When one aserver is unreachable for cache flush the eserver retries all aservers.
Originally Published: 2011-12-14
Article Number
Applies To
Issue
Cache flush delay causes delays in cache flush events for password changes.
When there is a change on the eserver (for example a change to a user object) the eserver will send out a cache poison event to each aserver that is returned on the dispatchers list of asevers. If any aserver is unreachable the eserver will try cleartrust.eserver.runtime.retry_count times (default=3) to re-send this cache poison event. It will wait cleartrust.eserver.runtime.timeout (default 0) between each attempt. The the eserver will attempt to send the cache poison event to all aservers in the connection pool not just the one that failed. If there are a large number of aservers, this is undesirable.
The aserver that is unreachable may be identified by examination of the eserver standard output in debug mode. The debug output will log the following message for each retry attempt against an aserver that is not reachable:
2012/07/25 04:44:55:748 [*] [QueueDispatcher (sirrus.util.net.SocketFactory.debugCreateSocket)] - Connecting to 192.168.10.1:5615, timeout=15000
Resolution
Notes
Related Articles
RSA Web Threat Detection: How to troubleshoot SSL Cache and 'Resume Cache Misses' in Varz 18Number of Views Configure the Cache 13Number of Views Flush the Cache 64Number of Views How to change Operations Console password on AM 8.x 55Number of Views General Configuration 4Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 Authentication Manager Supported Hardware and Upgrade Paths
Don't see what you're looking for?