Re: List chain during attack high CPU usage

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 31, 2022 at 02:18:17AM +0200, Brskt wrote:
> Hello,
> 
> I'm using some filter which uses sets with meters. When the server is
> receiving a lot of packets per seconds (~800k+) and using the command to
> list the chain, it does take ~80% of CPU and take a long time to return an
> output.
> 
> # cat /etc/issue
> Welcome to Alpine Linux 3.16
> 
> # nft -v
> nftables v1.0.5 (Lester Gooch #4)
> 
> # uname -r
> 5.15.62-1-lts

Could you provide more information on your setup? ruleset?

Ruleset listing is also lockless.

It is hard to guess with this short notice.



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux