[Bug 1127] running nft command creates lag for forwarded packets
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Sun Mar 12 09:37:06 CET 2017
https://bugzilla.netfilter.org/show_bug.cgi?id=1127
--- Comment #12 from Karel Rericha <karel at unitednetworks.cz> ---
Second result: Zhang your patch DID help. When listing small set like in
previous test there were no visible latency problems now. And when listing big
"known attackers" set there were latency spikes around 15ms. I have waited
until actual traffic was 1.2Gbps so both tests are more or less the same.
Summary: Getting rid of interval sets obviously solves "big sets with interval
flag latency problem" for good :) But when big sets with interval flag are
needed Zhang's patch improves situation a lot: Listing of small sets have no
more latency impacts and listing of big sets with interval raises latency
several times less than previous code.
Pablo, Zhang, thanks for your help.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170312/0d95f3d4/attachment.html>
More information about the netfilter-buglog
mailing list