Hello Chris,

You can use netstat for identify what process is listening in 47400 port,
as root type:

# netstat -punlt | grep 47400


I hope will be helpfully

Regards


2014/1/21 artnaseef <a...@artnaseef.com>

> Can you use a network packet sniffer, like tcpdump or wireshark?
>
> Those errors mean the other end of the TCP/IP connection was dropped
> without
> a higher-level cleanup of the connection.  Could be the broker dropping and
> coming back, network issues (timeouts, disconnects), or aborted connection
> in the broker.
>
> The log lines posted are from the clients, right?  Is there anything
> corresponding on the broker side?
>
>
>
> --
> View this message in context:
> http://activemq.2283324.n4.nabble.com/EOF-Exception-tp4676514p4676607.html
> Sent from the ActiveMQ - User mailing list archive at Nabble.com.
>

Reply via email to