From 75fba6cd248af6925d62452c15d4a21a2a7a204a Mon Sep 17 00:00:00 2001 From: Michael Tremer Date: Thu, 28 Feb 2019 14:28:10 +0000 Subject: [PATCH] suricata: Drop profiling section from configuration This is not compiled in as it slows down detection and is only really useful for debugging Signed-off-by: Michael Tremer Signed-off-by: Stefan Schantl --- config/suricata/suricata.yaml | 69 ----------------------------------- 1 file changed, 69 deletions(-) diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml index 86ed44a404..ee53ab1a64 100644 --- a/config/suricata/suricata.yaml +++ b/config/suricata/suricata.yaml @@ -860,75 +860,6 @@ threading: # detect-thread-ratio: 1.0 -# Profiling settings. Only effective if Suricata has been built with the -# the --enable-profiling configure flag. -# -profiling: - # Run profiling for every xth packet. The default is 1, which means we - # profile every packet. If set to 1000, one packet is profiled for every - # 1000 received. - #sample-rate: 1000 - - # rule profiling - rules: - - # Profiling can be disabled here, but it will still have a - # performance impact if compiled in. - enabled: yes - filename: rule_perf.log - append: yes - - # Sort options: ticks, avgticks, checks, matches, maxticks - # If commented out all the sort options will be used. - #sort: avgticks - - # Limit the number of sids for which stats are shown at exit (per sort). - limit: 10 - - # output to json - json: yes - - # per keyword profiling - keywords: - enabled: yes - filename: keyword_perf.log - append: yes - - # per rulegroup profiling - rulegroups: - enabled: yes - filename: rule_group_perf.log - append: yes - - # packet profiling - packets: - - # Profiling can be disabled here, but it will still have a - # performance impact if compiled in. - enabled: yes - filename: packet_stats.log - append: yes - - # per packet csv output - csv: - - # Output can be disabled here, but it will still have a - # performance impact if compiled in. - enabled: no - filename: packet_stats.csv - - # profiling of locking. Only available when Suricata was built with - # --enable-profiling-locks. - locks: - enabled: no - filename: lock_stats.log - append: yes - - pcap-log: - enabled: no - filename: pcaplog_stats.log - append: yes - ## ## Include other configs ## -- 2.39.2