| Description | The article demonstrates recommended commands to mitigate some cases of high CPU usage when running resource-intensive diagnostics such as wad debugs. |
| Scope | FortiGate and FortiProxy in hardware or VM platforms. |
| Solution |
Be cautions when collecting CPU-intensive diagnostics such as IPS or WAD debugs. Collecting large volumes of diagnostics can impact network performance, particularly if this causes a CPU to be completely utilized due to high IRQ.
get sys performance status CPU7 states: 0% user 2% system 0% nice 98% idle 0% iowait 0% irq 0% softirq
Some CPU usage from diagnostic commands is unavoidable; however, much of the IRQ CPU usage is due to user logs being sent to the console, or due to the WAD debug collecting 'unknown sessions' despite the application of a WAD filter. This can be prevented with the following commands.
Sending diagnostic messages to the console is not needed when collecting diagnostics over HTTPS or SSH connections. Unless collecting the log over console, disable logging to console with: diagnose debug console no-user-log-msg enable
When filtering wad debugs, apply the following to drop all diagnostics that do not explicitly match the wad filter.
diagnose wad filter drop-unknown-session 1
Example debug for WAD:
diagnose debug console no-user-log-msg enable <-- Use this command first
To stop the debug:
diagnose debug disable diagnose wad debug clear diagnose debug reset diagnose wad filter clear Note:
Verifying whether 'no-user-log' is enabled or disabled:
diagnose debug info
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.