Bug 1994620 - rgw sts memory leak
Summary: rgw sts memory leak
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: RGW
Version: 4.2
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: 4.2z3
Assignee: Pritha Srivastava
QA Contact: Tejas
URL:
Whiteboard:
Depends On: 1994616
Blocks: 1995562 2006686
TreeView+ depends on / blocked
 
Reported: 2021-08-17 14:48 UTC by Matt Benjamin (redhat)
Modified: 2021-09-27 18:27 UTC (History)
10 users (show)

Fixed In Version: ceph-14.2.11-188.el8cp, ceph-14.2.11-188.el7cp
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1994616
: 1995562 (view as bug list)
Environment:
Last Closed: 2021-09-27 18:26:56 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHCEPH-751 0 None None None 2021-08-19 06:31:27 UTC
Red Hat Product Errata RHBA-2021:3670 0 None None None 2021-09-27 18:27:31 UTC

Description Matt Benjamin (redhat) 2021-08-17 14:48:54 UTC
+++ This bug was initially created as a clone of Bug #1994616 +++

Description of problem:
A structure of at least 200 bytes is leaked with every S3 request protected by STS.  This scale of leak is probably sufficient to force (infrequent) restarts of the RGW server.

Comment 7 errata-xmlrpc 2021-09-27 18:26:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Ceph Storage 4.2 Bug Fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:3670


Note You need to log in before you can comment on or make changes to this bug.