Back to All ScenariosPASSEDcache / connection_storm Dragonfly 1.14 Connection Storm — SYN Flood or Client Bug on Ubuntu 22.04 LTS
Dragonfly 1.14 is receiving thousands of new connections per second, overwhelming the accept queue. Legitimate connections being dropped.
Pattern
CONNECTION_REFUSED
| Metric | Expected | Actual | Result |
|---|
| Pattern Recognition | CONNECTION_REFUSED | CONNECTION_REFUSED | |
| Severity Assessment | HIGH | CRITICAL | |
| Incident Correlation | N/A | None | |
| Cascade Escalation | N/A | No | |
| Remediation | — | Auto-Heal — Corax resolves autonomously | |
Scenario Conditions
Ubuntu 22.04 LTS. Dragonfly 1.14 seeing 49999 new connections/sec (normal: 199). SYN backlog full. accept queue overflowing. net.core.somaxconn=4095.
Injected Error Messages (1)
Dragonfly 1.14 on Ubuntu 22.04 LTS — connection refused for legitimate clients, 49999 new conns/sec (normal: 199), SYN backlog full, accept queue overflow, ECONNREFUSED
Neural Engine Root Cause Analysis
Connection refused — service is likely crashed or not listening on the expected port.
Remediation Plan
Restart the target service. If recurring, check for memory leaks or crash loops.
Improvements Applied
- Severity: CRITICAL (expected HIGH)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr10u08malig7i7lpn6fd