Locate Online Node.js Memory Leaks

Image for post
Image for post

By Yijun


To take this issue head on, first consider a more specific development scenario. Because Android, iOS, PCs, and mobile web pages require different fields for the same interface type, the field addition and reduction between the front-end development and the service-side development often incurs a large communication overhead as a result.

To solve this problem, some companies have added the Building-a-Backend-for-Frontend (BFF) layer between the traditional frontend and backend to support development and maintenance by people who need to use this data. Moreover, given that most front-end developers are familiar with Node.js, Node.js is a more ideal language for implementing the BFF layer.

However, this solution also brings some new challenges. To be specific, compared with the traditional and relatively mature Java language, the Node.js runtime is relatively new to most developers. Moreover, no tools in the ecological chain are available to guarantee the stability of the BFF layer. Therefore, you need to consider several issues. For example, you need to consider how to locate and process problems if memory leaks cause some processes to experience intermittent OOM.

This article particularly explores this issue by analyzing some memory leak issues that can be found in the Node.js development.

Heap Snapshots

Obtain Heap Snapshots

The following are different methods for obtaining heap snapshots.

Install heapdump

npm install heapdump

The following is required in the code of the module:

const heapdump = require('heapdump');

The heapdump module provides two methods to obtain the current heap snapshots of processes:

1. Use custom logic in the code.

By doing this, snapshots will be regularly obtained by the timer or the switch is started through a persistent connection. The following is an example of this:

'use strict';
const heapdump = require('heapdump');
const path = require('path');
setInterval(function() {
let filename = Date.now() + '.heapsnapshot';
heapdump.writeSnapshot(path.join(__dirname, filename));
}, 30 * 1000);

In the preceding example, a heap snapshot is written to the current directory every 30s.

2. Use the usr2 signal to trigger heap snapshots after starting a Node.js process that uses the heapdump module.

Consider the following example:

kill -USR2 <the PID of the process for which you want to obtain a heap snapshot>

By doing this, you can connect to the server through ssh and obtain heap snapshots by using the signal only when they are required. You do not have to embed relevant logic in the code.

Install v8-profiler

npm install v8-profiler

v8-profiler returns heap snapshots as a transform stream, which allows large heap snapshots to be processed in a better manner:

'use strict';
const v8Profiler = require('v8-profiler-node8');
const snapshot = v8Profiler.takeSnapshot();
// Obtain transform stream of heap snapshots
const transform = snapshot.export();
// Process heap snapshot stream
transform.on('data', data => console.log(data));
// Delete data after data is processed
transform.on('finish', snapshot.delete.bind(snapshot));

In Node.js versions earlier than version 6.0, v8-profiler can be directly downloaded to the corresponding binary on different operating systems by using node-pre-gyp, without having to perform local compilation. v8-profiler is relatively friendly to non-Mac development environments.

Node.js Performance Platform

Image for post
Image for post

As shown in the screenshot, after selecting the target process, click Heap Snapshot to generate a heap snapshot. Click File in the left-side navigation bar to view the generated heap snapshot:

Image for post
Image for post

At this point, click Dump to store the heap snapshot on the cloud. After this, you can download the heap snapshot for analysis anytime.

Describe Heap Snapshots

Field Description

snapshot: {},
nodes: [],
edges: [],
strings: []

We can easily speculate what are stored in the nodes and edges arrays. The nodes array stores information about each node in the memory, and the edges array stores relations between nodes in the memory.

The snapshot stores descriptive information about each node and edge. After expanding the snapshot node, we can see that it only includes one meta node. Next, after further expanding the meta node, we can see the description of each node and edge:

  • meta.node_fields: an array. The length of the array is the number of elements that represent a node. In this example, every six elements in the “nodes” array represents a node.
  • meta.node_types: an array. Elements in the array represent the meaning of each element of a node. In this example, the first of the six elements represents the node type, which also belongs to a limited array.
  • meta.edge_fields: an array. The length of the array is the number of elements that represent an edge. In this example, every three elements in the “edges” array represent one edge.
  • meta.node_types: an array. Elements in the array represent the meaning of each element of an edge. In this example, the first of the three elements represents the edge type, which also belongs to a limited array.

The last array is strings. This array is relatively simple and stores the names of nodes and edges.

The following is the overall relation graph.

Image for post
Image for post

Nodes and Edges

We can see that the preceding meta.node_fields that describes nodes includes one item called edge_count. It describes the number of edges under this node. Edges in the edges array are sequentially ordered. Therefore, we can draw a relation graph like this:

Image for post
Image for post

In addition, the to_node in the meta.edge_fields that describes edges refers to the node to which this edge points. By combining all the information together, we can draw a real memory relation graph.

Locate Memory Leaks

Image for post
Image for post

Assume that node 5 is where a memory leak happens. Node 5 consumes significant memory and does not release it as expected. If we release parent node 3 of node 5, node 5 can still be reached by following the path 1 -> 2 -> 4 -> 5 from the root node. That is, releasing node 3 alone cannot terminate the reference to node 5. Similarly, releasing node 4 does not work, either.

In this example, we can only release node 5 by stopping the reference to node 2. In other words, node 2 is the node that directly controls node 5, because every path from node 1 to node 5 goes through node 2. This structure is called a dominator tree. It is helpful for analyzing memory leaks.

We can convert the preceding memory relation graph to a dominator tree like this:

Image for post
Image for post

Now we can calculate the retained size from node 8 up to the root node. The retained size for a node equals the size of that node itself plus the retained size of its child node. Finally, we can see which nodes have memory consumption accumulated. These nodes that have memory consumption accumulated instead of being deallocated are likely candidates for memory leaks.

After we know where memory leaks happen, we can find the corresponding code logic snippet in the memory relation graph to see if these nodes really fail to deallocate memory unexpectedly.


Original Source

Follow me to keep abreast with the latest technology news, industry insights, and developer trends.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store