<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1915 How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1915 How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report</link><pubDate>Wed, 17 Apr 2019 13:24:41 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Current Revision posted to Appian Knowledge Base by Jordan Horwat on 4/17/2019 1:24:41 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze. In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report. This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/0x240/__key/communityserver-wikis-components-files/00-00-00-00-11/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&lt;/code&gt; page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>KB-1915 How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/14</link><pubDate>Wed, 17 Apr 2019 13:24:41 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Jordan Horwat on 4/17/2019 1:24:41 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze. In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report. This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/0x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&lt;/code&gt; page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>KB-1915 How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/13</link><pubDate>Wed, 17 Apr 2019 13:24:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Jordan Horwat on 4/17/2019 1:24:17 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze. In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report. This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&lt;/code&gt; page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/12</link><pubDate>Tue, 16 Apr 2019 20:56:38 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 12 posted to Appian Knowledge Base by Daniel DeVeau on 4/16/2019 8:56:38 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze. In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report. This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&lt;/code&gt; page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/11</link><pubDate>Tue, 16 Apr 2019 20:54:20 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 11 posted to Appian Knowledge Base by Jordan Horwat on 4/16/2019 8:54:20 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze. In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report. This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>DRAFT KB-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/10</link><pubDate>Tue, 16 Apr 2019 20:54:07 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 10 posted to Appian Knowledge Base by Jordan Horwat on 4/16/2019 8:54:07 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;br /&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;br /&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>DRAFT INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/9</link><pubDate>Tue, 16 Apr 2019 20:53:08 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Jordan Horwat</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 9 posted to Appian Knowledge Base by Jordan Horwat on 4/16/2019 8:53:08 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;After &lt;a href="/support/w/kb/393/kb-1176-how-to-generate-a-java-heap-dump"&gt;generating a Java heap dump&lt;/a&gt;, it is common for the corresponding leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;br /&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;br /&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>DRAFT INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/8</link><pubDate>Mon, 15 Apr 2019 17:13:13 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 8 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:13:13 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;br /&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;br /&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/7</link><pubDate>Mon, 15 Apr 2019 17:10:09 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 7 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:10:09 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;br /&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;br /&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/800x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/6</link><pubDate>Mon, 15 Apr 2019 17:09:43 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:09:43 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;br /&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;br /&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/750x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/5</link><pubDate>Mon, 15 Apr 2019 17:09:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:09:15 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze. In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report. This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/750x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/4</link><pubDate>Mon, 15 Apr 2019 17:06:46 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:06:46 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;/p&gt;
&lt;p&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;/p&gt;
&lt;p&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/750x240/__key/communityserver-wikis-components-files/00-00-00-00-13/0702.Threads.png" /&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values (circled in green).&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads (circled in red).&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/3</link><pubDate>Mon, 15 Apr 2019 17:03:35 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:03:35 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;/p&gt;
&lt;p&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;/p&gt;
&lt;p&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values.&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads.&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;br /&gt;
&lt;h2&gt;&lt;span&gt;&lt;img alt=" " src="/resized-image/__size/750x100/__key/communityserver-wikis-components-files/00-00-00-00-13/Threads.png" /&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to find the stack trace of a thread in a leak suspects report</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/2</link><pubDate>Mon, 15 Apr 2019 17:02:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 5:02:15 PM&lt;br /&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;It is common for leak suspects reports to contain clear suspects without associated stack traces to analyze.&lt;/p&gt;
&lt;p&gt;In these situations, it is often possible to find the relevant stack traces in the &lt;strong&gt;.threads&lt;/strong&gt; file that is generated with the report.&lt;/p&gt;
&lt;p&gt;This is a useful step to take before requesting to analyze a raw heap dump.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Navigate to the &lt;code&gt;Thread Overview&lt;/code&gt; page of the leak suspects report via the &lt;code&gt;Table of Contents&lt;/code&gt; or &lt;code&gt;System Overview&lt;/code&gt; pages.&lt;/li&gt;
&lt;li&gt;Identify the problematic thread(s) by their retained heap values.&lt;/li&gt;
&lt;li&gt;Copy the hexadecimal thread IDs from the &lt;code&gt;Object / Stack Frame&lt;/code&gt; column of the problematic threads.&lt;br /&gt; &lt;strong&gt;Note:&lt;/strong&gt; This ID is different from what is shown in the &lt;code&gt;System Overview&amp;nbsp;&lt;/code&gt;page.&lt;/li&gt;
&lt;li&gt;Open the &lt;strong&gt;.threads&lt;/strong&gt; file, found in the same directory where the leak suspects report was generated, and search for the thread IDs to find the respective thread stack traces.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;&lt;span&gt;&lt;img alt=" " src="/resized-image/__size/750x100/__key/communityserver-wikis-components-files/00-00-00-00-13/Threads.png" /&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2019&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item><item><title>INT-XXXX How to Investigate a leak suspects report with no stack trace</title><link>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report/revision/1</link><pubDate>Mon, 15 Apr 2019 15:54:10 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c57bafc0-ad01-47e2-931d-81a616d599cb</guid><dc:creator>Daniel DeVeau</dc:creator><comments>https://community.appian.com/support/w/kb/1414/kb-1915-how-to-find-the-stack-trace-of-a-thread-in-a-leak-suspects-report#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Daniel DeVeau on 4/15/2019 3:54:10 PM&lt;br /&gt;
&lt;p&gt;This article serves as a template that you can copy/paste into a new article for use later on.&amp;nbsp;This template can be used to outline steps on troubleshooting certain types of issues/enabling loggers/performing certain steps to achieve a desired outcome in the product. They must be relevant to Appian or any of the third-party software Appian uses to run, such as JBoss or MySQL.&amp;nbsp;It can either be internal or external.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The title of the article must be under 256 characters (less depending on the types of characters used in the title as this is a limitation of Telligent). It must be as concise as possible. Those using the Knowledge Base should get a good idea of what the article is about just by reading the title.&lt;/p&gt;
&lt;p&gt;This description is for informational purposes only.&amp;nbsp;There should be no text above the &amp;quot;Purpose&amp;quot; header when using this template.&lt;/p&gt;
&lt;h2&gt;Purpose&lt;/h2&gt;
&lt;p&gt;This section is required for this template. A lot of the older How To articles might not have this section, but going forward we should try to keep a standard format. Provide a short statement about the purpose of this article.&lt;/p&gt;
&lt;h2&gt;Instructions&lt;/h2&gt;
&lt;p&gt;This section is required for this template. A lot of the older How To articles might not have this section, but going forward we should try to keep a standard format. Provide&amp;nbsp;the instructions on how to achieve what the article is outlining.&lt;/p&gt;
&lt;p&gt;Examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/support/w/kb/695/kb-1418-how-to-update-refresh-a-web-service"&gt;KB-1418 How to update/refresh a web service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/support/w/kb/690/kb-1422-how-to-determine-current-jboss-node"&gt;KB-1422 How to determine current JBoss node&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/solution-engineering/w/internal-knowledge-base/703/int-1423-how-to-create-a-list-of-users-from-the-admin-console"&gt;INT-1423 How to Create a List of Users from the Admin Console&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/solution-engineering/w/internal-knowledge-base/721/int-1438-how-to-use-the-custom-email-sender-validation-tool-cest"&gt;INT-1438 How to use the Custom Email Sender Validation Tool (CEST)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/solution-engineering/w/internal-knowledge-base/692/int-1412-how-to-create-a-change-log"&gt;INT-1412 How to create a change log&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;This section includes any relevant version information for Appian or other third/party configurations. Some examples of valid affected versions are as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;This article applies to all versions of Appian.&lt;/li&gt;
&lt;li&gt;This article applies to Appian 7.11 and later.&lt;/li&gt;
&lt;li&gt;This article applies to Appian 16.2 and earlier.&lt;/li&gt;
&lt;li&gt;This article applies to Appian 7.11 and 16.1.&lt;/li&gt;
&lt;li&gt;This article applies to Appian 16.1, 16.2, and 16.3.&lt;/li&gt;
&lt;li&gt;This article applies to all versions of Appian from Appian 7.10 to Appian 16.2.&lt;/li&gt;
&lt;li&gt;This article applies to all versions of Appian using JBoss EAP 6.4.9 as an application server and Internet Explorer 9 as a web browser.&lt;/li&gt;
&lt;li&gt;This article applies to all versions of Appian Cloud.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Last Reviewed: Month YYYY&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: How To, heap, memory, application server, how-to, infrastructure&lt;/div&gt;
</description></item></channel></rss>