[
https://issues.apache.org/jira/browse/HBASE-19320?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16261779#comment-16261779
]
huaxiang sun edited comment on HBASE-19320 at 11/22/17 12:51 AM:
-----------------------------------------------------------------
Attach two screenshots for this issue.
The first one is query DirectByteBuffer whose capacity > 5M. The second one is
the gc root path to illustrate who holds this DM. I checked all of these
objects, they are have the same gc root path.
Adding these objects' capacity together, it is more than 2GB.
was (Author: huaxiang):
Attach two screenshots for this issue.
The first one is query DirectByteBuffer whose capacity > 5M. The second one is
the gc root path to illustrate who holds this DM. I checked all of these
objects, they are have the same gc root path.
> document the mysterious direct memory leak in hbase
> ----------------------------------------------------
>
> Key: HBASE-19320
> URL: https://issues.apache.org/jira/browse/HBASE-19320
> Project: HBase
> Issue Type: Improvement
> Affects Versions: 2.0.0, 1.2.6
> Reporter: huaxiang sun
> Assignee: huaxiang sun
> Attachments: Screen Shot 2017-11-21 at 4.43.36 PM.png, Screen Shot
> 2017-11-21 at 4.44.22 PM.png
>
>
> Recently we run into a direct memory leak case, which takes some time to
> trace and debug. Internally discussed with our [[email protected]], we
> thought we had some findings and want to share with the community.
> Basically, it is the issue described in
> http://www.evanjones.ca/java-bytebuffer-leak.html and it happened to one of
> our hbase clusters.
> Create the jira first and will fill in more details later.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)