Xenial has reached end of standard support, so I'm marking this bug as
Won't Fix.
** Changed in: sssd (Ubuntu Xenial)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Is this git release https://github.com/SSSD/sssd/releases/tag/sssd-
1_13_91 can be upgradable from `1.13.4-1ubuntu1.15` on ubuntu Xenial
16.04 LTS . I am facing memory leaks with this version on multiple
servers. Thanks
--
You received this bug notification because you are a member of Ubuntu
hi, any update?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage notifications about this bug go to:
Thanks for trying it out.
It's "wontfix" for yakkety. The xenial task is still open.
I ll comb again through the changes in 1.16 to see if I can find some
commits that might have fixed this, but it's quite possible the fix is a
change that relies on other bigger parts of the new 1.16 code.
--
Thanks for trying it out.
It's "wontfix" for yakkety. The xenial task is still open.
I ll comb again through the changes in 1.16 to see if I can find some
commits that might have fixed this, but it's quite possible the fix is a
change that relies on other bigger parts of the new 1.16 code.
--
I have given the package in comment #13 a try. it takes a couple weeks
for the problem to get bad enough to trip the monitor we have set up for
it, but today is that day:
```
$ dpkg -l | grep sssd
ii sssd1.13.4-1ubuntu1.11~ppa1
amd64
Can you give the packages from comment #13 a try please?
--
You received this bug notification because you are a member of Ubuntu
Server, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage notifications about this bug go
Can you give the packages from comment #13 a try please?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage notifications about this bug go to:
I too have this problem. If it's a matter people reporting it as a
problem, count me in. It's taken out production services multiple times.
We've had to create monitors and alerts for it, it is a huge problem.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
If you want to give it a try, this PPA
(https://launchpad.net/~ahasenack/+archive/ubuntu/sssd-memleak-1676328)
has a xenial build with this patch:
commit e22cbe9326073e6d42fe2118661fa6daaed8638c
Author: Sumit Bose
Date: Tue Jul 12 13:16:43 2016 +0200
AD: avoid memory
If you want to give it a try, this PPA
(https://launchpad.net/~ahasenack/+archive/ubuntu/sssd-memleak-1676328)
has a xenial build with this patch:
commit e22cbe9326073e6d42fe2118661fa6daaed8638c
Author: Sumit Bose
Date: Tue Jul 12 13:16:43 2016 +0200
AD: avoid memory
** Changed in: sssd (Ubuntu Yakkety)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage notifications about this
** Changed in: sssd (Ubuntu Yakkety)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage
Sean, could you please share your sssd.conf file?
The upstream bug you linked to mentions two specific features in use:
- enumeration turned on (which you disabled)
- AD backend
The other option is a libtevent bug they mention, and one debian user
has patched locally, but only an update to
Sean, could you please share your sssd.conf file?
The upstream bug you linked to mentions two specific features in use:
- enumeration turned on (which you disabled)
- AD backend
The other option is a libtevent bug they mention, and one debian user
has patched locally, but only an update to
On Thu, Feb 22, 2018 at 08:33:19PM -, sean wrote:
> I feel that sssd_be spiraling out of control (spawning hundreds to
> thousands of processes) and consuming all of the available RAM would be
> considered a "High-impact" bug, when that same behavior is not observed
> in 14.04.
Indeed, which
I feel that sssd_be spiraling out of control (spawning hundreds to
thousands of processes) and consuming all of the available RAM would be
considered a "High-impact" bug, when that same behavior is not observed
in 14.04.
16.04 has a xenial-backport component, is it not possible to put a newer
> I am still confused by the reasoning behind being unwilling to
backport versions of this package in a "Long Term Support" release of
Ubuntu.
This is not correct. We are quite willing to accept fixes for this bug
in all our stable releases, including LTS releases. The policy and
rationale are
I have backported it myself and multiple issues (including this one)
have been resolved as a result. I am still confused by the reasoning
behind being unwilling to backport versions of this package in a "Long
Term Support" release of Ubuntu. This bug is not fixed until a newer
version is
No, both group and user enumeration is explicitly turned off in our
config. 1.13.4-1ubuntu1.9 seems to start spawning a bunch of sssd_be
processes which slows auth to a crawl
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
There is no upstream release for 1.13.5 yet, and a major version dump to
1.14 or 1.15 is not recommended for an LTS release.
I also checked the 1-13 branch in upstream and couldn't see any obvious
immediate fix for this issue. Are you using group and user enumeration?
--
You received this bug
There is no upstream release for 1.13.5 yet, and a major version dump to
1.14 or 1.15 is not recommended for an LTS release.
I also checked the 1-13 branch in upstream and couldn't see any obvious
immediate fix for this issue. Are you using group and user enumeration?
--
You received this bug
I am seeing this is in 1.13.4-1ubuntu1.9. Can we get a version bump in
Xenial?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage notifications about
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: sssd (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Title:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: sssd (Ubuntu Yakkety)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
Presumably this exists only in Xenial and Yakkety, since Zesty has
1.15.0-3ubuntu4? Marking Fix Released for Zesty accordingly, and
creating tasks for Xenial and Yakkety.
To have Xenial updated, please first read
I have this bug in Ubuntu 16.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1676328
Title:
sssd_be is leaking memory
To manage notifications about this bug go to:
27 matches
Mail list logo