Probable silly question...

Would it make sense to have a bpf expression in the startup
script/settings to ignore data to/from the offending host?

I believe that would incur the smallest overhead.

On Fri, Jun 19, 2009 at 11:51, Gary Gatten<ggat...@waddell.com> wrote:
> While troubleshooting my crashes during/after IDLE_PURGE processes, I found
> a host (CA eTrust) that scans our entire internal network range (all
> possible host IPs) looking for new ones – a discovery process.  Don’t ask
> why it doesn’t use multicast for this – seems no one realizes multicast
> exists and how to use it.
>
>
>
> Anyway, this “discovery” causes nTop to “see” almost 50,000 hosts – at which
> time it crashes.  I’m not 100%, but this process runs every 2 – 4 hours
> depending on TOD, and sure enough – ntop shows a huge spike in host counts
> and shortly thereafter the host count is zero – cause ntop is DEAD!
>
>
>
> So – I threw in a blacklist in netflow confs for this host “host not
> w.x.y.z”.  Seems to be working, however, now the netflow thread is running 2
> – 3 times CPU it did before I added the blacklist entry.  Is there really
> that much overhead in the white/black lists – or am I crazy?
>
>
>
>
>
> TIA!
>
>
>
> Gary
>
>
>
> "This email is intended to be reviewed by only the intended recipient and
> may contain information that is privileged and/or confidential. If you are
> not the intended recipient, you are hereby notified that any review, use,
> dissemination, disclosure or copying of this email and its attachments, if
> any, is strictly prohibited. If you have received this email in error,
> please immediately notify the sender by return email and delete this email
> from your system."
> _______________________________________________
> Ntop mailing list
> Ntop@unipi.it
> http://listgateway.unipi.it/mailman/listinfo/ntop
>
>
_______________________________________________
Ntop mailing list
Ntop@unipi.it
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to