• We value your experience with Plesk during 2024
    Plesk strives to perform even better in 2025. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2024.
    Please take this short survey:

    https://pt-research.typeform.com/to/AmZvSXkx
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Issue Got packet bigger than 'max_allowed_packet' bytes when dumping table

Pleskian27

New Pleskian

Attachments

  • Screenshot(11).png
    Screenshot(11).png
    11.2 KB · Views: 9
Did you follow the article? What max_allowed_packet_size have you set in the [mysql] and more important in the [mysqldump] sections of your /etc/my.cnf file? Did you restart the database server after the change so that the new configuration values have been applied?

Your screenshot is only a small part of a screenshot that does not give any useful information.
 
We've had a similar (because you did not provide any details, I can only guess though) problem and the complete error message from the "failed" backup was:
Code:
WARNING: (Database object 'mydomain_wordpressdb') Unable to make database dump. Error: Failed to exec mysqldump: Exit code: 3: mysqldump: Error 2020: Got packet bigger than 'max_allowed_packet' when dumping table `wp_options` at row: 104

Unfortunately, this error message is very missleading, as for one, we have max_allowed_packet configured to 64MB and this database was only like 10MB in size anyway - so there is no way a dump of a single element from this database could ever exceed that limit.

So we checked this database more carefully.
First we performed a repair & optimize over the whole database, but that did not help
The we looked at this mentioned wp_options table more closely and checked this problematic row 104
And what did we see, it was the "cron" row and it contained some garbage value that even let phpmyadmin crash when try to open/edit.
This whole cron option/function is a well known and abused vulnerability in Wordpress....
Some bugs in Wordpress allow(ed) an attacker, to place custom code into that field, that was then executed on a regular interval by Wordpress itself.

So, we assumed that this site got hacked and the attacker placed such a specific code/content into this database field, that even lead to mysqldump errors.

In our case, we then simply emptied the value of this row and were done with
Code:
update `wp_options` set `option_value` = '' where `option_name` = 'cron';
 
Back
Top