Last Modified: Apr 28, 2025
Affected Product(s):
BIG-IP All
Known Affected Versions:
14.0.0, 13.1.0, 12.1.3.5, 12.1.3.4, 12.1.3.3
Fixed In:
14.1.0, 14.0.0.3, 13.1.1.2, 12.1.4
Opened: Jun 20, 2018 Severity: 2-Critical Related Article:
K11662998
dynconfd memory usage slowly increases over time as it processes various state-related messages.
dynconfd grows over time and eventually the system is pushed into swap. Once swap is exhausted, the Linux OOM killer might terminate critical system processes, disrupting operation.
No special conditions as dynconfd is a core LTM process. Large numbers of pool members combined with flapping might increase the rate of memory usage increase.
Periodic restarts of dynconfd avoids the growth affecting the system.
dynconfd no longer leaks memory when processing messages.