HEX
Server: LiteSpeed
System: Linux kapuas.iixcp.rumahweb.net 5.14.0-427.42.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Nov 1 14:58:02 EDT 2024 x86_64
User: mirz4654 (1666)
PHP: 8.1.33
Disabled: system,exec,escapeshellarg,escapeshellcmd,passthru,proc_close,proc_get_status,proc_nice,proc_open,proc_terminate,shell_exec,popen,pclose,dl,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setsid,posix_setuid,posix_setpgid,ini_alter,show_source,define_syslog_variables,symlink,syslog,openlog,openlog,closelog,ocinumcols,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dll,ftp,myshellexec,socket_bind,mail,posix_getwpuid
Upload Files
File: //lib/netdata/conf.d/health.d/tcp_listen.conf
# There are two queues involved when incoming TCP connections are handled
# (both at the kernel):
#
# SYN queue
# The SYN queue tracks TCP handshakes until connections are fully established.
# It overflows when too many incoming TCP connection requests hang in the
# half-open state and the server is not configured to fall back to SYN cookies.
# Overflows are usually caused by SYN flood DoS attacks (i.e. someone sends
# lots of SYN packets and never completes the handshakes).
#
# Accept queue
# The accept queue holds fully established TCP connections waiting to be handled
# by the listening application. It overflows when the server application fails
# to accept new connections at the rate they are coming in.
#
#
# -----------------------------------------------------------------------------
# tcp accept queue (at the kernel)

      alarm: 1m_tcp_accept_queue_overflows
         on: ip.tcp_accept_queue
      class: Workload
       type: System
  component: Network
host labels: _os=linux
     lookup: average -60s unaligned absolute of ListenOverflows
      units: overflows
      every: 10s
       warn: $this > 1
       crit: $this > (($status == $CRITICAL) ? (1) : (5))
      delay: up 0 down 5m multiplier 1.5 max 1h
    summary: System TCP accept queue overflows
       info: Average number of overflows in the TCP accept queue over the last minute
         to: silent

# THIS IS TOO GENERIC
# CHECK: https://github.com/netdata/netdata/issues/3234#issuecomment-423935842
      alarm: 1m_tcp_accept_queue_drops
         on: ip.tcp_accept_queue
      class: Workload
       type: System
  component: Network
host labels: _os=linux
     lookup: average -60s unaligned absolute of ListenDrops
      units: drops
      every: 10s
       warn: $this > 1
       crit: $this > (($status == $CRITICAL) ? (1) : (5))
      delay: up 0 down 5m multiplier 1.5 max 1h
    summary: System TCP accept queue dropped packets
       info: Average number of dropped packets in the TCP accept queue over the last minute
         to: silent

# -----------------------------------------------------------------------------
# tcp SYN queue (at the kernel)

# When the SYN queue is full, either TcpExtTCPReqQFullDoCookies or
# TcpExtTCPReqQFullDrop is incremented, depending on whether SYN cookies are
# enabled or not. In both cases this probably indicates a SYN flood attack,
# so i guess a notification should be sent.

      alarm: 1m_tcp_syn_queue_drops
         on: ip.tcp_syn_queue
      class: Workload
       type: System
  component: Network
host labels: _os=linux
     lookup: average -60s unaligned absolute of TCPReqQFullDrop
      units: drops
      every: 10s
       warn: $this > 1
       crit: $this > (($status == $CRITICAL) ? (0) : (5))
      delay: up 10 down 5m multiplier 1.5 max 1h
    summary: System  TCP SYN queue drops
       info: Average number of SYN requests was dropped due to the full TCP SYN queue over the last minute \
             (SYN cookies were not enabled)
         to: silent

      alarm: 1m_tcp_syn_queue_cookies
         on: ip.tcp_syn_queue
      class: Workload
       type: System
  component: Network
host labels: _os=linux
     lookup: average -60s unaligned absolute of TCPReqQFullDoCookies
      units: cookies
      every: 10s
       warn: $this > 1
       crit: $this > (($status == $CRITICAL) ? (0) : (5))
      delay: up 10 down 5m multiplier 1.5 max 1h
    summary: System TCP SYN queue cookies
       info: Average number of sent SYN cookies due to the full TCP SYN queue over the last minute
         to: silent