Bug ID 742628: tmsh performance

Last Modified: Nov 06, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP TMOS(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.4, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 15.0.0, 15.0.1

Opened: Sep 04, 2018
Severity: 3-Major

Symptoms

Under certain circumstances, the Traffic Management Shell (tmsh) can consume more system memory than expected.

Impact

Various delays may occur in both command-line and GUI response. Extreme instances may cause one or more processes to terminate, with potential disruptive effect.

Conditions

Multiple users or remote processes connecting to the BIG-IP administrative command-line interface.

Workaround

For users with administrative privilege (who are permitted to use the "bash" shell), the login shell can be changed to avoid invoking tmsh when it may not be needed: tmsh modify /auth user ADMINUSERNAME shell bash

Fix Information

None

Behavior Change