Back to All ScenariosPASSEDcache / connection_storm Dragonfly 1.14 Connection Storm — SYN Flood or Client Bug on RHEL 9
Dragonfly 1.14 is receiving thousands of new connections per second, overwhelming the accept queue. Legitimate connections being dropped.
Pattern
CONNECTION_REFUSED
| Metric | Expected | Actual | Result |
|---|
| Pattern Recognition | CONNECTION_REFUSED | CONNECTION_REFUSED | |
| Severity Assessment | HIGH | CRITICAL | |
| Incident Correlation | N/A | None | |
| Cascade Escalation | N/A | No | |
| Remediation | — | Auto-Heal — Corax resolves autonomously | |
Scenario Conditions
RHEL 9. Dragonfly 1.14 seeing 35704 new connections/sec (normal: 152). SYN backlog full. accept queue overflowing. net.core.somaxconn=2835.
Injected Error Messages (1)
Dragonfly 1.14 on RHEL 9 — connection refused for legitimate clients, 35704 new conns/sec (normal: 152), SYN backlog full, accept queue overflow, ECONNREFUSED
Neural Engine Root Cause Analysis
Connection refused — service is likely crashed or not listening on the expected port.
Remediation Plan
Restart the target service. If recurring, check for memory leaks or crash loops.
Improvements Applied
- Severity: CRITICAL (expected HIGH)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr10u08mflig7h1oj95ex