Back to All Scenarios
PASSEDcache / connection_storm

Dragonfly 1.14 Connection Storm — SYN Flood or Client Bug on CentOS 9 Stream

Dragonfly 1.14 is receiving thousands of new connections per second, overwhelming the accept queue. Legitimate connections being dropped.

Pattern
CONNECTION_REFUSED
Severity
CRITICAL
Confidence
68%
Remediation
Auto-Heal

Test Results

MetricExpectedActualResult
Pattern RecognitionCONNECTION_REFUSEDCONNECTION_REFUSED
Severity AssessmentHIGHCRITICAL
Incident CorrelationN/ANone
Cascade EscalationN/ANo
RemediationAuto-Heal — Corax resolves autonomously

Scenario Conditions

CentOS 9 Stream. Dragonfly 1.14 seeing 17422 new connections/sec (normal: 91). SYN backlog full. accept queue overflowing. net.core.somaxconn=1223.

Injected Error Messages (1)

Dragonfly 1.14 on CentOS 9 Stream — connection refused for legitimate clients, 17422 new conns/sec (normal: 91), SYN backlog full, accept queue overflow, ECONNREFUSED

Neural Engine Root Cause Analysis

Connection refused — service is likely crashed or not listening on the expected port.

Remediation Plan

Restart the target service. If recurring, check for memory leaks or crash loops.

Improvements Applied

  • Severity: CRITICAL (expected HIGH)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr10u08mclig7r7gl9cco