Bug ID 832133: In-TMM monitors fail to match certain binary data in the response from the server.

Last Modified: Sep 24, 2020

Bug Tracker

Affected Product:  See more info
BIG-IP TMOS(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3,,,,,,,, 12.1.4,, 12.1.5,,, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0,,,,,,,,, 13.1.1,,,,, 13.1.3,,,,, 14.0.0,,,,,, 14.0.1,, 14.1.0,,,,,, 14.1.2,,,,,,,,, 15.0.0, 15.0.1,,,,, 15.1.0,,,,,

Opened: Sep 27, 2019
Severity: 3-Major


Pool members are incorrectly marked DOWN by a monitor. The pool members send the expected response to the probe, but the BIG-IP system still marks them DOWN.


Objects that are meant to be marked UP are marked DOWN. As a result, no load balancing occurs to affected resources.


This issue occurs when all of the following conditions are met: -- In-TMM monitoring is enabled on the system (the 'bigd.tmm' db key is set to 'enable'; note this is set to 'disable' by default). -- One (or more) of your TCP or HTTP monitors specifies a receive string using HEX encoding, in order to match binary data in the server's response. -- Depending on the HEX values specified (currently values in the range of 0x80-0xBF are believed to be affected), response matching fails.


You can use either of the following workarounds: -- Disable in-TMM monitoring by setting 'bigd.tmm' to 'disable'. -- Do not monitor the application through a binary response (if the application allows it).

Fix Information


Behavior Change