Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
This project is now read‑only. Starting Monday, February 2, please use https://ibm-ceph.atlassian.net/ for all bug tracking management.

Bug 1994616

Summary: rgw sts memory leak
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Matt Benjamin (redhat) <mbenjamin>
Component: RGWAssignee: Pritha Srivastava <prsrivas>
Status: CLOSED ERRATA QA Contact: Tejas <tchandra>
Severity: urgent Docs Contact:
Priority: unspecified    
Version: 4.2CC: cbodley, ceph-eng-bugs, gsitlani, kbader, mbenjamin, prsrivas, sweil, tchandra, tserlin, vereddy, vimishra
Target Milestone: ---Keywords: CodeChange
Target Release: 5.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-16.2.0-117.el8cp Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1994620 (view as bug list) Environment:
Last Closed: 2021-08-30 08:31:54 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1994620, 1995562, 2006686    

Description Matt Benjamin (redhat) 2021-08-17 14:32:18 UTC
Description of problem:
A structure of at least 200 bytes is leaked with every S3 request protected by STS.  This scale of leak is probably sufficient to force (infrequent) restarts of the RGW server.

Comment 9 errata-xmlrpc 2021-08-30 08:31:54 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 5.0 bug fix and enhancement), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:3294

Comment 10 Red Hat Bugzilla 2023-09-15 01:13:45 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 500 days