Bug 1994616 - rgw sts memory leak
Summary: rgw sts memory leak
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: RGW
Version: 4.2
Hardware: Unspecified
OS: Unspecified
unspecified
urgent
Target Milestone: ---
: 5.0
Assignee: Pritha Srivastava
QA Contact: Tejas
URL:
Whiteboard:
Depends On:
Blocks: 1994620 1995562 2006686
TreeView+ depends on / blocked
 
Reported: 2021-08-17 14:32 UTC by Matt Benjamin (redhat)
Modified: 2023-09-15 01:13 UTC (History)
11 users (show)

Fixed In Version: ceph-16.2.0-117.el8cp
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 1994620 (view as bug list)
Environment:
Last Closed: 2021-08-30 08:31:54 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Ceph Project Bug Tracker 52290 0 None None None 2021-08-17 14:48:04 UTC
Github ceph ceph pull 42803 0 None None None 2021-08-17 14:32:18 UTC
Red Hat Issue Tracker RHCEPH-720 0 None None None 2021-08-19 11:43:08 UTC
Red Hat Product Errata RHBA-2021:3294 0 None None None 2021-08-30 08:32:05 UTC

Description Matt Benjamin (redhat) 2021-08-17 14:32:18 UTC
Description of problem:
A structure of at least 200 bytes is leaked with every S3 request protected by STS.  This scale of leak is probably sufficient to force (infrequent) restarts of the RGW server.

Comment 9 errata-xmlrpc 2021-08-30 08:31:54 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 5.0 bug fix and enhancement), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:3294

Comment 10 Red Hat Bugzilla 2023-09-15 01:13:45 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 500 days


Note You need to log in before you can comment on or make changes to this bug.