Back to All Scenarios
PASSEDcache / service_crash

Dragonfly 1.14 Out of Memory — Killed by OOM Killer on Ubuntu 24.04 LTS

The Linux OOM killer terminated the Dragonfly 1.14 process due to memory pressure. The service was the largest memory consumer on the system.

Pattern
MEMORY_EXHAUSTION
Severity
CRITICAL
Confidence
72%
Remediation
Auto-Heal

Test Results

MetricExpectedActualResult
Pattern RecognitionMEMORY_EXHAUSTIONMEMORY_EXHAUSTION
Severity AssessmentCRITICALCRITICAL
Incident CorrelationN/ANone
Cascade EscalationN/ANo
RemediationAuto-Heal — Corax resolves autonomously

Scenario Conditions

Ubuntu 24.04 LTS. Dragonfly 1.14 consuming 5GB RAM. OOM killer score: 855. System had 23GB total. No swap configured.

Injected Error Messages (1)

Out of memory: oom-killer terminated process 18976 (dragonfly) total-vm:5242880kB on Ubuntu 24.04 LTS, Dragonfly 1.14 port 6379 down, memory critical, no swap available, 144 users/connections connections dropped

Neural Engine Root Cause Analysis

Memory exhaustion detected — the system has run out of available memory, triggering the OOM killer or forcing heavy swap usage. This causes severe performance degradation and can result in random process termination. Memory leaks in long-running applications are a common root cause, especially after deployments or configuration changes.

Remediation Plan

1. Check which process was OOM-killed using 'dmesg | grep -i oom' or journal logs. 2. Review memory usage by process with 'ps aux --sort=-%mem | head -20'. 3. Restart the affected service to reclaim leaked memory. 4. If a memory leak is suspected, enable heap profiling and analyze memory allocation patterns. 5. Consider increasing server memory or setting appropriate memory limits (cgroups/container limits).
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnp59w01mflig7zs0ubt4r