* [gentoo-user] TCP listen overflows
@ 2015-10-14 16:11 Grant
2015-10-14 17:19 ` [gentoo-user] " James
0 siblings, 1 reply; 3+ messages in thread
From: Grant @ 2015-10-14 16:11 UTC (permalink / raw
To: Gentoo mailing list
My site when down for about 10 minutes recently and the only
interesting thing I see in the munin graphs is a massive spike in "TCP
socket buffer errors", specifically "Listen overflows" at exactly the
same time. Is that a clue or just a result of the downtime? Nothing
in the logs.
- Grant
^ permalink raw reply [flat|nested] 3+ messages in thread
* [gentoo-user] Re: TCP listen overflows
2015-10-14 16:11 [gentoo-user] TCP listen overflows Grant
@ 2015-10-14 17:19 ` James
2015-10-19 23:39 ` Adam Carter
0 siblings, 1 reply; 3+ messages in thread
From: James @ 2015-10-14 17:19 UTC (permalink / raw
To: gentoo-user
Grant <emailgrant <at> gmail.com> writes:
> My site when down for about 10 minutes recently and the only
> interesting thing I see in the munin graphs is a massive spike in "TCP
> socket buffer errors", specifically "Listen overflows" at exactly the
> same time. Is that a clue or just a result of the downtime? Nothing
> in the logs.
Hard to tell. What I have done in the past is install a hub/switch
outside your firewall/DMZ with several systems to perform 'mock tests'
via standard penetration tests, packet flooding, DoS, etc etc depending
on your suspicions, and pound on your net
Pentoo linux is also an excellent tool.
hth,
James
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2015-10-19 23:39 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-10-14 16:11 [gentoo-user] TCP listen overflows Grant
2015-10-14 17:19 ` [gentoo-user] " James
2015-10-19 23:39 ` Adam Carter
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox