Bug 1535720
Summary: | Memory Leak in MiqServer process | |||
---|---|---|---|---|
Product: | Red Hat CloudForms Management Engine | Reporter: | Nick LaMuro <nlamuro> | |
Component: | Appliance | Assignee: | Nick LaMuro <nlamuro> | |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Dave Johnson <dajohnso> | |
Severity: | medium | Docs Contact: | ||
Priority: | high | |||
Version: | 5.9.0 | CC: | abellott, cpelland, dluong, hroy, jrafanie, obarenbo, rspagnol, simaishi | |
Target Milestone: | GA | Keywords: | TestOnly | |
Target Release: | 5.10.0 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | 5.10.0.0 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1536658 1536672 1536692 (view as bug list) | Environment: | ||
Last Closed: | 2018-06-21 20:28:59 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | CFME Core | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1536658, 1536672, 1536692 |
Description
Nick LaMuro
2018-01-17 23:59:08 UTC
We have a set of fixes already in place for this issue: https://github.com/ManageIQ/manageiq/pull/16837 https://github.com/ManageIQ/manageiq-api/pull/288 https://github.com/ManageIQ/manageiq-automation_engine/pull/146 https://github.com/ManageIQ/manageiq-ui-classic/pull/3266 Turned out to be a small, unknown leak in ruby that was prevalent in our application since we defer loading a lot of libraries until they are needed using `require` inside of a method call, and that we were using `Pathnames` in our Rails `autoload_path` that was eventually getting added to the `$LOAD_PATH` in ruby. This would make it so that every `require` call would leak a small amount of memory, and would never be released. This only happens when Pathnames are used instead of raw strings in the `$LOAD_PATH`, so since both are valid, switching to using raw strings is the workaround we are using to prevent the leak. *** Bug 1511859 has been marked as a duplicate of this bug. *** *** Bug 1511890 has been marked as a duplicate of this bug. *** *** Bug 1511136 has been marked as a duplicate of this bug. *** |