Versions>
<unversioned branch="CPviewExporter_AutoUpdate"/>
[Expert@R8030host:0]#
Step 3) Terminate the sklnctl and AutoUpdater processes (AutoUpdater process will restart)
[Expert@R8030host:0]# kill -9 $(pidof sklnctl) $(pidof AutoUpdater)
[Expert@R8030host:0]#
HTH. HAND.
Hello Stva,
I am an engineer at CCSP, and we have encountered a similar issue in our customer’s OS(15600 H.A) as previously described by Elad Chomski. Following the provided instructions, I have terminated the sklnctl process using the kill command and subsequently disabled the autoupdater.
I initially followed Elad's post, hence I have not killed the config.xml file and autoupdater process. However, your post suggests that executing these two additional steps appears necessary to prevent the re-installation of autoupdater.
Could you clarify if this will impact other daemon processes? Our customer utilizes FW, HTTPS inspection, APCL, and URLF, so I am particularly concerned about any unintended consequences of editing products_config.xml and terminating the autoupdater process.
Fortunately, it's been roughly an hour since I employed the "kill" command on the sklnctl process and disabled the autoupdater via CPotelcol. So far, the sklnctl has not reappeared.
May I request a prompt final resolution on this matter?
Best regards.
patrick.
Hi All, I am working with the AutoUpdater R&D to ensure what are the recommended guidelines, if you still have any issue, please follow the guidelines above - SK should be released today or tomorrow on the issue. It will include all possible workarounds.
After talking to the AutoUpdater R&D team the following was recommended,
1) To check there is no issue on the disable solution ( Run kill -9 $(pidof AutoUpdater) ) - And inspect the AutoUpdater log ( /opt/AutoUpdater/AutoUpdater.log ) if it is still trying to install the component ( Should be log records ), re-run the workaround using the steps @stva mentioned .
2) Notice that if your AutoUpdater version is below 990180269 ( Run 'cpvinfo /opt/AutoUpdater/latest/bin/AutoUpdater' ) it is recommended to start immediately from the workaround mentioned by @stva .
Guys, after I carried out the @stva procedures, the scanengine_k process started using a lot of CPU
7341 admin 15 0 827m 629m 99m S 834 1.0 150:28.85 scanengine_k
Is there something related or was it coincidence? Have you ever been through this?
It is not related to this issue, I recommend to open a ticket to the CheckPoint support, so we assist you to investigate this issue.
https://support.checkpoint.com/results/sk/sk181528
sk is now released on this issue
Thank you for providing SK quickly.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY