Bug ID 1013937: In-TMM HTTP and HTTPS monitors require RFC-compliant send strings to work.

Last Modified: Jan 20, 2023

Bug Tracker

Affected Product:  See more info
BIG-IP All(all modules)

Known Affected Versions:
13.1.0,,,,,,,,, 13.1.1,,,,, 13.1.3,,,,,,, 13.1.4,, 13.1.5,, 14.1.0,,,,,, 14.1.2,,,,,,,,, 14.1.3,, 14.1.4,,,,,,, 14.1.5,,,, 15.1.0,,,,,, 15.1.1, 15.1.2,, 15.1.3,, 15.1.4,, 15.1.5,, 15.1.6,, 15.1.7, 15.1.8,, 16.0.0,, 16.0.1,,

Opened: Apr 23, 2021
Severity: 4-Minor


Pool members that should be marked UP are incorrectly marked DOWN. No monitor traffic is seen on the wire. If pool member monitor logging is enabled, an entry similar to the following example can be seen in the logs: [0][1399] 2021-02-11 11:11:34.709360: ID 44 :TMM::handle_message(TMA_Message<tma_msg_args_notify>*): tmm monitor failed to connect [ tmm?=true td=true tr=false tmm_mid=0:1 addr=::ffff: srcaddr=none ] If tma debug logging is enabled, an entry similar to the following example can be seen in the logs: Feb 11 11:12:14 bigip1.local debug tmm[2259]: 01ad0019:7: Monitor Agent TMM 0: received probe response: MID 1, reason TMA_RESULT_FAIL(Probe response lost due to transient failure), info 0


Pool member monitoring is impacted and unreliable.


- In-tmm monitoring is enabled (the bigd.tmm db key is set to enable). - A HTTP or HTTPS monitor has been configured with a send string which is not RFC-compliant. For instance, the following string incorrectly includes a space before the Host header: "GET / HTTP/1.1\r\n Host: example.com\r\nConnection: Close\r\n\r\n"


Ensure that you specify a send string which is fully RFC-compliant (for instance, in the example above, remove the space before the Host header).

Fix Information


Behavior Change