Description |
This article describes symptoms and solutions for swap memory being in use on a FortiAuthenticator.
FortiAuthenticators may have the following symptoms:
|
Scope | FortiAuthenticator 6.5.x, 6.6.x |
Solution |
If these symptoms are experienced, run the following CLI command to check memory usage: get hard mem Look for this section in the output: ... ### Memory info If SwapFree ≠ SwapTotal, swap memory is in use. If SwapFree = SwapTotal, the issue may not be memory-related. The following steps help identify the cause and resolve the issue.
Version 6.4 requires at least 2 GB RAM for 1–500 users. Versions 6.5 and 6.6 require at least 4 GB RAM for 1–500 users. Higher license tiers require more memory. Check the FortiAuthenticator-VM sizing guide. Allocating the correct resources should resolve the issue.
https://<FortiAuthenticatorIp>/debug/kernlog Look for messages indicating memory-related crashes, such as:
2025-03-24T21:34:15.249194+01:00 fortiauth kernel: [28995.800096] wmid[28977]: segfault at 0 ip 00007f7eec3c2618 sp 00007ffd57fe6988 error 4 in libc.so.6[7f7eec281000+155000]
Example 2: Out of Memory ( oom-kill or oom_kill ) :
2024-10-17T15:05:59.739590+02:00 FortiAuthenticator kernel: [15576.788064] Out of memory: Killed process 6063 (httpd) total-vm:2042176kB, anon-rss:945536kB, file-rss:0kB, shmem-rss:0kB, UID:33 tables:3608kB oom_score_adj:0
If a memory leak is detected: Rebooting will temporarily restore functionality, but the issue will return. Check FortiAuthenticator OS release notes for known/fixed memory issues. Upgrade the FortiAuthenticator OS if a fix is available.
If the issue persists after upgrading, open a TAC case with:
If there are no indications of a memory leak, check raw logs for unusual authentication attempts: go to GUI -> Log Access -> Logs. Run a quick search for: 'Authentication' -> Lists successful and failed attempts. 'Invalid' -> Shows failed login attempts with invalid usernames. If login attempts are unexpectedly high, a brute force attack might exhaust memory.
Related article: Technical Tip: Best practices on hardening FortiAuthenticator environments |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.