Last Modified: Nov 22, 2021
See more info
Known Affected Versions:
14.0.0, 13.1.0, 22.214.171.124, 126.96.36.199, 188.8.131.52
14.1.0, 184.108.40.206, 220.127.116.11, 12.1.4
Opened: Jun 20, 2018
Related Article: K11662998
dynconfd memory usage slowly increases over time as it processes various state-related messages.
dynconfd grows over time and eventually the system is pushed into swap. Once swap is exhausted, the Linux OOM killer might terminate critical system processes, disrupting operation.
No special conditions as dynconfd is a core LTM process. Large numbers of pool members combined with flapping might increase the rate of memory usage increase.
Periodic restarts of dynconfd avoids the growth affecting the system.
dynconfd no longer leaks memory when processing messages.