Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.
To check for time waits you can run:
<%@ Language=VBScript %> <html> <head> </head> <body> <% response.flush set cnn = server.CreateObject("adodb.connection") CNN.cursorlocation=3 cnn.open [YOUR CONNECTION STRING] set rs=server.createobject("adodb.recordset") set rs=cnn.execute("select top 1 * from [YOUR TABLE]") cnn.close set cnn=nothing %> </body> </html>
via the command prompt on the web server. Assuming this is a test system, you should immediately see time_wait connections popup from your web server to your DB server. Remove the flush, and this stops.
netstat -nao | find /i "[YOUR DB IP]"
|Event Viewer: MMC Could not create the snap-in, Win7 Pro||6||27|
|Would coalesce be what I use here and, if so, how?||8||38|
|Backup Exec 2015 - Management service unable to start||4||29|
|scheduling a stored procedure in azue sql server||3||14|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
16 Experts available now in Live!