Bug#940021: systemd: socket activation leads to OOM situation due to slices not getting cleaned up
Michael Biebl
biebl at debian.org
Thu Sep 12 23:53:58 BST 2019
Am 12.09.19 um 14:29 schrieb Michael Biebl:
> Am 11.09.19 um 15:54 schrieb Julian Hübenthal:
>> Just discovered something that may help to debug:
>>
>>
>>
>> It does not happen with a simple “Hello World” bash script instead of
>> the Check MK Agent.
>>
>> It does not happen when the Encryption of the Check MK Agent is disabled.
>>
>> It happens when the Encryption of Check MK is enabled, which should be
>> AES 128/256 output.
>
>
> I wonder if the MK agent does some tricks like locking the memory when
> encryption is on and then does not properly release its resources?
Just to ask the obvious: The slice(s) themselves are empty, i.e. the
check-mk agent process has exited (successfully)?
What's the status of such a service that is not cleaned up?
Taking your first email that would be
systemctl status check_mk at 10-10.28.5.6:6556-10.28.5.1:42844.service
I'd be interested in the output of
find /sys/fs/cgroup/system.slice/system-check_mk.slice/ as well
--
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-systemd-maintainers/attachments/20190913/bb9e3190/attachment.sig>
More information about the Pkg-systemd-maintainers
mailing list