Yes! Crawlers sometimes put a high load on webservers.Does this happen when you get hit by search engine crawlers?
We finally got rid of such problems when we added varnish, as moving the affected site to a separate server without plesk didn't help much.
Installit's about impossible for us to be watching at the right time
atop
to monitor the system automatically. After the issue happens you can check what was running and the build up to it: How to monitor usage of system resources in a period of time using atop?We don't install CMS's via Plesk, but rather directly via FTP so that it's not tied into Plesk settings.Did you enable the option "Take over wp-cron.php" in the WordPress Toolkit and run it on a different schedule?
![]()
WP Toolkit
WP Toolkit is a single management interface you can use to create, configure, and manage WordPress websites in Plesk.docs.plesk.com
That would prevent running the wp-cron.php every time someone visits a WordPress website.
Hello.xmlrpc.php sometimes is used to generate attacks ( internal and external ) so it might be a good idea to block requests to that file.
Did you install Wordfence? this plugins eventually blocks bruteforce attempts at login.
Having a good cache strategy offloads CPU cycles dedicated to WP, have you done that? For example a site on a server got a post that went viral, server didin´t even flinched, all traffic went to the cache...
Hi, Peter.Load spikes can always be explained. You just need to find the right hook where to catch them.
Next time it occurs, run
# watch "ps aux | sort -nrk 3,3 | head -n 20"
as a first response to find out which processes are consuming the most CPU time.
I also recommend to check all PHP-FPM processes in such a situation. Most likely you'll have a user that is using many PHP-FPM children and each of them has a high load.
# ps aux | grep php-fpm
That user is your culprit. From there descend into the logs directory of the user's subscription and check what's going on in the error_log and access_ssl_log. You'll probably find the cause there, e.g. frequent requests from bad bots or something similar.