Bug ID 778853: In-TMM monitor issues pertaining to the use the username/password or ip-dscp options.

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP All(all modules)

Known Affected Versions:
15.0.0, 14.1.0

Fixed In:
15.1.0

Opened: May 02, 2019

Severity: 3-Major

Symptoms

-- HTTP(S) monitors configured with username and password fail to send the expected Authorization header. -- Monitors configured with an ip-dscp value send probes with an improperly encoded value in the IP header.

Impact

In either case, depending on the monitored object, the probes may be rejected, and healthy resources may fail to be marked up.

Conditions

-- In-TMM monitors is enabled (via db key bigd.tmm). -- HTTP(S) monitors employing username/password are in use. or -- Monitors specifying an ip-dscp value are in use.

Workaround

You can work around this issue by either disabling in-TMM monitors or, when it comes to the username/password issue, omitting the final \r\n in the send string (i.e. only specify one set of \r\n), as in the following example: send "GET /monitor HTTP/1.0\r\nHost: test.com\r\n" There is no workaround for the ip-dscp issue other than disabling in-TMM monitors.

Fix Information

In-TMM monitors now work correctly with the username/password or ip-dscp options.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips