Bug ID 720041: CPU Utilization Increases when SSL Session ID Persistence is enabled with HTTP/2 Profile

Last Modified: Mar 21, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3,,,,,,,, 12.1.4, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0,,,,,,,,, 13.1.1,,,,, 14.0.0,,,,, 14.1.0,,,

Opened: May 14, 2018
Severity: 4-Minor


When an HTTP-2.0 Profile is applied to a Virtual Server, and SSL Session ID (SSID) persistence is enabled on the Virtual Server, CPU utilization jumps to 80%. TMM is found to consume most of the CPU cycles.


TMM consumes most of the CPU and CPU utilization becomes 80%.


[1] An HTTP/2 VIP has a pool containing multiple members [2] A OneConnect profile is used (to force proxy_connect on every request), and [3] A client makes multiple requests on the same HTTP/2 connection (E.g. curl with nghttp support).


Add a new SSL persistence profile with "match-across-virtuals enabled". The issue does not happen.

Fix Information


Behavior Change