mirror of
https://gitlab.com/chrony/chrony.git
synced 2025-12-06 15:55:06 -05:00
clientlog: reduce amount of logged information
Don't log NTP peer access and auth/bad command access. Also, change types for logging number of hits from long to uint32_t. This reduces the size of the node and allows more clients to be monitored in the same amount of memory.
This commit is contained in:
12
ntp_core.c
12
ntp_core.c
@@ -1516,7 +1516,7 @@ NCR_ProcessKnown
|
||||
int length /* the length of the received packet */
|
||||
)
|
||||
{
|
||||
int pkt_mode, proc_packet, proc_as_unknown, log_peer_access;
|
||||
int pkt_mode, proc_packet, proc_as_unknown;
|
||||
|
||||
if (!check_packet_format(message, length))
|
||||
return 0;
|
||||
@@ -1524,7 +1524,6 @@ NCR_ProcessKnown
|
||||
pkt_mode = NTP_LVM_TO_MODE(message->lvm);
|
||||
proc_packet = 0;
|
||||
proc_as_unknown = 0;
|
||||
log_peer_access = 0;
|
||||
|
||||
/* Now, depending on the mode we decide what to do */
|
||||
switch (pkt_mode) {
|
||||
@@ -1532,7 +1531,6 @@ NCR_ProcessKnown
|
||||
switch (inst->mode) {
|
||||
case MODE_ACTIVE:
|
||||
/* Ordinary symmetric peering */
|
||||
log_peer_access = 1;
|
||||
proc_packet = 1;
|
||||
break;
|
||||
case MODE_PASSIVE:
|
||||
@@ -1555,7 +1553,6 @@ NCR_ProcessKnown
|
||||
case MODE_ACTIVE:
|
||||
/* This would arise if we have the remote configured as a peer and
|
||||
he does not have us configured */
|
||||
log_peer_access = 1;
|
||||
proc_packet = 1;
|
||||
break;
|
||||
case MODE_PASSIVE:
|
||||
@@ -1609,9 +1606,6 @@ NCR_ProcessKnown
|
||||
break;
|
||||
}
|
||||
|
||||
if (log_peer_access)
|
||||
CLG_LogNTPPeerAccess(&inst->remote_addr.ip_addr, now->tv_sec);
|
||||
|
||||
if (proc_packet) {
|
||||
/* Check if the reply was received by the socket that sent the request */
|
||||
if (local_addr->sock_fd != inst->local_addr.sock_fd) {
|
||||
@@ -1681,12 +1675,10 @@ NCR_ProcessUnknown
|
||||
case MODE_ACTIVE:
|
||||
/* We are symmetric passive, even though we don't ever lock to him */
|
||||
my_mode = MODE_PASSIVE;
|
||||
CLG_LogNTPPeerAccess(&remote_addr->ip_addr, now->tv_sec);
|
||||
break;
|
||||
case MODE_CLIENT:
|
||||
/* Reply with server packet */
|
||||
my_mode = MODE_SERVER;
|
||||
CLG_LogNTPClientAccess(&remote_addr->ip_addr, now->tv_sec);
|
||||
break;
|
||||
default:
|
||||
/* Discard */
|
||||
@@ -1694,6 +1686,8 @@ NCR_ProcessUnknown
|
||||
return;
|
||||
}
|
||||
|
||||
CLG_LogNTPAccess(&remote_addr->ip_addr, now->tv_sec);
|
||||
|
||||
/* Check if the packet includes MAC that authenticates properly */
|
||||
valid_auth = check_packet_auth(message, length, &has_auth, &key_id);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user