> This problem  occure when we  have the load blance to to see if the
C:D is
> up by probing the port ,  this  is  corrected. 

Yes, that would clearly cause it. I don't know of any commercially
available load balancers that understand the C:D protocol well enough to
do a layer 4 transaction to verify availability. 

> Now it seems we have user
> write API to to talk to C:D and it causing the problem.

If that user is doing something really dumb like just aborting the
connection without properly shutting it down, then C:D is doing exactly
what it's supposed to do (waiting for the 2 minute timeout to declare
that the socket peer has gone away), and the user program (and most
probably, the user) needs correcting. Also, is this user testing against
the production instance? If so, why? 

What exactly is this API supposed to accomplish, if you can share the
info? Maybe there's a different way to accomplish what you want.

>  Do you guys feels  reducing  the  default 180000 for the
TCP-TIME-WAIT
> BUCKETS POOL SIZE  will  correct the problem?

No. Masking the problem won't really help you. 
 

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to