Bug ID 625156: Bigd memory leak

Last Modified: Jul 21, 2021

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:

Fixed In:
13.0.0, 12.1.6

Opened: Oct 26, 2016
Severity: 2-Critical
Related AskF5 Article:


The bigd process grows in size until one of two things happens: -- The Linux kernel runs out of memory and OOM kills the bigd process (or potentially some other large process) a few hours after the system starts up. -- On high-end platforms, the bigd process grows to just under 4GB in virtual size (vsize) and starts failing in unexpected ways, for example marking targets down that are not actually down, or failing to detect targets that are down.


A memory leak occurs. Depending on the platform, process daemons might restart or fail. Monitored targets may be incorrectly marked down. Although restarting bigd is not traffic-impacting, it is possible that other daemon processes restart due to low memory conditions, and could disrupt traffic while they restart.


-- You are running specifically BIG-IP -- You have HTTPS monitors configured.


There is an engineering hotfix available HotFix-BIGIP- :: https://downloads.f5.com/esd/product.jsp?sw=BIG-IP&pro=big-ip_v12.x&ver=12.1.5 To work around this, you can switch to non-HTTPS monitors until the engineering hotfix can be applied. Once you switch to non-HTTPS, restart bigd to release the leaked memory (restarting bigd should not be service impacting).

Fix Information

Bigd memory leak no longer occurs under these conditions.

Behavior Change