Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Age of TCP CLOSE_WAIT

Posted on 2003-11-10
3
19,375 Views
Last Modified: 2013-12-23
I am aware of how to change the configured CLOSE_WAIT time from its default in Solaris, HPUX, and Linux.  What I would like to know is how can I see how long a socket has been in a CLOSE_WAIT state.
0
Comment
Question by:stewbeast
  • 2
3 Comments
 
LVL 38

Expert Comment

by:yuzh
ID: 9719772
For Solaris:

eg:
set the time-out value to 1 minute:

ndd -set /dev/tcp tcp_close_wait_interval 60000
man ndd

to learn more

0
 
LVL 1

Author Comment

by:stewbeast
ID: 9723731
Yes I am aware of the ndd commands, but what if you are analyzing the impact of a new application on a server and you wish to look at the current sockets in a CLOSE_WAIT status ( netstat -a | grep CLOSE_WAIT) and see how long they have been in that state?  If it can't be done, then it can't be done.. but I am curious to know if it is possible to stat this.
0
 
LVL 38

Accepted Solution

by:
yuzh earned 250 total points
ID: 9727681
I think if you app software has keep alive time setting, and you use it, should
be good enough for you.

You can use netstat, lsof, nmap. (lsof and nmap are freeware, you can download
from the web)

eg:
Solaris:  http://sunfreeware.com/

HP-UX:   http://hpux.cict.fr/          (search for lsof, nmap)
             
Have a look at the following UNIX Socket FAQ:

http://www.developerweb.net/sock-faq/
http://www.informatik.hu-berlin.de/~mueller/dsm/kipper.york.ac.uk/vic/sock-faq/html/unix-socket-faq-2.html 
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question