Sadly, one FG-200E has had exactly the same memory leak issue running on v6.2.9 a couple of weeks ago.
What I did (from advice from TAC supporter) was write a script with "fnsysctl killall httpsd" and create an automation stitch which was triggered by the even "enter conserve mode". Worked like a charm - the instant the log message was written, the script ran and reduce memory usage by 40%.
(The ultimate fix was to upgrade to v6.4.8. Good that I didn't know about the "Known issue" you cited.)
config system automation-trigger edit "enter_conserve_mode" set event-type low-memory next end
config system automation-action edit "release_memory" set action-type cli-script set required enable set script "fnsysctl killall httpsd" set accprofile "super_admin" next edit "auto_high_memory_email" set action-type email set email-to "email@example.com" set email-subject "myFGT: stitch alert: conserve mode" next end
config system automation-stitch edit "auto_high_memory" set trigger "enter_conserve_mode" set action "release_memory" "auto_high_memory_email" next end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.