...
There is high CPU due to 'SASRcvWQWrk3', 'SAGetRUMIds' or 'SAUtilRepSave', in some scenarios it is a combination of the last two. Router#sho proc cpu sort CPU utilization for five seconds: 100%/1%; one minute: 61%; five minutes: 28% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 662 272007421 19185503 14177 60.00% 45.62% 13.41% 0 SAGetRUMIds 150 310763355 20821285 14925 38.03% 12.50% 13.43% 0 SAUtilRepSave Switch#show processes cpu sorted CPU utilization for five seconds: 99%/1%; one minute: 99%; five minutes: 99% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 150 2661219 5657244 470 96.04% 94.76% 93.89% 0 SASRcvWQWrk3 syslogs may show: %IVR-3-LOW_CPU_RESOURCE: IVR: System experiencing high cpu utilization (96/100).
Smart Licensing and RUM reports are used in the device. The CPU usage triggers when the RUM report list is used. To confirm run 'show license tech support': # show license tech support | include RUM reports Send Utility RUM reports: Feb 22 16:04:53 2021 MET (34 minutes, 45 seconds remaining) Save unreported RUM Reports: Feb 22 16:21:26 2021 MET (51 minutes, 18 seconds remaining) Process Utility RUM reports: Feb 22 17:04:38 2021 MET (1 hours, 34 minutes, 30 seconds remaining)
Delete the RUM reports list. license smart factory reset See CSCwa34749 as this command might cause an unexpected crash when CPU is high. %Warning: reload required after "license smart factory reset" command Alternatively, using the offline/reservation method can mitigate this as usage reports are manually handled. Details for this can be found here: https://www.cisco.com/c/en/us/td/docs/routers/sl_using_policy/b-sl-using-policy/how_to_configure_workflows.html#Cisco_Concept.dita_7057e18c-3c69-4d91-841b-0b5beb7a2d88
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels. If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation. Additional information on Cisco's security vulnerability policy can be found at the following URL: https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html