Back to All ScenariosPASSEDcache / connection_storm Dragonfly 1.14 Connection Storm — SYN Flood or Client Bug on CentOS 9 Stream
Dragonfly 1.14 is receiving thousands of new connections per second, overwhelming the accept queue. Legitimate connections being dropped.
Pattern
CONNECTION_REFUSED
| Metric | Expected | Actual | Result |
|---|
| Pattern Recognition | CONNECTION_REFUSED | CONNECTION_REFUSED | |
| Severity Assessment | HIGH | CRITICAL | |
| Incident Correlation | N/A | None | |
| Cascade Escalation | N/A | No | |
| Remediation | — | Auto-Heal — Corax resolves autonomously | |
Scenario Conditions
CentOS 9 Stream. Dragonfly 1.14 seeing 17422 new connections/sec (normal: 91). SYN backlog full. accept queue overflowing. net.core.somaxconn=1223.
Injected Error Messages (1)
Dragonfly 1.14 on CentOS 9 Stream — connection refused for legitimate clients, 17422 new conns/sec (normal: 91), SYN backlog full, accept queue overflow, ECONNREFUSED
Neural Engine Root Cause Analysis
Connection refused — service is likely crashed or not listening on the expected port.
Remediation Plan
Restart the target service. If recurring, check for memory leaks or crash loops.
Improvements Applied
- Severity: CRITICAL (expected HIGH)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr10u08mclig7r7gl9cco