On Fri, 15 Jan 2010 10:42:48 +0200
Jari Fredriksson <ja...@iki.fi> wrote:

> On 15.1.2010 10:21, geoff.spamassass...@alphaworks.co.uk wrote:
> > I occasionally get a spam leaking through without having been
> > processed by SA despite passing the part of my procmail filtering
> > where SA is called. These spams are always at the time of scheduled
> > SA restarts so I assume they slip through while it is down. SA is
> > called as below, is there anything I can do to stop this happening?
> > 
> > Thanks,
> > Geoff
> > 
> > :0fw: spamassassin.lock
> > * < 256000
> > | spamc
> > 
> > 
> 
> Add -x option to spamc.
> 
>        -x, --no-safe-fallback
>            Disables the ’safe fallback’ error-recovery method, which
>            passes through the unaltered message if an error occurs.
>            Instead, exit with an error code, and let the MTA queue up
>            the mails for a retry later.  See also "EXIT CODES".
> 
>            This also disables the TCP fail-over behaviour from -d.
> 
> 


Alternatively increase one or both of:


       --connect-retries=retries
           Retry connecting to spamd retries times.  The default is 3 times.

       --retry-sleep=sleep
           Sleep for sleep seconds between attempts to connect to spamd.  The
           default is 1 second.








Reply via email to