Fedora Core 2 Out Of Memmory

Posted on 2005-04-06
Last Modified: 2013-12-16

everytime I leave my server for 5 or 10days the next day I got out of memmory error and server stop responding than I have to do a hard reboot in order to use my services.

What is the best way of avoiding out of memmory message.

Once the server stated out of memory I cannot do anything such as cannot check my emails, cannot connect to my sshd , cannot connect to web site e.t.c.

Appreciate your help.


ps: I've a Dell Intel Xeon 3.2 Processor with 1GB ram
Question by:wcws
    LVL 38

    Accepted Solution


    1. Update the latest patches, especially the kernel.
    yum upgrade
    yum update kernel

    Then reboot to the latest kernel. Sometimes kernel bug cause the memory leakage.

    2. Check what applications are running on your FC2. Some Java applications have bad coding and eat
    up all the memory without releasing them.


    LVL 22

    Assisted Solution


    Obviously try the points mentioned above. There's always the prossibiltiy of zombie processes.

    In addition the problem could be with any of the other processes running on the system - particularly 'less mature' applications.

    Ideally, you need to see the resources being used by each process. This can be done using the command:

    top -p 1234

    where 1234 is the process id. If you notice that a particular process increases it's memory size over a period of say 4 days then that may be the guilty application. Be aware that memory can be allocated to processes, but when the system requires it back there are mechanisms to release it, so this approach merely gives you a feel for your setup. I'm guessing that there is a process that's memory rewuirements increases *massively*.

    As previously mentioned java applications tend to be candidates for this, but it could be anything. Memory leaks are a pain to find! - Good luck!

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
    Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now