From patchwork Fri Mar 1 01:28:10 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2105 Return-Path: Received: from mail01.ipfire.org (mail01.i.ipfire.org [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id 2548688B0B9 for ; Thu, 28 Feb 2019 14:29:08 +0000 (GMT) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 449FKv4XWCz51j5t; Thu, 28 Feb 2019 14:29:07 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201801; t=1551364147; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:list-id:list-unsubscribe:list-subscribe:list-post; bh=a/mdxXH1zxitwzzFbUOQlFgEMKPpgrbVxMTjvR7iNmw=; b=CgcyQs1nk+LvtRs/ETjc+VKN5stYVtmhPoAInSGYcESE0KkORh3DDZG8gDx3geJTOBDqpX I6DvpIPU48fawn3XeZi3vLUIk3NYfWgHAJIeASc5CgEMKjljxk6MK/mc6vjAst/z0RFoNK SZDwaqrD8nlnPfeTC7B/bsqdELRZRuF+o++PfCAnrbUz21hNNsYYmlx8I3AukaAUJVlmao jBib1n6o+2197x+8ccPnq4YqvCtKta47ikUdWzotdQK4zyge/ejY6U5mk43QSl1avPcNOD EuCvlFDzIZRjw+1A+pOZLiBpsR+ffwk1f393Rz8bTROYghucgUsF9kr27dci6w== Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 449FKN3jm9z5KvHN; Thu, 28 Feb 2019 14:28:40 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201801; t=1551364121; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=a/mdxXH1zxitwzzFbUOQlFgEMKPpgrbVxMTjvR7iNmw=; b=vOgtjRpEvtSL4ySbcS5Pz3OF574jLiNKrayB04D+8yWwiJ2oeq0/KY7gJt/+Nekbeq/QoJ y8/HTa71/KtHSrJJl8WzCAvpF+nhZmYxq4DnEsQEdlV1jqiJgGFldW45PHzxLy7aOKRWdA fTMx91S6vi6D3vIG2SJz4ah+3r5XBUJvNc9FC7wt1KhR3F3THrMUWiCy0pGO+mekYs9ej0 qMMVUS0qLm3N102NOHpz+7lK1n7eULefkYqWepIN1I0VVeXzdP8x1zd0B4oFZ3ZrvNAq2E mWT4OYBuTFd8uijyOw76i+0bqBWtMacq4UZd9SO3j5fIV+9e1C61WhDXXaklfw== From: Michael Tremer To: development@lists.ipfire.org Subject: [PATCH 05/20] suricata: Drop profiling section from configuration Date: Thu, 28 Feb 2019 14:28:10 +0000 Message-Id: <20190228142825.5153-6-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190228142825.5153-1-michael.tremer@ipfire.org> References: <20190228142825.5153-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org X-Spamd-Result: default: False [-8.81 / 11.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; REPLY(-4.00)[]; DKIM_SIGNED(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; MID_CONTAINS_FROM(1.00)[]; NEURAL_HAM(-2.71)[-0.904,0]; RCVD_COUNT_ZERO(0.00)[0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:31655, ipnet:88.215.0.0/18, country:GB]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%] X-Spam-Status: No, score=-8.81 X-Rspamd-Server: mail01.i.ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" This is not compiled in as it slows down detection and is only really useful for debugging Signed-off-by: Michael Tremer --- config/suricata/suricata.yaml | 69 ------------------------------------------- 1 file changed, 69 deletions(-) diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml index 10dbdc99b..8dc2a1587 100644 --- a/config/suricata/suricata.yaml +++ b/config/suricata/suricata.yaml @@ -860,75 +860,6 @@ threading: # detect-thread-ratio: 1.0 -# Profiling settings. Only effective if Suricata has been built with the -# the --enable-profiling configure flag. -# -profiling: - # Run profiling for every xth packet. The default is 1, which means we - # profile every packet. If set to 1000, one packet is profiled for every - # 1000 received. - #sample-rate: 1000 - - # rule profiling - rules: - - # Profiling can be disabled here, but it will still have a - # performance impact if compiled in. - enabled: yes - filename: rule_perf.log - append: yes - - # Sort options: ticks, avgticks, checks, matches, maxticks - # If commented out all the sort options will be used. - #sort: avgticks - - # Limit the number of sids for which stats are shown at exit (per sort). - limit: 10 - - # output to json - json: yes - - # per keyword profiling - keywords: - enabled: yes - filename: keyword_perf.log - append: yes - - # per rulegroup profiling - rulegroups: - enabled: yes - filename: rule_group_perf.log - append: yes - - # packet profiling - packets: - - # Profiling can be disabled here, but it will still have a - # performance impact if compiled in. - enabled: yes - filename: packet_stats.log - append: yes - - # per packet csv output - csv: - - # Output can be disabled here, but it will still have a - # performance impact if compiled in. - enabled: no - filename: packet_stats.csv - - # profiling of locking. Only available when Suricata was built with - # --enable-profiling-locks. - locks: - enabled: no - filename: lock_stats.log - append: yes - - pcap-log: - enabled: no - filename: pcaplog_stats.log - append: yes - ## ## Include other configs ##