-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Question: Does -m mode support tcpdump parameters such as -C file_size
、-c count
etc
#670
Comments
-C file_size
、-c count
etc
This is a particularly niche requirement. But you can judge it by monitoring the ecapture running log, matching the |
Thanks for reply! Can ecapture be restricted from using too many resources by adding parameter such as --count to limit the number of packets processed. It is a practical requirement in resource-sensitive scenarios. Besides sending SIGTERM signal, is there any other parameters currently available that can control ecapture to end actively? Test cases are attached. virtual machine 12core 8G openEuler 22.03 (LTS-SP4) kernel 5.10.0-216.0.0.115.oe2203sp4.x86_64 1000baseT Nic
os environment
|
The
This alarm indicates that eCapture captures too much data in However, I noticed that you started multiple ecapture processes, which may be a wrong way to use it. Because multiple eCapture processes access the |
The difference between large files and small files lies in the number of times HOOK points are triggered. Can you test the difference between keylog mode and without ecapture in the scenario of small file download? |
A simple test was conducted with 6w concurrent connections with an average outgoing bandwidth of 35Mbps~50Mpbs. The https server CPUAffinity=2-9, the sampling period was 1s, and data was collected for 10s. Several sets of test results are provided https server performace without ecapture
https server performace with ecapturetaskset -c 10,11 ecapture tls -m keylog --keylogfile=6w-keylog.txt
|
It seems that eCapture does not have a particularly large impact on performance, increasing CPU usage by approximately 20%. I think it's acceptable. In addition, in this high-concurrency scenario, I feel that using eCapture to obtain the key is not very suitable. You can try to enable the |
ecapture是否支持如-C file_size、-c count之类的参数,限制报文个数或文件大小,达到门限后自动停止ecapture。
#ecapture tls -m pcap -i ens224np1 --pcapfile=/root/test/ssh.pcap tcp port 22
...
2024-11-19T14:37:56+08:00 INF packets saved into pcapng file. count=44
...
The text was updated successfully, but these errors were encountered: