Bug 53581
Summary: | Stronghold / Apache secure apache/stronghold servers bring network service down under load | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Need Real Name <diarmuid> |
Component: | apache | Assignee: | Joe Orton <jorton> |
Status: | CLOSED WONTFIX | QA Contact: | David Lawrence <dkl> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 7.1 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | ia64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2004-09-21 10:31:33 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Need Real Name
2001-09-12 10:16:44 UTC
I have verified that this problem also occurs when using a non secure web server (http requests) with the load also generated using the WebLoad application. It seems to manifest itself quicker like this (about 100 minutes to fail when I tested it). This is probably because there is higher network throughput when in non secure mode. (The test was doing around 3000 SSL transactions per second). I ran the "dmesg" command for the first time (after we lost network fxnality) and there was the following interesting messages there... eth0 card reports no resources eth0 : 0 multicast blocks dropped Again bringing down and up eth0 fixes the problem. Which kernel is this, and which network card ? The kernel is the 2.4.3-12 SMP kernel. I'm not sure what the NIC card is because it's built into the machine we're using. The machine is a 4cpu lion(?) which we received from Intel. Should I try and find details on the nic interface? Thanks for the report. This is a mass bug update; since this release of Red Hat Linux is no longer supported, please either: a) try and reproduce the bug with a supported version of Red Hat Enterprise Linux or Fedora Core, and re-open this bug as appropriate after changing the Product field, or, b) if relevant, try and reproduce this bug using the current version of the upstream package, and report the bug upstream. |