Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2231496
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh89 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 2231496
-
Memory Leak occurs when making repeated large queries against Pulpcore API service
Summary:
Memory Leak occurs when making repeated large queries against Pulpcore API se...
Keywords
:
PrioBumpGSS
Triaged
Status
:
ON_DEV
Alias:
None
Product:
Red Hat Satellite
Classification:
Red Hat
Component:
Pulp
Sub Component:
---
Version:
6.13.0
Hardware:
Unspecified
OS:
Unspecified
Priority:
unspecified
Severity:
unspecified
Target Milestone:
6.13.4
Assignee:
satellite6-bugs
QA Contact:
Satellite QE Team
Docs Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+
depends on
/
blocked
Reported:
2023-08-11 17:54 UTC by
Odilon Sousa
Modified:
2023-08-12 02:55 UTC (
History
)
CC List:
10 users
(
show
)
ahumbe
dkliban
ggainey
iballou
osousa
pcreech
pdwyer
rchan
saydas
vsedmik
Fixed In Version:
pulpcore-3.22.9,pulpcore-3.28.5,pulpcore-3.21.12
Doc Type:
If docs needed, set a value
Doc Text:
Clone Of:
2229788
Environment:
Last Closed:
Target Upstream Version:
Embargoed:
Attachments
(Terms of Use)
Links
System
ID
Private
Priority
Status
Summary
Last Updated
Github
pulp pulpcore pull 4090
0
None
Merged
Fix a significant memory leak
2023-08-11 17:54:38 UTC
Red Hat Issue Tracker
SAT-19465
0
None
None
None
2023-08-11 17:54:38 UTC
Red Hat Issue Tracker
SAT-19517
0
None
None
None
2023-08-11 17:55:10 UTC
Note
You need to
log in
before you can comment on or make changes to this bug.