


Hash Table: The name of the hash table.Information shown in the table columns is:

ntopng misconfiguration, especially when Operating ntopng on large networks which require fine tuningĪim of the Hash Tables internals table is to monitor hash tables and hash table entries to check and possibly highlight the issues above.Under normal circumstances, such conditions are verified but may fail due to: Be considered idle, removed from the hash table, and deleted from memory when its traffic is no longer seen.įailing to meet one or more of the conditions will almost surely cause ntopng to malfunction.Be considered active and updated periodically if it has network traffic associated.In addition, every network element in a hash table must: Have enough room to accommodate new network elements that may arrive.Have enough room to keep all the active network elements.To ensure smooth functionalities, ntopng hash tables must: Hosts are kept in the Hosts hash table, flows are kept in the Flows hash table, and so on. Ntopng uses hash tables to keep active network elements in memory.
