Here is the complete output:
M:\Daten\AG_BioInformatik\Technik\wireshark>“c:\Program Files\Suricata\suricata.exe” -vvv -r ha-idg-1_3.cap
Info: win32-service: Running as service: no
Info: conf-yaml-loader: Configuration node ‘enabled’ redefined.
[24372] Notice: suricata: This is Suricata version 7.0.0 RELEASE running in USER mode
[24372] Info: cpu: CPUs/cores online: 12
[24372] Info: suricata: Setting engine mode to IDS mode by default
[24372] Info: exception-policy: master exception-policy set to: auto
[24372] Config: exception-policy: app-layer.error-policy: ignore (defined via ‘exception-policy’ master switch)
[24372] Config: app-layer-htp: ‘default’ server has ‘request-body-minimal-inspect-size’ set to 32241 and ‘request-body-inspect-window’ set to 4194 after randomization.
[24372] Config: app-layer-htp: ‘default’ server has ‘response-body-minimal-inspect-size’ set to 42329 and ‘response-body-inspect-window’ set to 15788 after randomization.
[24372] Config: smb: read: max record size: 16777216, max queued chunks 64, max queued size 67108864
[24372] Config: smb: write: max record size: 16777216, max queued chunks 64, max queued size 67108864
[24372] Config: app-layer-enip: Protocol detection and parser disabled for enip protocol.
[24372] Config: app-layer-dnp3: Protocol detection and parser disabled for DNP3.
[24372] Config: host: allocated 262144 bytes of memory for the host hash… 4096 buckets of size 64
[24372] Config: host: preallocated 1000 hosts of size 104
[24372] Config: host: host memory usage: 366144 bytes, maximum: 33554432
[24372] Info: coredump-config: Configuring core dump is not yet supported on Windows.
[24372] Config: exception-policy: defrag.memcap-policy: ignore (defined via ‘exception-policy’ master switch)
[24372] Config: defrag-hash: allocated 1572864 bytes of memory for the defrag hash… 65536 buckets of size 24
[24372] Config: defrag-hash: preallocated 65535 defrag trackers of size 128
[24372] Config: defrag-hash: defrag memory usage: 9961344 bytes, maximum: 33554432
[24372] Config: exception-policy: flow.memcap-policy: ignore (defined via ‘exception-policy’ master switch)
[24372] Config: flow: flow size 264, memcap allows for 508400 flows. Per hash row in perfect conditions 7
[24372] Config: stream-tcp: stream “prealloc-sessions”: 2048 (per thread)
[24372] Config: stream-tcp: stream “memcap”: 67108864
[24372] Config: stream-tcp: stream “midstream” session pickups: disabled
[24372] Config: stream-tcp: stream “async-oneside”: disabled
[24372] Config: stream-tcp: stream “checksum-validation”: enabled
[24372] Config: exception-policy: stream.memcap-policy: ignore (defined via ‘exception-policy’ master switch)
[24372] Config: exception-policy: stream.reassembly.memcap-policy: ignore (defined via ‘exception-policy’ master switch)
[24372] Config: exception-policy: stream.midstream-policy: ignore (defined via ‘exception-policy’ master switch)
[24372] Config: stream-tcp: stream.“inline”: disabled
[24372] Config: stream-tcp: stream “bypass”: disabled
[24372] Config: stream-tcp: stream “max-syn-queued”: 10
[24372] Config: stream-tcp: stream “max-synack-queued”: 5
[24372] Config: stream-tcp: stream.reassembly “memcap”: 268435456
[24372] Config: stream-tcp: stream.reassembly “depth”: 1048576
[24372] Config: stream-tcp: stream.reassembly “toserver-chunk-size”: 2684
[24372] Config: stream-tcp: stream.reassembly “toclient-chunk-size”: 2605
[24372] Config: stream-tcp: stream.reassembly.raw: enabled
[24372] Config: stream-tcp: stream.liberal-timestamps: disabled
[24372] Config: stream-tcp-reassemble: stream.reassembly “segment-prealloc”: 2048
[24372] Config: stream-tcp-reassemble: stream.reassembly “max-regions”: 8
[24372] Info: logopenfile: fast output device (regular) initialized: C:\Program Files\Suricata\log\fast.log
[24372] Info: logopenfile: eve-log output device (regular) initialized: C:\Program Files\Suricata\log\eve.json
[24372] Config: runmodes: enabling ‘eve-log’ module ‘alert’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘frame’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘anomaly’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘http’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘dns’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘tls’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘files’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘smtp’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘ftp’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘rdp’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘nfs’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘smb’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘tftp’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘ike’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘dcerpc’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘krb5’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘bittorrent-dht’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘snmp’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘rfb’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘sip’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘quic’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘dhcp’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘ssh’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘mqtt’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘http2’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘pgsql’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘stats’
[24372] Config: runmodes: enabling ‘eve-log’ module ‘flow’
[24372] Info: logopenfile: stats output device (regular) initialized: C:\Program Files\Suricata\log\stats.log
[24372] Config: suricata: Delayed detect disabled
[24372] Config: detect: pattern matchers: MPM: ac, SPM: bm
[24372] Config: detect: grouping: tcp-whitelist (default) 53, 80, 139, 443, 445, 1433, 3306, 3389, 6666, 6667, 8080
[24372] Config: detect: grouping: udp-whitelist (default) 53, 135, 5060
[24372] Config: detect: prefilter engines: MPM
[24372] Config: reputation: IP reputation disabled
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\botcc.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\botcc.portgrouped.rules
[24372] Config: detect: No rules loaded from botcc.portgrouped.rules.
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\ciarmy.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\compromised.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\drop.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\dshield.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-activex.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-adware_pup.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-attack_response.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-chat.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-coinminer.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-current_events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-dns.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-deleted.rules
[24372] Config: detect: No rules loaded from emerging-deleted.rules.
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-dos.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-exploit.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-ftp.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-games.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-hunting.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-icmp_info.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-icmp.rules
[24372] Config: detect: No rules loaded from emerging-icmp.rules.
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-imap.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-inappropriate.rules
[24372] Config: detect: No rules loaded from emerging-inappropriate.rules.
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-info.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-ja3.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-malware.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-misc.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-mobile_malware.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-netbios.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-phishing.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-p2p.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-policy.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-pop3.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-rpc.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-scada.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-scan.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-shellcode.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-smtp.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-snmp.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-sql.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-telnet.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-tftp.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-user_agents.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-voip.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-web_client.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-web_server.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-web_specific_apps.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\emerging-worm.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\tor.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\stream-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\http-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\http2-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\smtp-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\dns-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\tls-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\app-layer-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\ntp-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\ipsec-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\kerberos-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\smb-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\nfs-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\dhcp-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\ssh-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\rfb-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\ftp-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\files.rules
[24372] Config: detect: No rules loaded from files.rules.
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\mqtt-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\quick-events.rules
[24372] Config: detect: Loading rule file: C:\Program Files\Suricata\rules\threatview_CS_c2.rules
[24372] Info: detect: 69 rule files processed. 34617 rules successfully loaded, 0 rules failed
[24372] Warning: threshold-config: Error opening file: “C:\Program Files\Suricata\\threshold.config”: No such file or directory
[24372] Info: detect: 34620 signatures processed. 1393 are IP-only rules, 5242 are inspecting packet payload, 27890 inspect application layer, 0 are decoder event only
[24372] Config: detect: building signature grouping structure, stage 1: preprocessing rules… complete
[24372] Perf: detect: TCP toserver: 41 port groups, 40 unique SGH’s, 1 copies
[24372] Perf: detect: TCP toclient: 21 port groups, 21 unique SGH’s, 0 copies
[24372] Perf: detect: UDP toserver: 41 port groups, 39 unique SGH’s, 2 copies
[24372] Perf: detect: UDP toclient: 21 port groups, 16 unique SGH’s, 5 copies
[24372] Perf: detect: OTHER toserver: 254 proto groups, 4 unique SGH’s, 250 copies
[24372] Perf: detect: OTHER toclient: 254 proto groups, 0 unique SGH’s, 254 copies
[24372] Perf: detect: Unique rule groups: 120
[24372] Perf: detect: Builtin MPM “toserver TCP packet”: 29
[24372] Perf: detect: Builtin MPM “toclient TCP packet”: 20
[24372] Perf: detect: Builtin MPM “toserver TCP stream”: 31
[24372] Perf: detect: Builtin MPM “toclient TCP stream”: 20
[24372] Perf: detect: Builtin MPM “toserver UDP packet”: 39
[24372] Perf: detect: Builtin MPM “toclient UDP packet”: 16
[24372] Perf: detect: Builtin MPM “other IP packet”: 3
[24372] Perf: detect: AppLayer MPM “toserver http_uri (http)”: 16
[24372] Perf: detect: AppLayer MPM “toserver http_uri (http2)”: 16
[24372] Perf: detect: AppLayer MPM “toserver http_raw_uri (http)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_raw_uri (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_request_line (http)”: 10
[24372] Perf: detect: AppLayer MPM “toserver http_request_line (http2)”: 10
[24372] Perf: detect: AppLayer MPM “toserver http_client_body (http)”: 14
[24372] Perf: detect: AppLayer MPM “toserver http_client_body (http2)”: 14
[24372] Perf: detect: AppLayer MPM “toclient http_response_line (http)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http_response_line (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_header (http)”: 16
[24372] Perf: detect: AppLayer MPM “toclient http_header (http)”: 16
[24372] Perf: detect: AppLayer MPM “toserver http_header (http2)”: 16
[24372] Perf: detect: AppLayer MPM “toclient http_header (http2)”: 16
[24372] Perf: detect: AppLayer MPM “toserver http_header_names (http)”: 16
[24372] Perf: detect: AppLayer MPM “toclient http_header_names (http)”: 16
[24372] Perf: detect: AppLayer MPM “toserver http_header_names (http2)”: 16
[24372] Perf: detect: AppLayer MPM “toclient http_header_names (http2)”: 16
[24372] Perf: detect: AppLayer MPM “toserver http_accept (http)”: 8
[24372] Perf: detect: AppLayer MPM “toserver http_accept (http2)”: 8
[24372] Perf: detect: AppLayer MPM “toserver http_accept_enc (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_accept_enc (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_accept_lang (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_accept_lang (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_referer (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_referer (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_connection (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_connection (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http_connection (http)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http_connection (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_content_len (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_content_len (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http_content_len (http)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http_content_len (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_content_type (http)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_content_type (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http_content_type (http)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http_content_type (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http.server (http)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http.server (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http.location (http)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http.location (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_start (http)”: 6
[24372] Perf: detect: AppLayer MPM “toclient http_start (http)”: 6
[24372] Perf: detect: AppLayer MPM “toserver http_raw_header (http)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http_raw_header (http)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_raw_header (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http_raw_header (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_method (http)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_method (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_cookie (http)”: 6
[24372] Perf: detect: AppLayer MPM “toclient http_cookie (http)”: 6
[24372] Perf: detect: AppLayer MPM “toserver http_cookie (http2)”: 6
[24372] Perf: detect: AppLayer MPM “toclient http_cookie (http2)”: 6
[24372] Perf: detect: AppLayer MPM “toserver http_user_agent (http)”: 14
[24372] Perf: detect: AppLayer MPM “toserver http_user_agent (http2)”: 14
[24372] Perf: detect: AppLayer MPM “toserver http_host (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_host (http)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_host (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_host (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toserver http_raw_host (http)”: 2
[24372] Perf: detect: AppLayer MPM “toserver http_raw_host (http2)”: 2
[24372] Perf: detect: AppLayer MPM “toclient http_stat_code (http)”: 4
[24372] Perf: detect: AppLayer MPM “toclient http_stat_code (http2)”: 4
[24372] Perf: detect: AppLayer MPM “toserver dns_query (dns)”: 2
[24372] Perf: detect: AppLayer MPM “toserver dns_query (dns)”: 1
[24372] Perf: detect: AppLayer MPM “toserver tls.sni (tls)”: 2
[24372] Perf: detect: AppLayer MPM “toserver tls.sni (tls)”: 1
[24372] Perf: detect: AppLayer MPM “toserver tls.cert_issuer (tls)”: 6
[24372] Perf: detect: AppLayer MPM “toclient tls.cert_issuer (tls)”: 6
[24372] Perf: detect: AppLayer MPM “toserver tls.cert_subject (tls)”: 4
[24372] Perf: detect: AppLayer MPM “toclient tls.cert_subject (tls)”: 4
[24372] Perf: detect: AppLayer MPM “toclient tls.cert_serial (tls)”: 2
[24372] Perf: detect: AppLayer MPM “toserver tls.cert_serial (tls)”: 2
[24372] Perf: detect: AppLayer MPM “toclient tls.certs (tls)”: 3
[24372] Perf: detect: AppLayer MPM “toserver tls.certs (tls)”: 3
[24372] Perf: detect: AppLayer MPM “toserver ja3.hash (tls)”: 2
[24372] Perf: detect: AppLayer MPM “toserver ja3.hash (quic)”: 2
[24372] Perf: detect: AppLayer MPM “toclient ja3s.hash (tls)”: 1
[24372] Perf: detect: AppLayer MPM “toclient ja3s.hash (quic)”: 1
[24372] Perf: detect: AppLayer MPM “toserver ssh.proto (ssh)”: 1
[24372] Perf: detect: AppLayer MPM “toclient ssh.proto (ssh)”: 1
[24372] Perf: detect: AppLayer MPM “toclient file_data (nfs)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (nfs)”: 19
[24372] Perf: detect: AppLayer MPM “toclient file_data (smb)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (smb)”: 19
[24372] Perf: detect: AppLayer MPM “toclient file_data (ftp)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (ftp)”: 19
[24372] Perf: detect: AppLayer MPM “toclient file_data (ftp-data)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (ftp-data)”: 19
[24372] Perf: detect: AppLayer MPM “toclient file_data (http)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (http)”: 19
[24372] Perf: detect: AppLayer MPM “toclient file_data (http2)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (http2)”: 19
[24372] Perf: detect: AppLayer MPM “toserver file_data (smtp)”: 19
[24372] Config: tmqh-flow: AutoFP mode using “Hash” flow load balancer
[24372] Config: flow-manager: using 1 flow manager threads
[24372] Config: flow-manager: using 1 flow recycler threads
[24372] Warning: suricata: setrlimit unavailable.
[17416] Info: pcap: Starting file run for ha-idg-1_3.cap
[24372] Notice: threads: Threads created → RX: 1 W: 12 FM: 1 FR: 1 Engine started.
[17416] Info: checksum: No packets with invalid checksum, assuming checksum offloading is NOT used
[17416] Error: pcap: error code -1 truncated dump file; tried to read 606 captured bytes, only got 445 for ha-idg-1_3.cap
[24372] Notice: suricata: Signal Received. Stopping engine.
[24372] Info: suricata: time elapsed 193.258s
[22296] Perf: flow-manager: 23661 flows processed
[17416] Notice: pcap: read 0 files, 12712518 packets, 12580149691 bytes
[24372] Perf: tmqh-flow: AutoFP - Total flow handler queues - 12
[24372] Info: counters: Alerts: 1089
[24372] Perf: ippair: ippair memory usage: 382144 bytes, maximum: 16777216
[24372] Perf: host: host memory usage: 366144 bytes, maximum: 33554432
Where is information about these alerts ?
Bernd