LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
查看: 1356|回复: 8

LINUX负载奇高!各位帮忙看看。。。

[复制链接]
发表于 2004-12-24 17:29:45 | 显示全部楼层 |阅读模式
系统是RH8.0,硬件配置:P4 1.8G/512m/40G/
开启的服务有:Mail web SMB mrtg ,这段时间负载总是奇高,导致内都不收信的状况,平时敲个命令有时候也等好一会儿,原来有启动图形界面,现在只启动文本模式,也没见负载比较正常。特别是用户在收信时,负载明显上升。
下面是messages的部分信息,大家看一下我是不是中招了,218.85.XXX.XXX是我改的
Dec 19 04:03:35 crnlinux syslogd 1.4.1: restart.
Dec 19 04:03:47 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=168.95.1.1 DST=218.85.XXX.XXX LEN=71 TOS=0x00 PREC=0x00 TTL=241 ID=1990 DF PROTO=UDP SPT=53 DPT=34305 LEN=51
Dec 19 04:04:01 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=168.95.1.1 DST=218.85.XXX.XXX LEN=71 TOS=0x00 PREC=0x00 TTL=241 ID=61859 DF PROTO=UDP SPT=53 DPT=34305 LEN=51
Dec 19 04:05:01 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412
Dec 19 04:05:01 crnlinux net-snmp[802]: Received SNMP packet(s) from udp:218.85.XXX.XXX:34412
Dec 19 04:05:01 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412
Dec 19 04:05:01 crnlinux net-snmp[802]: Received SNMP packet(s) from udp:218.85.XXX.XXX:34412
Dec 19 04:05:10 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=168.95.1.1 DST=218.85.XXX.XXX LEN=73 TOS=0x00 PREC=0x00 TTL=241 ID=57400 DF PROTO=UDP SPT=53 DPT=34412 LEN=53
Dec 19 04:05:36 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=168.95.1.1 DST=218.85.XXX.XXX LEN=72 TOS=0x00 PREC=0x00 TTL=241 ID=25275 DF PROTO=UDP SPT=53 DPT=34409 LEN=52
Dec 19 04:07:39 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=38748 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:07:40 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=38761 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:07:41 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=38762 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:07:46 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=38768 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:07:47 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=38769 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:07:47 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=38770 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:10:03 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412
Dec 19 04:10:03 crnlinux net-snmp[802]: Received SNMP packet(s) from udp:218.85.XXX.XXX:34412
Dec 19 04:10:03 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412
Dec 19 04:10:03 crnlinux net-snmp[802]: Received SNMP packet(s) from udp:218.85.XXX.XXX:34412
Dec 19 04:12:19 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=218.85.110.87 DST=218.85.XXX.XXX LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=27998 DF PROTO=TCP SPT=4784 DPT=135 WINDOW=64800 RES=0x00 SYN URGP=0
Dec 19 04:12:22 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=218.85.110.87 DST=218.85.XXX.XXX LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=28336 DF PROTO=TCP SPT=4784 DPT=135 WINDOW=64800 RES=0x00 SYN URGP=0
Dec 19 04:12:27 crnlinux su(pam_unix)[32023]: session opened for user news by (uid=0)
Dec 19 04:12:27 crnlinux su(pam_unix)[32023]: session closed for user news
Dec 19 04:15:01 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412
Dec 19 04:15:01 crnlinux net-snmp[802]: Received SNMP packet(s) from udp:218.85.XXX.XXX:34412
Dec 19 04:15:01 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412
Dec 19 04:15:01 crnlinux net-snmp[802]: Received SNMP packet(s) from udp:218.85.XXX.XXX:34412
Dec 19 04:15:48 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=218.85.90.189 DST=218.85.XXX.XXX LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=41831 DF PROTO=TCP SPT=2367 DPT=135 WINDOW=32000 RES=0x00 SYN URGP=0
Dec 19 04:16:45 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=61.178.172.100 DST=218.85.XXX.XXX LEN=404 TOS=0x00 PREC=0x00 TTL=117 ID=19517 PROTO=UDP SPT=4228 DPT=1434 LEN=384
Dec 19 04:18:12 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=211.87.198.222 DST=218.85.XXX.XXX LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=47075 DF PROTO=TCP SPT=12200 DPT=1080 WINDOW=8192 RES=0x00 SYN URGP=0
Dec 19 04:19:42 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=64.4.55.74 DST=218.85.XXX.XXX LEN=40 TOS=0x00 PREC=0x00 TTL=116 ID=48877 DF PROTO=TCP SPT=80 DPT=1218 WINDOW=64459 RES=0x00 ACK URGP=0
Dec 19 04:19:42 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=64.4.55.90 DST=218.85.XXX.XXX LEN=40 TOS=0x00 PREC=0x00 TTL=116 ID=52165 DF PROTO=TCP SPT=80 DPT=1219 WINDOW=64459 RES=0x00 ACK URGP=0
Dec 19 04:19:53 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=39472 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:19:54 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=39473 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:19:54 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=39474 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:19:57 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=218.85.90.189 DST=218.85.XXX.XXX LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=13648 DF PROTO=TCP SPT=2911 DPT=135 WINDOW=32000 RES=0x00 SYN URGP=0
Dec 19 04:20:00 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=39493 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:20:00 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=218.85.90.189 DST=218.85.XXX.XXX LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=14274 DF PROTO=TCP SPT=2911 DPT=135 WINDOW=32000 RES=0x00 SYN URGP=0
Dec 19 04:20:00 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=39494 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:20:01 crnlinux kernel: fp=UDP:2 a=DROP IN=eth1 OUT= MAC=ff:ff:ff:ff:ff:ff:00:11:09:9b:63:f6:08:00 SRC=218.85.129.70 DST=218.85.129.71 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=39495 PROTO=UDP SPT=137 DPT=137 LEN=58
Dec 19 04:20:01 crnlinux kernel: fp=TCP:1 a=DROP IN=eth1 OUT= MAC=00:d0:f8:3d:27:a6:00:04:dd:fa:bd:1f:08:00 SRC=64.4.55.90 DST=218.85.XXX.XXX LEN=40 TOS=0x00 PREC=0x00 TTL=116 ID=6638 DF PROTO=TCP SPT=80 DPT=1219 WINDOW=0 RES=0x00 ACK RST URGP=0
Dec 19 04:20:01 crnlinux net-snmp[802]: Connection from udp:218.85.XXX.XXX:34412

下面是用nmap扫描的
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Interesting ports on  (192.168.0.137):
(The 1594 ports scanned but not shown below are in state: closed)
Port       State       Service
22/tcp     open        ssh
25/tcp     open        smtp
80/tcp     open        http
110/tcp    open        pop-3
111/tcp    open        sunrpc
139/tcp    open        netbios-ssn
443/tcp    open        https

Nmap run completed -- 1 IP address (1 host up) scanned in 2 seconds
发表于 2004-12-25 18:03:29 | 显示全部楼层
一、uptime一下看看load average有多少
二、111、139端口好像没有用吧
三、netstat -an查看当前有多少连接
 楼主| 发表于 2004-12-27 08:29:20 | 显示全部楼层
谢谢 attiseve!uptime的时间很少就几天,因为最近经常要重启。经这段时间观察,发现平时正常上班的时候负载总是比较高,但最多也就是收收信上上网,怎么会导致这么高的负载呢?我现在很想知道我的服务器是否中招了,从上面的messages是否能够看出什么问题?各位高手帮忙看看好吗?谢谢!再问一下,不知道如何关闭没用的端口?
发表于 2004-12-27 09:16:23 | 显示全部楼层
你的客户端有多少?一个客户端弄个flashget多线程下载几个文件也够受的。何况你的机器好像是PC,不是专门的服务器。
至于是不是中招很难说,得靠多方面的检查。
找到相应的服务关掉就可以关闭端口了。
 楼主| 发表于 2004-12-27 15:14:35 | 显示全部楼层
是的,我的服务器是ACER原装机,但按别人的说法,这个配置已经是足够了才对啊,况且我现在又没有启动GUI,开的服务也不算多啊
发表于 2004-12-27 17:06:29 | 显示全部楼层
会不会是update的问题
发表于 2004-12-27 21:34:46 | 显示全部楼层
你的服务器还真强啊。开那么多服务,估计顶不住的。
发表于 2005-1-3 04:25:05 | 显示全部楼层
Post by attiseve
一、uptime一下看看load average有多少
二、111、139端口好像没有用吧
三、netstat -an查看当前有多少连接



还有是否是ssl在搞鬼 ?
 楼主| 发表于 2005-1-3 17:12:36 | 显示全部楼层
ssl,我觉得不大可能吧。我现在把内网的上网的网关指向另外一个设备,用了几天感觉有比较好点,平时负载大概在0.4左右,有人收邮件会比较高,达到2.X
您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表