Applies To:
Show VersionsBIG-IP versions 1.x - 4.x
- 4.2 PTF-06
Summary:
Contents:
Installing the PTF
Important: If you are upgrading a BIG-IP redundant system, both units must be upgraded. We do not support running different PTF versions on a BIG-IP redundant system.
Use the following instructions to apply the PTF to the BIG-IP system, version 4.2.
Important: If you are upgrading an IP Application Switch use the installation instructions here.
Apply the PTF to the BIG-IP, version 4.2 using the following process. The install script saves your current configuration.
- Connect to the F5 Networks FTP site (ftp.f5.com).
- Use FTP in passive mode from the BIG-IP unit to download the file. To place FTP in passive mode, type pass at the command line before transferring the file.
- Download the correct PTF file to the /var/tmp/ directory on the target BIG-IP unit.
- For crypto BIG-IP units, choose PTF-4.2-6-BSD_OS-4.1.im.
- For non-crypto units, choose NOCRYPTOPTF-4.2-6-BSD_OS-4.1.im.
- Change your directory to /var/tmp/ by typing:
cd /var/tmp/ - Type the correct command to install this PTF:
- For crypto, type: im PTF-4.2-6-BSD_OS-4.1.im
- For non-crypto, type: im NOCRYPTOPTF-4.2-6-BSD_OS-4.1.im
The BIG-IP unit automatically reboots once it completes installation.
To upgrade an IP Application Switch or a Compact Flash media drive (SSD), use the following process.
- Create a memory file system, by typing the following:
mount_mfs -s 200000 /mnt - Type the following command:
cd /mnt - Connect to the FTP site (ftp.f5.com).
- Download the correct file from the /crypto/bigip/ptfs/bigip42ptf6/ directory.
- For the crypto version of the BIG-IP software, choose PTF-4.2-6-BSD_OS-4.1.im
- For the non-crypto version, choose NOCRYPTOPTF-4.2-6-BSD_OS-4.1.im
- For the crypto version of the BIG-IP software, choose PTF-4.2-6-BSD_OS-4.1.im
- On the BIG-IP unit, run the im upgrade script, using the file name from the previous step as an argument:
im /mnt/<file name>When the im script is finished, the BIG-IP unit reboots automatically.
Note: This procedure provides over 90MB of temporary space on /mnt. The partition and the im package file are deleted upon rebooting.
Software enhancements and fixes
What's fixed in this PTF
Memory exhaustion under heavy load with the large packets (CR17982)
Fixed a problem that could cause memory to be exhausted when the unit is under heavy load of large packets.
Compact Flash drive errors (CR21375) (CR21376) (CR21397) (CR21657) (CR21659) (CR21660) (CR21663)
In some cases, D4x/D5x compact flash drives may exhibit hard read errors. These error messages are logged in both the console and to /var/log/messages. The following is an example of the type of error message you may receive:
Apr 12 15:55:41 bip2 kernel: wd0g: hard error reading fsbn 34624 of 34624-34655 (wd0 bn 449344; cn 624 tn 1 sn 16) status 51 error 4 Apr 12 15:55:41 bip2 kernel: wd0: resetting controller
Generating keys using the Configuration utility (CR19239)
The Configuration utility now generates keys/certificates correctly for the SSL proxy.
bigpipe load verify (CR19551)
Using bigpipe verify mode no longer causes unexpected errors.
SSL proxy under heavy load (CR20276)
Running an SSL proxy under heavy load for extended periods of time no longer takes up abnormal amounts of system resources.
bigsnmpd (CR20628)
bigsnmpd no longer becomes unstable when providing data for a large number of pools with a very large number of nodes defined to each pool.
Setup utility error messages (CR20711)
After you complete the VLAN and networking sections of the Setup utility, you no longer receive harmless config error messages.
Multicast traffic and auto-lasthop (CR20822)
Auto-lasthop is now disabled for multicast traffic.
X509 Configuration (CR20947)
If the BIG-IP configuration files are not specified, the default configuration values for X509 data are now set properly.
Occasional problem with SSL Proxy when dumping stats (CR21065)
The SSL Proxy no longer experiences an occasional floating-point exception error when dumping stats (sending proxyd a SIGUSR1).
SSL proxy redirect (CR21154)
SSL proxy redirect now functions correctly after a 304 Not Modified Since reply from the server.
Configuration utility (CR21166)
In an active-active redundant configuration, the SSL proxy is now accessible through the web-based Configuration utility after failover.
poolMemberPriority (CR21174)
poolMemberPriority can now be set to values other than -1.
Logging for VLAN specific wildcard vitual servers (CR21204)
The correct IP address is now logged for VLAN specific wildcard virtual servers.
Idle HTTP keep-alive hash (CR21205)
BIG-IP performance is no longer adversely affected when keep-alives are enabled and a large number of idle HTTP connections are being used.
FTP listener hash table (CR21286)
The FTP listener hash table is now VLAN-aware so that FTP connections may pass through the BIG-IP multiple times without SNATs.
VLAN-keyed connection table (CR21288)
When you establish a connection through a virtual server referencing a forwarding pool, which travels back out through a SNAT, the VLAN-keyed connection table now resolves the connection properly.
HTTP 304 response codes (CR21308)
HTTP 304 response codes now assume an implicit content length of 0.
Connections through a forwarding virtual server (CR21310)
The reaper now resets both ends of a connection through a forwarding virtual server.
SSL proxy and pools (CR21320)
The BIG-IP software no longer allows an SSL proxy to be a member of a pool.
CALL-ID (CR21338)
Matching of the SIP Call-ID field is no longer case sensitive.
HTTP redirects (CR21356)
HTTP redirects now function properly when a client sends an MSS of 0.
bigsnmpd (CR21369)
bigsnmpd now sends a valid trap OID when it sends a cold start trap.
Connection rebinding (CR21403)
Connection rebinding with no available nodes no longer causes the BIG-IP system to become unstable.
HTTP header insertion (CR21435)
HTTP header insertion no longer has buffer boundary check problems.
Mirror-to ports (CR21635)
When you define a port as a mirror-to port, and then delete the mirror, the port is now restored to its previous state and passes traffic correctly.
Multicast packets (CR21665)
Internal interfaces on switch appliances are now configured for promiscuous receipt of multicast packets.
SNAT timeout (CR21671)
The SNAT timeout setting no longer affects virtual server timeout.
Large HTTP requests (CR21715)
HTTP requests greater than 2k no longer cause the BIG-IP parser to become unstable.
Unconnected ports (CR21721)
Unconnected fast ethernet ports on a VLAN receiving broadcast frames no longer display incorrect interface statistics.
Header insertion (CR21953)
Header insertion now functions properly with cookie persistence when using rules.
CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability
The security vulnerability that is outlined in CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability, has been fixed.
CERT Advisory VU#797201, against tcpdump (CR22049)
We have addressed vulnerabilities detailed in the CERT advisory against tcpdump.
Network and hardwired failover: active unit can go to standby state after peer reboots (CR21458)
When a BIG-IP unit in a redundant system reboots and the network is not available, the unit reboots as the standby unit. Previously, when one of the BIG-IP units in a redundant pair was rebooted when the network was not available, the failover mechanism could cause the active unit to become the standby and the rebooted unit would become active.
SSH Daemon log messages (CR21824)
Insufficient resources on some systems no longer prevent the SSH daemon from handling early connections.
Enhancements and fixes released in prior PTFs
Version 4.2PTF05
Support for the Dell PowerEdge 2650 platform
This release includes support for the Dell PowerEdge 2650 platform.
Version 4.2PTF04
MAC addresses for VLANs on IP Application Switch (CR15611)
On the IP Application switch, VLANs may now use the first member interface's MAC address as the MAC address for the BIG-IP on that VLAN. This duplicates the functionality on the server appliance.
Status lights (CR18605)
In an active-active configuration the annunciator lights now show the correct status (active or standby) on each unit.
VLAN headers for tagged interfaces (CR18623)
The BIG-IP no longer inserts random QoS values into 802.1Q VLAN headers.
Extra characters in log file (CR18879)
When UDP port * is enabled and UDP timeout is set to 0 (zero), extra characters are no longer entered in the log file.
RADIUS_pinger (CR19271)
The RADIUS_pinger no longer intermittently marks nodes down.
Dell 2650 ESM-4 support (CR19325) (CR20100) (CR21178) (CR21179) (CR21183) (CR21208) (CR21221) (CR21222)
The BIG-IP now supports the Dell 2650 platform.
bigip.conf file (CR19361)
A large bigip.conf file now loads more quickly when aliasing is used for node monitors.
IMAP_pinger default folder (CR20043)
If you do not specify an IMAP_pinger folder when defining a monitor based on the IMAP_monitor, the default folder "INBOX" is used.
SNMP with wildcard virtual servers (CR20125)
The snmpwalk command now returns the correct values for virtual servers when a wildcard virtual server is defined.
Support for iControl v2.1 (CR20178)
This version supports iControl v2.1.
Apache+Mod_SSL on BIG-IP has a buffer overflow (CR20196)
We have addressed security issues regarding an Apache+Mod_SSL buffer overflow. For more information see http://archives.neohapsis.com/archives/bugtraq/2002-02/0313.html.
Windows Terminal Server (WTS) persistence (CR20241)
This release includes an updated version of the BIG-IP Windows Terminal Server (WTS) persistence feature. WTS persistence provides an efficient way of load balancing traffic to and maintaining persistent connections between Windows clients and servers that are running Microsoft's Terminal Services service. When BIG-IP WTS persistence is enabled, a Windows .NET Enterprise server participating in session sharing can redirect a mis-targeted connection to the BIG-IP virtual server, instead of to another server directly. This ability to redirect connections to the BIG-IP allows the BIG-IP to assume responsibility for redirecting connections to the appropriate servers when necessary. Also, when WTS persistence is enabled on a BIG-IP and the servers in the pool participate in session sharing, the BIG-IP load balances a Terminal Services connection according to the way the user has configured the BIG-IP for load balancing. Thus, the use of Windows .NET Enterprise servers and session sharing, combined with the BIG-IP WTS persistence feature, provides more sophisticated load balancing and more reliable reconnection when servers become disconnected. For more information about this feature, see the technical note Configuring BIG-IP Windows Terminal Server Persistence .
big3d and TCP (CR20244)
TCP now functions properly with big3d on the IP Application Switch.
Obsolete VLAN commands (CR20254)
Using obsolete VLAN commands no longer causes errors when loading.
Default TCP timeout for SNATs (CR20270)
Loading a SNAT with a default TCP timeout no longer cause errors.
Active FTP port collision resolution (CR20417)
Active FTP port collision resolution through a SNAT now functions correctly.
Unsuccessful login reporting for SSH, RSH, RCP, and FTP (CR20435)
Previously the BIG-IP recorded unsuccessful login attempts for Telnet only. The /var/log/secure file now shows unsuccessful login attempts for SSH, RSH ,RCP, and FTP.
Setting port 0 timeout (CR20469)
You can now set the port 0 timeout without causing SNAT connections to be reaped with that timeout.
bigip.conf entries (CR20483)
Extra entries are no longer be logged in bigip.conf.
VLAN limits (CR20486)
The maximum number of VLANs is now set correctly for the IP Application Switch.
Setup utility (CR20543)
The Setup utility no longer adds deleted ICMP monitors.
Any-IP through SNAT initiation failure (CR20559)
With any_ip_through_snat disabled, when an any-IP packet originates from a member of a SNAT, the BIG-IP now attempts to IP forward the packet instead of rejecting it.
HTTP chunking interprets carriage-return/line-feed (CRLF) when straddling packet boundary (CR20564)
The BIG-IP now correctly interprets carriage-return/line-feed (CRLF) when it is split across two packets.
Sequence numbers on out of order packets (CR20567)
When in layer 7 (L7) forwarding mode, the BIG-IP now checks to make sure that packets from the server are in the correct order before adjusting sequence numbers.
Dynamic Ratio (CR20580)
Dynamic Ratio now functions correctly.
IM now accepts the + character (CR20595)
The IM now accepts the + character in file names for configuration installation.
Late binding connections through fast path (CR20598)
The BIG-IP now properly closes late binding connections that go through fast path.
Node limits (CR20661)
Node limits are now enforced even if there is a short time between connections.
SNAT automap with OneConnect (CR20710)
You can now use SNAT automap with OneConnect without slowing performance.
Display address names for long host names (CR20712)
bigpipe no longer creates errors when displaying long host names.
proxyd (CR20718)
proxyd no longer sets its exit code incorrectly when daemonizing.
proxyd HTTP parsing (CR20722) (CR20726)
proxyd HTTP parsing now uses normal amounts of system resources.
TOS values on delayed binding connections (CR20733)
The BIG-IP no longer sets illegal TOS values on delayed binding connections.
Reserved keywords list (CR20747)
The word "cache" is now one of the reserved keywords in the Configuration utility. For more information about the reserved keywords, see the list of reserved keywords.
Setup utility (CR20752)
When you re-run the Setup utility and change your original configuration, all configuration data is rewritten properly.
Class strings is 64 bytes or longer (CR20772)
bigpipe no longer creates errors when a class string is 64 bytes or longer.
Occasional hang on reboot at 'syncing disks...' (CR20778)
BIG-IP no longer occasionally hangs when rebooted or halted during a period of file system activity.
Java on BIG-IP (CR20797)
Running a scanner against BIG-IP no longer causes the Java process to reach 99%.
FQDN and bigpipe virtual commands (CR20859)
Specifying FQDN in a bigpipe virtual command no longer causes bigpipe to become unstable.
Network with Hardwired failover (CR20864)
The active unit no longer goes standby after peer reboots.
proxyd under heavy load (CR20880)
proxyd and TPS connection limits now function properly under heavy connection load.
VLAN/loopback information (CR20886)
The ifTable now includes VLAN and loopback information.
SSL Persistence (CR20995)
SSL Persistence now functions correctly.
gated OSPF routing protocol (CR20997)
The gated OSPF routing protocol now works with multiple IP addresses on the same IP network.
Server-side SSL proxy (CR21029)
Server-side SSL proxy no longer attempts to resume SSL sessions to servers when cache size is set to zero.
Outbound load balancing (CR21050)
When you use the default gateway pool for outbound load balancing, outbound requests are no longer routed out of the wrong interface.
OpenSSL (CR21073)
OpenSSL now uses the correct default path for the configuration files.
Deleting routes (CR21095)
Deleting routes no longer causes the BIG-IP to become unstable when using VLAN-keyed connections.
Wild card virtual servers on VLANs (CR21107)
Using VLAN-based wild card virtual servers no longer exhausts system resources.
Keep-alives (CR21112)
The BIG-IP no longer assumes keep-alives are on when a client makes a POST request.
Simple persistence with default mask (CR21117)
Simple persistence with a default mask, no longer sends connections to the same node.
Nodes with connection limits (CR21133)
Nodes with connection limits specified, listed after a disabled node in the configuration file, are no longer incorrectly disabled.
Interfaces MIB (CR21137)
The interfaces MIB no longer takes up abnormal amounts of system resources.
SSL To Server has been optimized (CR21151)
Large amounts of data through a re-encrypting SSL proxy no longer cause proxyd to become unstable.
Broadcom BCM570x driver (CR20990) (CR21155) (CR21184)
The BIG-IP now supports the Broadcom BCM570x family of Gigabit Ethernet NICs.
Additional requests on keep-alive connections (CR21197)
When a client makes an additional HTTP request on a keepalive connection, the BIG-IP now parses the new request to determine the HTTP version of the additional request.
Gateway failsafe (CR21198)
When you configure a node and an ICMP monitor with the same IP address as the default gateway and gateway failsafe is armed, BIG-IP now correctly updates both the gateway failsafe and the node status.
Error message (CR21215)
Upon rebooting, the BIG-IP no longer displays an error message at the login prompt.
bigSNMP on BIG-IP version 4.2 with PTF02 installed (CR21254)
On a stand alone BIG-IP 4.2 with PTF02 installed, keeping the BIG-IP in an idle state for long periods of time no longer causes bigSNMP to become unstable.
Version 4.2PTF03
Link down on standby failover feature (CR20821)
The link-down-on-standby failover feature now works properly on the IP application switch when auto-negotiation is disabled.
L7 with large requests (CR20875) (CR20885)
BIG-IP now works properly with L7 features and large requests.
Version 4.2PTF02
Shell interpreted characters in monitors
Monitors can now pass shell interpreted characters, such as &, <, and > in parameters.
Port mirroring on the IP Application Switch (CR18435)
Ports not configured in a VLAN are now mirrored on the IP Application Switch.
T/TCP session pass through to L4 virtual servers (CR18792)
This version supports T/TCP session initiation to layer 4 (L4) virtual servers. If a session times out without a 4-way close, it is removed from the connection table without sending a TCP reset (RST).
VLAN-keyed connections feature (CR19388)
The BIG-IP now supports VLAN-keyed connections. VLAN-keyed connections are used when traffic for the same connection must pass through the BIG-IP several times, on multiple pairs of VLANs (or in different VLAN groups). This feature has several applications, including but not limited to, firewall sandwiches where there is only one set of BIG-IP units and both sides of the firewall sandwich are connected to the units. The VLAN-keyed connections feature is enabled by default. To disable this feature use the following bigpipe command:
b internal set honor_vlans = 0
Sequence number tracking (CR19393)
Out of order packets sent to a delayed binding virtual server no longer cause sequence number tracking to become out of sync.
TCP 4-way close (CR19591)
TCP 4-way close is now properly detected in all cases when packets are dropped or sent out of order by an upstream device.
Resets from a virtual server to a proxy (CR19667)
A reset from a virtual server due to a denial (such as port not enabled) now has last hop routing support. This means a RST from a virtual server to a proxy will go through the proxy instead of from the external interface to the client.
iControl messages through ITCMSystemService (CR19714)
Intermittent problems using the iControl ITCMSystem interfaces no longer cause instability.
iControl (CR19809)
iControl SOAP mappings for IP address parameters are now correct.
iControl user access (CR19892)
iControl user access is now consistent for BIG-IP CORBA and SOAP portals.
proxyd: 90%+ CPU utilization (CR19896)
There are no longer issues with proxyd and high CPU utilization.
Insert cookie mode (CR19930)
Insert cookie mode in certain circumstances no longer causes the BIG-IP to become unstable.
iControl LocalLB::Pool (CR19967)
iControl LocalLB::Pool can now query the persistence table.
OneConnect state engine (CR20010)
The OneConnect state engine no longer incorrectly changes states when chunking.
Setup utility (CR20127)
The Setup utility now only writes VLANs that have associated interfaces to bigip_base.conf.
get_router_address (CR20137)
The iControl get_router_address command can now return all strings.
iControl SOAP interface (CR20237)
iControl can now connect to the SOAP interface on a shared address.
Sending packets on GVRP/GMRP (CR20242)
Sending packets on GVRP/GMRP no longer causes a multicast storm.
iControl (CR20243)
iControl ITCMSystem::enable_ntpd and get_ntpd_status commands now use bigstart.
Fallback host names without quotes (CR20266)
bigpipe now handles fallback host names correctly in all circumstances.
Allocating strings for internal VLAN names and checkd (CR20272)
checkd no longer exhausts system resources.
iQuery over UDP (CR20287)
When you are using iQuery over UDP, messages are now routed over the correct interface and have the correct source address.
SSL-to-Server with late binding connections (CR20408)
SSL-to-Server now functions correctly with late binding connections.
FTP port collision resolution through a SNAT (CR20417)
Active FTP port collision resolution through a SNAT now functions correctly.
VLAN groups can now be configured to bridge at L2 (CR20467)
The BIG-IP now supports transparent L2 forwarding. For more information on configuring this feature, see Layer 2 forwarding transparency in the Optional configuration changes section of this PTF note.
The standby unit no longer attempts L2 or L3 forwarding.
L2 proxy ARP forwarding exclusion list (CR20647)
In order to prevent the active unit from forwarding ARP requests for the standby unit (or other hosts to which proxy ARP forwarding is not desired), you can now define a proxy arp exclusion list. To configure this feature, you can define a proxy_arp_exclude class and add any self-IPs on the standby and active units to it. BIG-IP will not forward ARP requests to or from the hosts defined in this class.
For example, to create a proxy_arp_exclude class use the following syntax:
b class proxy_arp_exclude { host <self IP 1> host <self IP 2> ... host <self IP N> }
VLAN group active/standby pair (CR20648)
When a BIG-IP in a VLAN group switches from active to standby mode, it now drops the links on its interfaces. This is so that any connected switches will recognize that all proxy arped MAC addresses are on the currently active BIG-IP, not on the standby. This feature can be configured with a new BIG-IP internal variable standby_link_down_time. This value specifies how long a unit that just went standby should keep all of its links down. The value is in tenths of a second, so a value of 50 would be equivalent to 5 seconds. The default is 0, and this disables the feature.
For example, to enable this feature and set the variable standby_link_downtime to 50 use following syntax:
b internal set standby_link_down_time = 50
Version 4.2PTF01
SSL Proxy: Improved traffic throttling (CR20229)
The SSL Proxy is now much more efficient at handling the scenario when the bandwidth between the client and the proxy is significantly less than the bandwidth from the proxy to the server. This is done by limiting the server-to-proxy bandwidth to the bandwidth of the proxy-to-client.
Akamaizer Proxy performance (CR20167)
Performance of the akamaizer proxy has been improved.
BIG-IP now sends a TCP RST when no routes are available (CR20114)
BIG-IP now sends a reset (RST) when auto-lasthop is enabled and no route is available. This enhances the performance of clients that do not resend TCP packets.
SSL Proxy: 100% CPU utilization freezes existing connections (CR19966)
We improved the way the SSL proxy handles prematurely disconnected clients.
Broadcast pings originating from the BIG-IP (CR19901)
BIG-IP is not adversely affected by broadcast pings originating from itself.
Required configuration changes
List of reserved keywords
With this version of the BIG-IP software, there is a list of keywords that are reserved. You cannot use any words in the list when you create configurations from the web-based Configuration utility, or from the command line. For more information about the reserved keywords, see the list of reserved keywords.
Optional configuration changes
Layer 2 forwarding transparency
In previous releases, VLAN groups have been a hybrid of layer 2 (L2) proxy ARP with layer 3 (L3) forwarding. In this release, you can configure pure L2 operation for VLAN groups. To configure this, you can set the internal variable transparent_vlangroups to one of the following three values:
0 (default) - traditional proxy ARP with L3 forwarding
1 - L2 forwarding with locally unique bit toggled in ARP response across the VLANs
2 - L2 forwarding with original MAC address of remote system preserved across VLANs
For more information on configuring this feature, see solution brief 1541 at tech.f5.com.
Wildcard forwarding virtual server
If you are currently using IP forwarding for BIG-IP version 4.0 and higher, we strongly recommend that you use a wildcard forwarding virtual server instead of or in addition to IP forwarding. With the additional features in BIG-IP 4.x, using a wildcard forwarding virtual server is faster than using IP forwarding. A wildcard forwarding virtual server also allows you to get statistics on the exact amount of traffic flowing through the system.
If you want to configure a wildcard forwarding virtual server to handle IP forwarded traffic, use the following procedure on your 4.x system. You can perform this procedure on-the-fly without causing any interruption of service.
- To set up timeouts type the following commands:
bigpipe service 0 tcp enable
bigpipe service 0 timeout tcp 30
bigpipe service 0 udp enable
bigpipe service 0 timeout udp 30 - Set up a wildcard forwarding virtual server by typing the following command:
bigpipe virtual 0.0.0.0:0 forward
- If you want to allow protocols other than TCP and UDP through the forwarding virtual server, use the following command. The default timeout is 15 seconds.
bigpipe virtual 0.0.0.0 any_ip enable
If you want to change the default timeout for this setting, use this syntax:
bigpipe virtual 0.0.0.0 any_ip timeout <seconds>
For example, if you want to change the default timeout to 5 seconds, type this command:
bigpipe virtual 0.0.0.0 any_ip timeout 5
- To save your new configuration, type:
bigpipe save
For more information on wildcard forwarding virtual servers, see the BIG-IP Solutions Guide .
Changing the default log levels for the webserver (CR21656) (CR21746)
When you install this PTF, the IM package overwrites the webserver configuration file httpd.conf. The webserver log level and SSL webserver log level are reset to new default settings. The webserver log level controls how much information about general web requests is logged. The SSL log level (ssl_log_level) applies only to SSL-enabled web servers, and controls how much information about SSL transactions is logged. The default log level for the webserver is set to emerg. The default SSL log level is set to none. If you want to change these default log levels, you can use the command line interface to manually configure this setting. For a list of valid webserver log levels and SSL webserver log levels, see the tables below.
Use the following set of steps to change the default log levels for the webserver.
- To manually configure the webserver log level, use one or both of the following commands:
- To configure the logging level for standard messages, type:
bigpipe db set Common.Bigip.Webserver.log_level = <level>
- To configure the logging level for SSL messages, type:
bigpipe db set Common.Bigip.Webserver.ssl_log_level = <level>
- To configure the logging level for standard messages, type:
- After you designate a log level, activate your changes by typing the following command:
/usr/sbin/first_time/tweak_httpd
Configure access logging for the webserver using the following process:
- To enable or disable access logging use one of the following commands:
- To enable access logging for the webserver, type this command:
bigpipe db set Common.Bigip.Webserver.log_access = 1
- To disable access logging for the webserver, type this command:
bigpipe db set Common.Bigip.Webserver.log_access = 0
- To enable access logging for the webserver, type this command:
- Activate your changes by typing the following command:
/usr/sbin/first_time/tweak_httpd
Level | Description | Example |
none | No logging is written | |
emerg | Emergencies - system is unusable | "Child cannot open lock file. Exiting" |
alert | Action must be taken immediately | "getpwuid: couldn't determine user name from uid" |
crit | Critical Conditions | "socket: Failed to get a socket, exiting child" |
error | Error conditions | "Premature end of script headers" |
warn | Warning conditions | "child process 1234 did not exit, sending another SIGHUP" |
notice | Normal but significant condition | "httpd: caught SIGBUS, attempting to dump core in ..." |
info | Informational | "Server seems busy, (you may need to increase StartServers, or Min/MaxSpareServers)..." |
debug | Debug-level messages | "Opening config file ..." |
The following table contains a list of valid log levels for SSL messages:
Level | Description | |
none | No dedicated SSL logging is written, but messages of level error are written to the general Apache error log file. | |
error | Logs messages of the error type only that is, messages that show fatal situations (processing is usually stopped). | |
warn | Logs warning messages, which show non-fatal problems (processing is usually continued). | |
info | Logs informational messages, which show major processing steps. | |
trace | Logs trace messages, messages which show minor processing steps. | |
debug | Logs debugging messages, which show development and low-level I/O information. |
Known Issues
The following items are known issues in the current release.
Compact Flash drive errors (CR21375) (CR21376) (CR21397) (CR21657) (CR21659) (CR21660) (CR21663)
In some cases, D4x/D5x compact flash drives may exhibit hard read errors. These error messages are logged in both the console and to /var/log/messages. The following is an example of the type of error message you may receive:
Apr 12 15:55:41 bip2 kernel: wd0g: hard error reading fsbn 34624 of 34624-34655 (wd0 bn 449344; cn 624 tn 1 sn 16) status 51 error 4
Apr 12 15:55:41 bip2 kernel: wd0: resetting controller
Permissions of .crt files (SSL proxy) (CR19438)
CA files (.crt) or chain files (.chain) no longer fail to load in certain situations, because of file permission problems. These errors are presented in the /var/log/proxyd log file.
Setting active-active mode using the web-based Configuration utility (CR19794)
With network failover enabled, you cannot use the Configuration utility to configure active-active mode. When you have network failover enabled, use the command line interface to set active-active mode.
Loading the previous configuration after upgrade (CR20616)
n some cases, after you upgrade to PTF-04, the previous configuration is not loaded automatically. If this happens, you should load your configuration by typing /sbin/sod.
b load with VLAN groups (CR22224)
When you create multiple VLANs, and then create a VLAN group with a single self IP address, the configuration may not load properly. If your configuration fails to load during bootup, you can restore your previous configuration from backup.
Creating an SSL proxy using iControl (CR22236)
After creating an SSL proxy using iControl, you must manually restart proxyd in order for the newly created proxy to function properly. To start proxyd, log on to the BIG-IP system and run /sbin/proxyd.