Bug 1994620

Summary: rgw sts memory leak
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Matt Benjamin (redhat) <mbenjamin>
Component: RGWAssignee: Pritha Srivastava <prsrivas>
Status: CLOSED ERRATA QA Contact: Tejas <tchandra>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.2CC: cbodley, ceph-eng-bugs, gsitlani, kbader, mbenjamin, prsrivas, sweil, tchandra, tserlin, vimishra
Target Milestone: ---Keywords: CodeChange
Target Release: 4.2z3   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-14.2.11-188.el8cp, ceph-14.2.11-188.el7cp Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 1994616
: 1995562 (view as bug list) Environment:
Last Closed: 2021-09-27 18:26:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1994616    
Bug Blocks: 1995562, 2006686    

Description Matt Benjamin (redhat) 2021-08-17 14:48:54 UTC
+++ This bug was initially created as a clone of Bug #1994616 +++

Description of problem:
A structure of at least 200 bytes is leaked with every S3 request protected by STS.  This scale of leak is probably sufficient to force (infrequent) restarts of the RGW server.

Comment 7 errata-xmlrpc 2021-09-27 18:26:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 4.2 Bug Fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:3670