Browse Source

disable mempool WAL by default (#2490)

pull/2513/head
Anton Kaliaev 6 years ago
committed by Ethan Buchman
parent
commit
47bc15c27a
3 changed files with 6 additions and 1 deletions
  1. +1
    -0
      CHANGELOG_PENDING.md
  2. +1
    -1
      config/config.go
  3. +4
    -0
      docs/tendermint-core/running-in-production.md

+ 1
- 0
CHANGELOG_PENDING.md View File

@ -5,6 +5,7 @@ Special thanks to external contributors on this release:
BREAKING CHANGES: BREAKING CHANGES:
* CLI/RPC/Config * CLI/RPC/Config
- [config] `mempool.wal` is disabled by default
* Apps * Apps


+ 1
- 1
config/config.go View File

@ -503,7 +503,7 @@ func DefaultMempoolConfig() *MempoolConfig {
Recheck: true, Recheck: true,
RecheckEmpty: true, RecheckEmpty: true,
Broadcast: true, Broadcast: true,
WalPath: filepath.Join(defaultDataDir, "mempool.wal"),
WalPath: "",
// Each signature verification takes .5ms, size reduced until we implement // Each signature verification takes .5ms, size reduced until we implement
// ABCI Recheck // ABCI Recheck
Size: 5000, Size: 5000,


+ 4
- 0
docs/tendermint-core/running-in-production.md View File

@ -74,6 +74,10 @@ propose it. Clients must monitor their txs by subscribing over websockets,
polling for them, or using `/broadcast_tx_commit`. In the worst case, txs can be polling for them, or using `/broadcast_tx_commit`. In the worst case, txs can be
resent from the mempool WAL manually. resent from the mempool WAL manually.
For the above reasons, the `mempool.wal` is disabled by default. To enable, set
`mempool.wal_dir` to where you want the WAL to be located (e.g.
`data/mempool.wal`).
## DOS Exposure and Mitigation ## DOS Exposure and Mitigation
Validators are supposed to setup [Sentry Node Validators are supposed to setup [Sentry Node


Loading…
Cancel
Save