Debugging memory leaks is rarely a piece of cake, especially when they only happen in production. The best way I’ve found to debug memory leaks in a Node.js application on Heroku is to analyze heap dumps.
Obtaining such heap dumps in production can be challenging, as it might be hard to connect remotely to a production instance with the debugger.
In this article, we will go through the steps needed to obtain and analyze heap dumps from a running **Heroku **dyno. This method will also work on other platforms as long as it is possible to perform similar operations.
To obtain the heap dump we need to:
Before we can analyze anything, we need to ensure that we have a debugger listening. There are two ways to enable the inspector on a Node.js process:
By default, **Heroku **starts a Node.js application by running npm start
. Usually, this calls a script defined in the package.json
of the application:
{
"scripts": {
"start": "node ./bin/www"
},
}
Changing this script to add the --inspect
(as documented here) flag will start the instances of the application with a debugger listening on a port that will be specified in the logs:
{
"scripts": {
"start": "node --inspect ./bin/www"
},
}
In total, this is what it will look like when you implement this solution.
What changing the startup command looks like Heroku logs
Solution 1 is the easiest way to enable an inspector in Node.js, but there are situations in which you can’t or won’t want to enable it. For example, you might not have access to the source code of the application and therefore can’t change the startup script. Or maybe you don’t want to change the state of all your production dynos and deploy your application only for debugging.
Fortunately, there is a way to send a signal to the process to enable a debugger session.
In order to do so, you will need the Heroku CLI to connect to the dyno through an SSH connection.
For all following Heroku commands, you might need to add the --app <app_name>
flag to tell the CLI which application to connect to. Also, by default, the CLI will connect to the dyno named web.1
and you might want to change that through the command line (see documentation).
First, let’s connect to the dyno (Heroku might need to restart the dyno at this point):
$ heroku ps:exec
Running this command for the first time requires a dyno restart.
Do you want to continue? [y/n]: y
Initializing feature... done
Restarting dynos... done
Waiting for web.1 to start... done
Establishing credentials... done
Connecting to web.1 on ⬢ debug-example...
~ $ ls
app.js node_modules package.json routes
bin package-lock.json public views
Then, we need to identify the PID of the Node.js process:
~ $ ps aux
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
nobody 1 0.0 0.0 22464 3816 ? S 13:50 0:00 ps-run
u56450 4 2.1 0.0 807160 41692 ? Sl 13:50 0:00 npm
u56450 35 0.0 0.0 72296 3252 ? Ss 13:50 0:00 /usr/sbin/sshd
u56450 36 0.0 0.0 18508 2252 ? S 13:50 0:00 bash --login -c
u56450 67 0.1 0.0 47264 5612 ? R 13:50 0:00 ssh -o ServerAl
u56450 68 0.0 0.0 4632 780 ? S 13:50 0:00 sh -c node ./bi
u56450 69 1.7 0.0 605180 38716 ? Sl 13:50 0:00 node ./bin/www
u56450 76 0.0 0.0 72356 6188 ? Ss 13:50 0:00 sshd: u56450 [p
u56450 78 0.0 0.0 72356 3188 ? R 13:50 0:00 sshd: u56450@pt
u56450 79 0.0 0.0 18508 3472 pts/0 Ss 13:50 0:00 -bash
u56450 89 0.0 0.0 34400 2896 pts/0 R+ 13:50 0:00 ps aux
In our case, the process started with node bin/www
has the PID 69, we will now send a signal to the process to let it know we need it to enable its debugger:
$ kill -usr1 69
As you can see, we have sent the USR1
signal to the process to change its state (as documented on this page).
This is confirmed through the application’s logs on Heroku:
Changing the process state through signals
In order to attach the **debugging tools **to our Node.js process, we need to make the websocket used by the debugger accessible on our local machine.
To do that, we first need to identify the port we need to forward. This can be found in the logs of the application:
In our case, this is the port 9229
.
To forward the port locally, let’s use the Heroku CLI:
$ heroku ps:forward 9229
Establishing credentials... done
SOCKSv5 proxy server started on port 1080
Listening on 9229 and forwarding to web.1:9229
Use CTRL+C to stop port fowarding
When port forwarding is established, we just need to open Chrome DevTools (going to chrome://inspect on Chrome) and after a few seconds, a target should be displayed under “Remote targets.”
If the target does not appear, make sure the port used is listed when clicking on “Configure.”
Now it’s time to collect and read the heap dump. First, click on the “inspect” link. This will open a new window with different tabs.
Find the “Memory” one — you should be prompted with the following window:
Click on “Take snapshot.” A new file will appear in the left hand side panel. Clicking on it will display the content of the heap:
In this view, objects are sorted by constructor. For the purpose of this walkthrough, I have introduced a memory leak in this application by creating an instance of the Access
class for each request. This instance keeps a reference to the current HTTP requests and is never cleaned:
const Access = class {
constructor(req) {
this.req = req;
}
};
const allAccesses = new Set();
app.use((req, res, next) => {
allAccesses.add(new Access(req));
next();
});
You can see for yourself that this indeed leaks in the application.
To detect constructors that have the biggest memory impact, let’s sort the items of this view by “Retained size” (You can learn more about these terms on Chrome’s website).
You can see that 24% of the process memory is held by these objects.
Now let’s look at how to identify where the leak is happening.
When expanding the list of the constructor, we can see all instances of this class. By selecting one of these instances, the list of retainers of this object is displayed:
In our case, the allAccesses
set is clearly identified as the bad actor! With the location of the memory leak identified, we have everything we need to go off and fix it.
When suspecting a memory leak, you might want to take two separate heap dumps with a few minutes between them. Then, using the “comparison view”, you can identify which elements have been created between the snapshots.
As shown in the article, when reading the heap dump, elements are grouped by their constructor.
Using more than just classes in your code will make it more readable (and arguably more performant, but that’s probably a topic for another article). It will save you so much time when hunting for a memory leak. Do it — future you will be grateful.
At the top left hand side of this screen, there’s a little bin picture. Clicking on it will trigger a garbage collection in the application. Doing this before collecting a memory snapshot will actually remove elements that are not leaking and therefore could help save you time when browsing the heap content.
In this article, we’ve taken a look at how to debug memory leaks in a Node.js process running on Heroku by connecting and using a debugger.
If you’re looking for next steps or a more advanced way to debug memory leaks in Node.js in Heroku, try this: Since the Heroku CLI is written with Node.js, you could write an automated tool to perform the collection and start analyzing heap dumps.
#node-js #web-development