Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
EZZ8669I z/OS Communications Server: IP Messages Volume 4 (EZZ, SNM) SC27-3657-01 |
|
EZZ8669I TRMD TCP connection reset due to constrained send queue detected: date
time connid= connid jobname= jobname lipaddr= lipaddr lport= lport ripaddr= ripaddr rport= rport trigger= trigger dataage= dataage bytesqueued= bytesqueued queuesize= queuesize correlator= correlator probeid= probeid sensorhostname= sensorhostname ExplanationThe specified TCP connection was reset because the send queue for the connection was constrained and intrusion detection services (IDS) policy for the TCP queue size attack type specified that connections with constrained queues should be reset. The send queue was constrained because excessive or old data had accumulated on the queue. In the message text:
System actionProcessing continues. Operator responseDetermine why the remote application was not receiving the data being sent by the local application, or was not receiving the data at a sufficient rate to avoid the accumulation of excessive or old data on the send queue. System programmer responseNo action is needed. User responseNot applicable. Problem determinationSee the operator response. Sourcez/OS® Communications Server TCP/IP: TRMD ModuleEZATRMD Routing code* Descriptor code* AutomationThis message is written to syslogd. This message is a good candidate for automation. Automation can alert you when a TCP connection is reset because the TCP send queue for the connection entered a constrained state. Example
|
Copyright IBM Corporation 1990, 2014
|