Dragonfly 1.14 Connection Storm — SYN Flood or Client Bug on Rocky Linux 9
Dragonfly 1.14 is receiving thousands of new connections per second, overwhelming the accept queue. Legitimate connections being dropped.
Pattern
CONNECTION_REFUSED
Severity
CRITICAL
Confidence
68%
Remediation
Auto-Heal
Test Results
Metric
Expected
Actual
Result
Pattern Recognition
CONNECTION_REFUSED
CONNECTION_REFUSED
Severity Assessment
HIGH
CRITICAL
Incident Correlation
N/A
None
Cascade Escalation
N/A
No
Remediation
—
Auto-Heal — Corax resolves autonomously
Scenario Conditions
Rocky Linux 9. Dragonfly 1.14 seeing 5090 new connections/sec (normal: 50). SYN backlog full. accept queue overflowing. net.core.somaxconn=135.
Injected Error Messages (1)
Dragonfly 1.14 on Rocky Linux 9 — connection refused for legitimate clients, 5090 new conns/sec (normal: 50), SYN backlog full, accept queue overflow, ECONNREFUSED
Neural Engine Root Cause Analysis
Connection refused — service is likely crashed or not listening on the expected port.
Remediation Plan
Restart the target service. If recurring, check for memory leaks or crash loops.