Last Modified: Dec 18, 2024
Affected Product(s):
BIG-IP APM
Known Affected Versions:
14.1.5.3, 14.1.5.4, 14.1.5.6, 15.1.8.1, 15.1.8.2, 15.1.9, 15.1.9.1, 15.1.10, 15.1.10.2, 15.1.10.3, 15.1.10.4, 15.1.10.5, 15.1.10.6, 16.1.3.4, 16.1.3.5, 16.1.4, 16.1.4.1, 16.1.4.2, 16.1.4.3, 16.1.5, 16.1.5.1, 17.1.0, 17.1.0.1, 17.1.0.2, 17.1.0.3, 17.1.1, 17.1.1.1, 17.1.1.2, 17.1.1.3, 17.1.1.4, 17.1.2
Opened: Nov 11, 2022 Severity: 3-Major Related Article:
K000135038
You are unable to access the GUI after rebooting the device. In the SSH/console, the following message is displayed in the LTM logs: Failed to reset strict operations; disconnecting from mcpd.
The MCPD fails to fully load and the device fails to come up and cannot pass traffic. An internal timer might cause the installation to be aborted and all daemons to be restarted through bigstart restart. Traffic is disrupted while TMM restarts.
-- APM provisioned. -- Previous EPSEC packages which were deleted from the system from earlier BIG-IP versions are erroneously attempting to install upon boot due to a corrupt APM RPM database. Note: This has been encountered while applying the mitigation in ID 997793 at https://cdn.f5.com/product/bugtracker/ID997793.html
You can recover by rebuilding the APM specific RPM database: 1. Delete the existing database # rm -rf /var/apm/lib/rpm 2. Refresh the database using the EPSEC bash script # epsec -f refresh
None