<div dir="ltr"><div>Hi!</div><div><br></div><div>Could you be a little more specific about the OTP-24 version. Is it 24.0 or a patch version? Also it would be appropriate to create a github issue instead of reporting it here, where you also provide a small recreation example. As far as I know this has been an issue in the past but should work for OTP-24. Our tests are passing, so we really need something more to go on.</div><div><br></div><div>Regards Ingela Erlang/OTP team - Ericsson AB</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">Den lör 21 aug. 2021 kl 10:38 skrev Charlie Morgan <<a href="mailto:chargreezy@gmail.com">chargreezy@gmail.com</a>>:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr">Hi!<div><br></div><div>We have a lot of outgoing ssl connections and noticed that ssl_manager does not respect the default session_cache_client_max value and the ets session cache table increases unbounded until we hit the session lifetime.</div><div><br></div><div>I have tried to write some tests to replicate this behavior but it's proving difficult, do you know of any circumstances that could be causing this? My initial thoughts were problems with ssl_manager:do_register_session.</div><div><br></div><div>Currently using OTP24</div><div><br></div><div>Thanks!</div></div>
</blockquote></div></div>