- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Proactive reaping of sockets from potential SIGBU...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-23-2002 07:00 AM
12-23-2002 07:00 AM
we have a problem with SIGBUS core dumps on a webserver to which clients connect from the internet.
Obviously the webserver is then establishing a connection to a database server which resides behind a firewall to send queries to the db server on behalf of the clients' requests.
Sorry for being so unspecific, but the application on both servers is a black box to me since I have no access to the sources.
(I think even if I had I wouldn't want to wade through Java/C or whatever third party code weeds)
In order to watch this I've written a Perl module (i.e. only a tied array where HP-UX's netstat output for AF_INET sockets is dumped).
What looks suspicious to me is the sheer amount of sockets in FIN_WAIT_2 state as opposed to rather few ESTABLISHED.
(the ratio is 15 on average).
Someone raised their suspicion that the firewall be the culprit since it would sever routes after a certain period of inactivity.
I have no idea what kind of packet filtering the firewallers are doing, and if they are doing stateful inspection at all.
(sometimes I get the impression that they are entangled in their own rule sets ;-)
I thought I could come up with a quick and dirty Perl script that would scan the sockets' states and kill processes on the other end (viz. the db server) that still held a broken/shut socket open.
I'm convinced that this should have been taken care of by the application developers through an appropriate signal handler that safely shut the sockets instead of by anything I could come up with.
Anyway, my problem is to be sure to reap the "right" sockets that sooner or later would raise the dreaded SIGBUS.
Regards
Ralph
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-23-2002 07:28 AM
12-23-2002 07:28 AM
Re: Proactive reaping of sockets from potential SIGBUS throwers
We ran into a similar problem in-house with an application that was leaving lots of sockets in the FIN_WAIT_2 state. We weren't getting anything like SIGBUS errors, but our application was having trouble reconnecting on a particular socket when there were old socket connections in the FIN_WAIT_2 state. The real answer was to get the application fixed [just as you have mentioned], but since it is third party software we have to wait a few months for the next version.
Our workaround was to set the 'tcp_fin_wait_2_timeout' to be 11 minutes. That helps cleanup the old sockets. You'll have to put an entry in /etc/rc.config.d/nddconf to make it permanent. Do a 'man ndd' to see how to set it. One of the threads I read mentions not setting it any lower than 11 minutes or you'll run into some other problems.
JP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-23-2002 07:57 AM
12-23-2002 07:57 AM
Re: Proactive reaping of sockets from potential SIGBUS throwers
thanks for your hint.
I already myself thought about some driver setting through ndd.
Unfortunately I cannot find such an executable, nor manpage, nor init config file on this box.
Perhaps it is done through another tool on this dated OS?:
# uname -srv
HP-UX B.10.20 A
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-23-2002 08:03 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-23-2002 08:03 AM
12-23-2002 08:03 AM
Re: Proactive reaping of sockets from potential SIGBUS throwers
For 10.20 you use the 'nettune' command. I haven't used 'nettune' before, but here is a thread where it is discussed:
http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x6a9b03bbece8d5118ff40090279cd0f9,00.html
JP