Here are the hacks
?The 10060 and 10054 errors in the NetBackup logs can be related to
dropped connections due to a timeout, which can occur quite often under
congested networks. It is possible to increase the likelihood of keeping
client connections alive in the event of temporary congestion by
increasing the value of the TcpMaxDataRetransmissions parameter in the
server registry.
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
3. On the Edit menu, click Add Value , and then add the following registry
value:
Value Name: TcpMaxDataRetransmissions
Data Type: REG_DWORD
Value: 6
4. Quit Registry Editor and reboot for the changes to take effect.
The default value for this is 5 and should gradually be increased until
you find the desired result.
It is also possible to increase the TcpMaxConnectRetransmissions. This
parameter determines the number of times TCP will retransmit a connect
request (SYN) before aborting the attempt. The retransmission timeout is
doubled with each successive retransmission in a given connect attempt.
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
3. On the Edit menu, click Add Value , and then add the following registry
value:
Value Name: TcpMaxConnectRetransmissions
Data Type: REG_DWORD
Value: Default: 3 (in Windows NT)
Default: 2 (in Windows 2000)
4. Quit Registry Editor and reboot for the changes to take effect.
This value should be increased by incrementals of
=============================
Carl Stehman
IT Distributed Services Team
Pepco Holdings, Inc.
202-331-6619
Pager 301-765-2703
[EMAIL PROTECTED]
"WEAVER, Simon \(external\)" <[EMAIL PROTECTED]>
05/30/2008 10:01 AM
To
<[EMAIL PROTECTED]>, "Cornely, David" <[EMAIL PROTECTED]>
cc
<[email protected]>,
<[EMAIL PROTECTED]>
Subject
RE: [Veritas-bu] Network Connection time out (41)
increase client timeouts perhaps ?
CLIENT_CONNECT_TIMEOUT 32000
HKey_Local_Machine\Software\Veritas\NetBackup\Current Version\Config !
Simon
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, May 30, 2008 1:30 PM
To: Cornely, David
Cc: [email protected];
[EMAIL PROTECTED]
Subject: Re: [Veritas-bu] Network Connection time out (41)
We had similar problems with some systems behind a firewall that could not
handle the backup traffic. Symantec gave us some
regristry hacks that changed how Windows handles TCP timeouts. It solved
our problem.
If you think it might help, let me know and I'll send the regristry hacks.
=============================
Carl Stehman
IT Distributed Services Team
Pepco Holdings, Inc.
202-331-6619
Pager 301-765-2703
[EMAIL PROTECTED]
"Cornely, David" <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
05/29/2008 04:38 PM
To
<[email protected]>
cc
Subject
Re: [Veritas-bu] Network Connection time out (41)
A while ago we saw similar issues with duplications, at least it was the
same ?Connection reset by peer? error (although different error code).
It was fixed by changing our TCP keepalive value on the media server.
Perhaps someone changed a timeout value on the firewall. Play with this
value on the media server to see if it helps.
http://sunsolve.sun.com/search/document.do?assetkey=1-30-2876-1
For windows, probably a registry change.
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jimenez,
Daniel
Sent: Thursday, May 29, 2008 13:01
To: [email protected]
Subject: [Veritas-bu] Network Connection time out (41)
Hey guys
I am receiving a Network Connection time out (41) on a consistent basis
when I run a backup on two of our servers. The servers are behind a DMZ
but I have set the BPCD connect-back to use the VNETD port and it worked
for a long time but now all I receive are 41 errors. The servers do write
some data but eventually error out. I am able to telnet to port 13724 on
both servers so there is no blocking on the firewall for that port. Any
assistance would be appreciated.
CLIENT BPBKAR LOG:
12:28:31.007 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.038 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 125 bytes
12:28:31.038 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.038 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 171 bytes
12:28:31.569 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.569 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 171 bytes
12:28:31.757 PM: [648.3824] <16> dtcp_read: TCP - failure: recv socket
(376) (TCP 10053: Software caused connection abort)
12:28:31.804 PM: [648.3824] <2> tar_base::V_vTarMsgW: FTL - tar file write
error (40)
12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 6 bytes
12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.804 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 26 bytes
12:28:31.866 PM: [648.3824] <2> tar_base::V_vTarMsgW: INF - EXIT STATUS
14: file write failed
12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 6 bytes
12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.866 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 34 bytes
12:28:31.882 PM: [648.3824] <4> tar_backup::backup_done_state: INF - Not
waiting for server status
12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 6 bytes
12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: send socket
(1864) (TCP 10054: Connection reset by peer)
12:28:31.929 PM: [648.3824] <16> dtcp_write: TCP - failure: attempted to
send 33 bytes
12:28:37.585 PM: [648.3824] <4> OVStopCmd: INF - EXIT - status = 0
12:28:39.726 PM: [648.3824] <2> ov_log::V_GlobalLog: INF - BEDS_Term()
Enter InitFlags:0x1
12:28:40.351 PM: [648.3824] <16> dtcp_read: TCP - failure: recv socket
(376) (TCP 10053: Software caused connection abort)
12:28:40.366 PM: [648.3824] <4> OVShutdown: INF - Finished process
12:28:40.366 PM: [648.3824] <4> WinMain: INF - Exiting C:\Program
Files\VERITAS\NetBackup\bin\bpbkar32.exe
12:28:42.382 PM: [648.3824] <4> ov_log::OVClose: INF - Closing log file:
C:\Program Files\VERITAS\NetBackup\logs\BPBKAR\052908.LOG
Daniel Jimenez
Systems Analyst II
Data Protection Team
_______________________________________________
Veritas-bu maillist - [email protected]
http://mailman.eng.auburn.edu/mailman/listinfo/veritas-bu
This Email message and any attachment may contain information that is
proprietary, legally privileged, confidential and/or subject to copyright
belonging to Pepco Holdings, Inc. or its affiliates ("PHI"). This Email is
intended solely for the use of the person(s) to which it is addressed. If
you are not an intended recipient, or the employee or agent responsible
for delivery of this Email to the intended recipient(s), you are hereby
notified that any dissemination, distribution or copying of this Email is
strictly prohibited. If you have received this message in error, please
immediately notify the sender and permanently delete this Email and any
copies. PHI policies expressly prohibit employees from making defamatory
or offensive statements and infringing any copyright or any other legal
right by Email communication. PHI will not accept any liability in respect
of such communications.
This email (including any attachments) may contain confidential and/or
privileged information or information otherwise protected from disclosure.
If you are not the intended recipient, please notify the sender
immediately, do not copy this message or any attachments and do not use it
for any purpose or disclose its content to any person, but delete this
message and any attachments from your system. Astrium disclaims any and
all
liability if this email transmission was virus corrupted, altered or
falsified.
---------------------------------------------------------------------
Astrium Limited, Registered in England and Wales No. 2449259
REGISTERED OFFICE:-
Gunnels Wood Road, Stevenage, Hertfordshire, SG1 2AS, England
This Email message and any attachment may contain information that is
proprietary, legally privileged, confidential and/or subject to copyright
belonging to Pepco Holdings, Inc. or its affiliates ("PHI"). This Email is
intended solely for the use of the person(s) to which it is addressed. If
you are not an intended recipient, or the employee or agent responsible for
delivery of this Email to the intended recipient(s), you are hereby notified
that any dissemination, distribution or copying of this Email is strictly
prohibited. If you have received this message in error, please immediately
notify the sender and permanently delete this Email and any copies. PHI
policies expressly prohibit employees from making defamatory or offensive
statements and infringing any copyright or any other legal right by Email
communication. PHI will not accept any liability in respect of such
communications.
_______________________________________________
Veritas-bu maillist - [email protected]
http://mailman.eng.auburn.edu/mailman/listinfo/veritas-bu