Back to All Scenarios
PASSEDcache / cpu_exhaustion

Dragonfly 1.14 CPU 100% — Runaway Query/Process on RHEL 9

Dragonfly 1.14 is consuming 100% CPU due to a runaway operation. All other requests are starved and timing out.

Pattern
HIGH_CPU
Severity
HIGH
Confidence
68%
Remediation
Auto-Heal

Test Results

MetricExpectedActualResult
Pattern RecognitionHIGH_CPUHIGH_CPU
Severity AssessmentHIGHHIGH
Incident CorrelationN/ANone
Cascade EscalationN/ANo
RemediationAuto-Heal — Corax resolves autonomously

Scenario Conditions

RHEL 9. Dragonfly 1.14 process at 99% CPU. 15-core system. Load average: 119. Running for 358 minutes. Other services affected.

Injected Error Messages (1)

dragonfly CPU high critical on RHEL 9 — 99% CPU (15 cores), cpu exhaustion from runaway operation, load average 119, all requests starved, 498 users/connections affected

Neural Engine Root Cause Analysis

High CPU utilization detected — the server's processor is at or near capacity, causing degraded application performance, increased response times, and potential service unavailability. Common causes include runaway processes, sudden traffic spikes, inefficient code paths, or crypto-mining malware.

Remediation Plan

1. Identify the top CPU-consuming processes using 'top' or 'htop' on the affected server. 2. Check for runaway or zombie processes and terminate them if safe to do so. 3. Review application logs for tight loops, excessive logging, or unoptimized queries. 4. Scale horizontally or vertically if the load is legitimate. 5. Check for unauthorized processes (crypto miners) if CPU usage is unexplained.
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnpamj025jlig7f0hha2l1