ssl_client_session_cache size
Ingela Andin
ingela.andin@REDACTED
Mon Aug 23 11:45:13 CEST 2021
Hi!
Could you be a little more specific about the OTP-24 version. Is it 24.0 or
a patch version? Also it would be appropriate to create a github issue
instead of reporting it here, where you also provide a small recreation
example. As far as I know this has been an issue in the past but
should work for OTP-24. Our tests are passing, so we really need something
more to go on.
Regards Ingela Erlang/OTP team - Ericsson AB
Den lör 21 aug. 2021 kl 10:38 skrev Charlie Morgan <chargreezy@REDACTED>:
> Hi!
>
> We have a lot of outgoing ssl connections and noticed that ssl_manager
> does not respect the default session_cache_client_max value and the ets
> session cache table increases unbounded until we hit the session lifetime.
>
> I have tried to write some tests to replicate this behavior but it's
> proving difficult, do you know of any circumstances that could be causing
> this? My initial thoughts were problems with
> ssl_manager:do_register_session.
>
> Currently using OTP24
>
> Thanks!
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://erlang.org/pipermail/erlang-questions/attachments/20210823/ba75daf5/attachment.htm>
More information about the erlang-questions
mailing list