Another New one:
19:01:09 [NOTICE] General overload -> Ntor dropped (176948) fraction 25.2668%
is above threshold of 0.5000%
â 17:19:32 [WARN] Your computer is too slow to handle this many circuit
creation requests! Please consider using the MaxAdvertisedBandwidth â config
option or choosing a
li...@for-privacy.net wrote:
> On Friday, August 5, 2022 1:11:27 AM CEST s7r wrote:
> > Richard Menedetter wrote:
>
> > > I have a non exit relay running on a root server (4 AMD Epyc cores, 8 GB
> > > RAM, 2.5 GBit/s Ethernet) I have limited tor to numcpus 2,
> Why? Do you have other services on t
Hi
> > > I have a non exit relay running on a root server (4 AMD Epyc cores, 8 GB
> > > RAM, 2.5 GBit/s Ethernet) I have limited tor to numcpus 2,
> Why? Do you have other services on the server? Otherwise, omit num CPU. Let
> the tor daemon use all CPU's for crypto stuff.
Yes, there are other se
limits:
RelayBandwidthRate 15 MB
RelayBandwidthBurst 30 MB
BandwidthRate 50 MB
NumCPUs 2
MaxMemInQueues 3072 MB
CU, Ricsi
> Gesendet: Freitag, 05. August 2022 um 01:11 Uhr
> Von: "s7r"
> An: tor-relays@lists.torproject.org
> Betreff: Re: [tor-relays] Overload (dro
On Friday, August 5, 2022 1:11:27 AM CEST s7r wrote:
> Richard Menedetter wrote:
> > I have a non exit relay running on a root server (4 AMD Epyc cores, 8 GB
> > RAM, 2.5 GBit/s Ethernet) I have limited tor to numcpus 2,
Why? Do you have other services on the server? Otherwise, omit num CPU. Let
Richard Menedetter wrote:
Hi All
I have a non exit relay running on a root server (4 AMD Epyc cores, 8 GB RAM,
2.5 GBit/s Ethernet)
I have limited tor to numcpus 2, relaybandwidthburst 15 MB, hardwareaccel 1,
maxadvertisedbandwidth 10 MB, maxmeminqueues 3GB
Thanks for running a relay!
didn'
Hi All
I have a non exit relay running on a root server (4 AMD Epyc cores, 8 GB RAM,
2.5 GBit/s Ethernet)
I have limited tor to numcpus 2, relaybandwidthburst 15 MB, hardwareaccel 1,
maxadvertisedbandwidth 10 MB, maxmeminqueues 3GB
Usually it takes less than 1 CPU core, and like 1 GB of RAM.
Bu
On 31.08.2013 21:07, mick wrote:
> I don't normally expose those stats to the world. Indeed I'd guess a
> few other people who collect such stats don't either. Now, whilst these
> stats (along with those from others who respond) might help
> investigations of the impact of whatever is causing the r
On Sat, 31 Aug 2013 18:30:41 +0100
mick allegedly wrote:
> Here you go:
>
> https://pipe.rlogin.net/munin/network-month.html
>
etc
U. I've just had a (paranoid?) thought after reading the recent post
from Gordon Morehouse about DDOS.
I don't normally expose those stats to the world.
On Fri, 30 Aug 2013 18:25:54 -0700
Mike Perry allegedly wrote:
> To try to get to the bottom of the recent influx of clients to the Tor
> network, it might be useful to compare load characteristics since 8/19
> for nodes with different types of flags.
>
> People with Munin setups: it would be es
Am Freitag, 30. August 2013, 18:25:54 schrieb Mike Perry:
> To try to get to the bottom of the recent influx of clients to the Tor
> network, it might be useful to compare load characteristics since 8/19
> for nodes with different types of flags.
>
> People with Munin setups: it would be especiall
On 08/31/2013 09:25 AM, Mike Perry wrote:
> People with Munin setups: it would be especially useful if you could
> post links/graph images for connection counts, bandwidth, and CPU load
> since 8/19.
I have Munin data for three servers (each running two Tor instances):
https://v-yu.com/servers/muni
To try to get to the bottom of the recent influx of clients to the Tor
network, it might be useful to compare load characteristics since 8/19
for nodes with different types of flags.
People with Munin setups: it would be especially useful if you could
post links/graph images for connection counts,
13 matches
Mail list logo