Back to All Scenarios
PASSEDcache / connection_storm

Dragonfly 1.14 Connection Storm — SYN Flood or Client Bug on SUSE Enterprise 15 SP5

Dragonfly 1.14 is receiving thousands of new connections per second, overwhelming the accept queue. Legitimate connections being dropped.

Pattern
CONNECTION_REFUSED
Severity
CRITICAL
Confidence
68%
Remediation
Auto-Heal

Test Results

MetricExpectedActualResult
Pattern RecognitionCONNECTION_REFUSEDCONNECTION_REFUSED
Severity AssessmentHIGHCRITICAL
Incident CorrelationN/ANone
Cascade EscalationN/ANo
RemediationAuto-Heal — Corax resolves autonomously

Scenario Conditions

SUSE Enterprise 15 SP5. Dragonfly 1.14 seeing 42583 new connections/sec (normal: 175). SYN backlog full. accept queue overflowing. net.core.somaxconn=3442.

Injected Error Messages (1)

Dragonfly 1.14 on SUSE Enterprise 15 SP5 — connection refused for legitimate clients, 42583 new conns/sec (normal: 175), SYN backlog full, accept queue overflow, ECONNREFUSED

Neural Engine Root Cause Analysis

Connection refused — service is likely crashed or not listening on the expected port.

Remediation Plan

Restart the target service. If recurring, check for memory leaks or crash loops.

Improvements Applied

  • Severity: CRITICAL (expected HIGH)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr10u08mhlig7807vtrv7