hi,
netstat show the following result, same as you descrbe. (ats runing for less 
than 1 day), many connections on CLOSE_WAIT.  i have no idea on this problem.

COUNT  PORT         STATE
  59871  443                  CLOSE_WAIT
   3699  443                  TIME_WAIT
    513   443                  ESTABLISHED
     14    443                  FIN_WAIT1
     11   443                  SYN_RECV
      9    443                  CLOSING
      2    443                  LAST_ACK
      1    443                  FIN_WAIT2


At 2015-05-25 21:28:49, "Acácio Centeno" <[email protected]> wrote:

Hello Esmq,


I had observed an ATS leak similar to the one you described to the user's list 
a while ago, but what seems to be the problem for us is that some ssl 
connections are getting stuck on CLOSE_WAIT. I know it's SSL related because 
this only happens with connections to port 443.


I've seen thousands of connections that would hang on this state for a long 
period. This is the command I used for getting this info, could you, please, 
run it on your environment to see if the same thing is happening to you? (where 
XXX.XXX.XXX.XXX is the server's IP addr):


netstat -n --tcp | grep XXX.XXX.XXX.XXX | sed 'XXX.XXX.XXX.XXX://g' | awk '{ 
printf("%-20s %s\n", $4,$6); }' | sort | uniq -c | sort -rn


Best regards,
Acácio.




Acácio Centeno
Software Engineering
Azion Technologies
Porto Alegre, Brasil +55 51 3012 3005 | +55 51 8118 9947
Miami, USA +1 305 704 8816
|


Quaisquer informações contidas neste e-mail e anexos podem ser confidenciais e 
privilegiadas, protegidas por sigilo legal. Qualquer forma de utilização deste 
documento depende de autorização do emissor, sujeito as penalidades cabíveis.

Any information in this e-mail and attachments may be confidential and 
privileged, protected by legal confidentiality. The use of this document 
require authorization by the issuer, subject to penalties.

|




2015-05-17 20:07 GMT-03:00 Esmq <[email protected]>:

hi,
ats running in reverse proxy mode only,  not forward or transparent porxy.
when disabled ssl, there not memory leak problem (momory usaged just increased 
by 50MB in 2 days)




在 2015-05-17 23:41:42,"Susan Hinrichs" <[email protected]> 写道:
We are tracking a memory leak issue on ssl_multicert.config reload.  But I'm 
not aware of substantial memory leak for SSL traffic passing through.

Are you running in forward proxy or reverse proxy?  Are you running in 
transparent mode?

Operating with SSL will use more memory than straight HTTP over TCP.  Is it 
possible that your steady state memory usage has increased over the TCP case?


On 5/17/2015 9:01 AM, Esmq wrote:

hi,all

i have encounter seriously memory leak problem related to ats.

########################################################
after testing for several times, it is confirmed that the problem is caused by 
ssl termination.

the following testing i haved done:
1) runing ats on several servers with same hardware/software configuration.
2) when configure some ats for ssl termination, these servers have memory 
leak...
3) when disabled ssl termination, the problem gone.
4) the ssl requests rate is about 100-200 requests/second
5) ats that enabled ssl termination increased memory usage continually 
(increase 10MB in 1 minutes)
6) the problem not fixed in v5.3.0
########################################################

my system env and configuration is :


#######################################################

runing ats on debian7 64bit system(3.2.0-4-amd64), compile the ats with 
following paramters:

./configure --prefix=/usr/local/trafficserver-5.3.0 --enable-spdy 
--with-user=trafficserver --with-group=trafficserver 
--sysconfdir=/home/trafficserver/etc --enable-experimental-plugins 
--enable-reclaimable-freelist --enable-hwloc


#######################################################

and the ssl related configuration is :

CONFIG proxy.config.http.server_ports STRING 80:proto=spdy;http 
443:proto=spdy;http:ssl
CONFIG proxy.config.ssl.number.threads INT 0
CONFIG proxy.config.ssl.SSLv2 INT 0
CONFIG proxy.config.ssl.SSLv3 INT 1
CONFIG proxy.config.ssl.TLSv1 INT 1
CONFIG proxy.config.ssl.server.cipher_suite STRING 
RC4-SHA:AES128-SHA:DES-CBC3-SHA:AES256-SHA:ALL:!aNULL:!EXP:!LOW:!MD5:!SSLV2:!NULL
CONFIG proxy.config.ssl.server.honor_cipher_order INT 1
CONFIG proxy.config.ssl.compression INT 0
CONFIG proxy.config.ssl.client.certification_level INT 0
CONFIG proxy.config.ssl.server.cert_chain.filename STRING NULL
CONFIG proxy.config.ssl.server.cert.path STRING /home/trafficserver/etc
CONFIG proxy.config.ssl.server.private_key.path STRING /home/trafficserver/etc
CONFIG proxy.config.ssl.CA.cert.filename STRING NULL
CONFIG proxy.config.ssl.CA.cert.path STRING /home/trafficserver/etc
CONFIG proxy.config.ssl.client.verify.server INT 0
CONFIG proxy.config.ssl.client.cert.filename STRING NULL
CONFIG proxy.config.ssl.client.cert.path STRING /home/trafficserver/etc
CONFIG proxy.config.ssl.client.private_key.filename STRING NULL
CONFIG proxy.config.ssl.client.private_key.path STRING /home/trafficserver/etc
CONFIG proxy.config.ssl.client.CA.cert.filename STRING NULL
CONFIG proxy.config.ssl.client.CA.cert.path STRING /home/trafficserver/etc
CONFIG proxy.config.ssl.hsts_max_age INT -1
CONFIG proxy.config.ssl.hsts_include_subdomains INT 0


#######################################################

ssl_multicert.config:
ssl_cert_name=ssl/mdc.test.com.crt ssl_key_name=ssl/mdc.test.com.key
ssl_cert_name=ssl/daily.test.com.crt ssl_key_name=ssl/daily.test.com.key
dest_ip=* ssl_cert_name=ssl/sslbbs.example.com.ee.crt 
ssl_key_name=ssl/sslbbs.example.com.nopass.key


#########################################

is there any configuration that can relieve the memory leak ?

does anyone have the suggestion?









Reply via email to