IBM HTTP Server (Appache) threads piling up and never timed out

Posted on 2012-09-11
Last Modified: 2012-10-09
I have a web server that have a strange issue.
The application server ran out of maxconnections and WAS was bounce. Looks like the IHS server-status, two of the child processes are not timed out. i need help to understand how it works. If you look at the attached jpg file, the these two timestamps shows that the thread never timedout? please help me understand what exactly does this mean. Thanks!
Question by:Sai1319
    LVL 41

    Accepted Solution

    IHS Performance Tuning has a number of good techniques for understanding what is happening with your IHS system.

    The WebSphere documentation includes the following:

    The ServerIOTimeout attribute of a server element enables the plug-in to set
    a time out value, in seconds, for sending requests to and reading responses
    from the application server. If a value is not set for the ServerIOTimeout
    attribute, the plug-in, by default, uses blocked I/O to write request to and
    read response from the application server until the TCP connection times
    out. For example, if you specify:
    <Server Name="server1" ServerIOTimeout=300>In this case, if an application
    server stops responding to requests, the plug-in waits 300 seconds (50
    minutes) before timing out the TCP connection. Setting the ServerIOTimeout
    attribute to a reasonable value enables the plug-in to time out the
    connection sooner, and transfer requests to another application server when

    When selecting a value for this attribute, remember that sometimes it might
    take a couple of minutes for an application server to process a request.
    Setting the value of the ServerIOTimeout attribute too low could cause the
    plug-in to send a false server error response to the client.
    LVL 41

    Expert Comment

    Thanks for the points.

    Good luck & have a great day.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    Suggested Solutions

    Title # Comments Views Activity
    Using object mapper in spring web application 8 39
    Problem to get function 52 68
    scoresClump  challenge 31 87
    wordappend challenge 8 49
    I had a project requirement for a displaying a user workbench .This workbench would consist multiple data grids .In each grid the user will be able to see a large number of data. These data grids should allow the user to 1. Sort 2. Export the …
    If your site has a few sections that need to be secure when data is transmitted between the server and local computer, such as a /order/ section for ordering or /customer/ which contains customer data, etc it would of course be recommended to secure…
    The viewer will learn how to implement Singleton Design Pattern in Java.
    This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now