Known issues

This document lists and describes the known issues and possible workarounds in F5 NGINX Instance Manager. We also list the issues resolved in the latest releases.

We recommend you upgrade to the latest version of NGINX Instance Manager to take advantage of new features, improvements, and bug fixes.

2.20.0

June 16, 2025

Failing to fetch CVE data when using forward proxy in K8s environments

Issue ID Status
46177 Open

Description

Fetching latest CVE data from internet might fail if you enable “ssl_verify” in Kubernetes environments.

Workaround

  1. Switch to the offline CVE database. To switch add the property “offline_nginx_cve: true” under the DPM section in the “nms.conf” file.

    dpm:
        offline_nginx_cve: true
  2. Download the latest security advisories file from the nginx.org repository and save them with “cve.xml” as filename in “/usr/share/nms/cve.xml”

  3. Restart the nms service.

    sudo systemctl restart nms

After the restart you will see the line “loading CVE data from file” in the “nms.log” file.


2.19.1

March 27, 2025

The certificate stats are not displayed correctly in the Certificates and Keys page as well as the Dashboard page.

Issue ID Status
45991 Fixed in Instance Manager 2.20.0

Description

When the dashboard page and certificates page are loaded, the count displayed for total, valid, expired, expires soon, managed and unmanaged are incorrect.

Workaround

The changes required have been made and the UI displays the values correctly now. Pagination also works well along with the certificate stats.


2.19.0

February 06, 2025

Publishing the NAP policy fails with the error “The attack signatures with the given version was not found”

Issue ID Status
45845 Fixed in Instance Manager 2.19.1

Description

In NGINX Instance Manager v2.19.0, publishing an NGINX App Protect WAF policy from the UI fails if the latest NGINX App Protect WAF compiler v5.264.0 (for NGINX App Protect WAF v4.13.0 or v5.5.0) is manually installed without adding the NGINX repository certificate and key.

Workaround

  1. Download the NGINX repository certificate and key:

    • Log in to MyF5.
    • Go to My Products and Plans > Subscriptions.
    • Download the SSL certificate (nginx-repo.crt) and private key (nginx-repo.key) for your NGINX App Protect subscription.
  2. Upload the certificate and key using the NGINX Instance Manager web interface:

    • Go to Settings > NGINX Repo Connect.
    • Select Add Certificate.
    • Choose Select PEM files or Manual entry.
    • If using manual entry, copy and paste your certificate and key details.

    For detailed steps, see Upload NGINX App Protect WAF certificate and key.

  3. Restart the nms-integrations service:

    sudo systemctl restart nms-integrations

2.18.0

November 08, 2024

Automatic downloading of NAP compiler versions 5.210.0 and 5.264.0 fails on Ubuntu 24.04

Issue ID Status
45846 Fixed in Instance Manager 2.19.1

Description

On Ubuntu 24.04, NGINX Instance Manager v2.18.0 and v2.19.0 fail to automatically download NGINX App Protect WAF compiler v5.210.0 (for NGINX App Protect WAF v4.12.0) and v5.264.0 (for NGINX App Protect WAF v4.13.0) from the NGINX repository.

Workaround

Manually install the missing compiler by following the instructions in Install the WAF compiler.


Syntax errors while saving template configuration

Issue ID Status
45573 Fixed in Instance Manager 2.19.0

Description

Saving templates as “staged configs” causes syntax errors due to Augment templates being multiple directories down the tree.


NGINX configuration error messages overlap outside the error window

Issue ID Status
45570 Fixed in Instance Manager 2.19.0

Description

If there is an NGINX configuration error when pushing a template configuration, the text overlaps outside the error window.


.tgz files are not accepted in templates

Issue ID Status
45301 Fixed in Instance Manager 2.19.0

Description

.tgz files are not accepted in templates while .tar.gz files are.


Error messages persist after fix

Issue ID Status
45024 Fixed in Instance Manager 2.19.0

Description

There is an issue that causes previous error messages to persist in the web interface, even after fixing the error causing the message.


2.17.0

July 10, 2024

Web Analytics are not enabled after upgrading Instance Manager when keeping existing nms-http.conf

Issue ID Status
45131 Open

Description

When using NGINX Instance Manager, you configure OIDC by manually editing the /etc/nginx/conf.d/nms-http.conf and /etc/nms/nms.conf files.

During the upgrade to 2.17.0, the user is asked if they would like to keep their own nms-http.conf, or replace it with the new default. As Web Analytics are enabled via the /etc/nginx/conf.d/nms-http.conf file, if a user decides to keep their own config when prompted during upgrade, these will not get enabled.

Workaround

To keep the existing nms-http.conf file while maintaining the web analytics functionality, add the following to “/etc/nginx/conf.d/nms-http.conf” , inside the /ui location block:

add_header Content-Security-Policy "default-src 'none'; block-all-mixed-content; frame-ancestors 'self'; object-src 'none'; manifest-src 'self'; script-src 'self' https://*.walkme.com 'unsafe-inline' 'unsafe-eval'; style-src 'self' https://*.walkme.com fonts.googleapis.com 'unsafe-inline'; img-src 'self' https://*.walkme.com s3.walkmeusercontent.com d3sbxpiag177w8.cloudfront.net data:; font-src 'self' https://*.walkme.com data: https://fonts.gstatic.com; connect-src 'self' https://*.walkme.com; frame-src 'self' https://*.walkme.com blob:; worker-src 'self' blob: https://*.walkme.com;";

Failure to retrieve instance configuration when NAP-enabled instance doesn’t register properly

Issue ID Status
45113 Open

Description

If NGINX Agent is configured to monitor NGINX App Protect before App Protect is installed, NGINX Agent will send an empty App Protect metadata structure to NGINX Instance Manager. This causes Instance Manager to fail to register the NGINX instance properly.

Workaround

Edit the “/etc/nginx-agent/nginx-agent.conf” file and configure “precompiled_publication” as “false”. Then restart the nginx-agent process running sudo systemctl restart nginx-agent.


2.15.0

December 12, 2023

Some NGINX Management Suite features not available after adding license

Issue ID Status
44698 Open

Description

After adding a license, some NGINX Management Suite features might be disabled, even if they are included in the license.

Workaround

Restart NGINX Management Suite to make all the features available for use. To restart NGINX Management Suite, open a terminal on the host and run the command:

sudo systemctl restart nms

Licenses for NGINX Plus applied prior to Instance Manager 2.15 don’t show the full feature set

Issue ID Status
44685 Open

Description

With the introduction of Instance Manager 2.15, we are expanding the features available for some licenses, such as those with only NGINX Plus entitlement. If such a license was applied before upgrading to 2.15, the expanded set of features will not be available as intended.

Workaround

Terminate the license applied previously. Re-apply the license.


2.14.0

October 16, 2023

Scan results may not include CVE count with App Protect installed

Issue ID Status
44554 Open

Description

When using the Scan feature, the CVE column may provide a value of ‘–’ for instances running specific versions of NGINX App Protect, including App Protect 4.4 and potentially others.


Certain instances not showing in the Network Utilization drawer

Issue ID Status
44547 Open

Description

Under certain conditions, instances that are not reporting request totals may not show in the Network Utilization panel or drawer when data is sorted by Request count. This typically happens when NGINX is not configured to stream metrics data to NGINX Agent.

Workaround

Configure NGINX Plus or NGINX Stub Status APIs to send correctly the NGINX metrics using NGINX Agent. See the Metrics documentation to learn more.


Built-in security policies may not be accessible

Issue ID Status
44520 Open

Description

Users might not have permission to access the built-in policies (NginxDefaultPolicy and NginxStrictPolicy) while using NGINX Management Suite.

Workaround

Use RBAC to assign the following permissions to the user:

  • (At minimum) READ access to any other custom security policy or
  • READ access to the security policy feature: /api/platform/v1/security/policies

2.13.0

August 28, 2023

If you publish a configuration with an uncompiled policy, it will fail the first time

Issue ID Status
44267 Open

Description

In Instance Manager 2.13, a new configuration is published before the compile stage of a WAF policy is complete. This happens only when the policy is first referenced. This leads to a deployment failure, and the configuration rolls back. Typically, by the time you try to submit the configuration again, the policy has finished compiling, and the request goes through.

The initial failure message looks like this:

Config push failed - err: failure from multiple instances. Affected placements: instance/70328a2c-699d-3a90-8548-b8fcec15dabd (instance-group: ig1) - err: failed building config payload: config: aux payload /etc/nms/NginxDefaultPolicy.tgz for instance:70328a2c-699d-3a90-8548-b8fcec15dabd not ready aux payload not ready, instance/2e637e08-64b3-36f9-8f47-b64517805e98 (instance-group: ig1) - err: failed building config payload: config: aux payload /etc/nms/NginxDefaultPolicy.tgz for instance:2e637e08-64b3-36f9-8f47-b64517805e98 not ready aux payload not ready

Workaround

Retry pushing the new configuration. The deployment should work the second time around.


Inaccurate Attack Signatures and Threat Campaigns versions

Issue ID Status
43950 Open

Description

If precompiled_publication is set to true, NGINX Management Suite may incorrectly report the version of Attack Signatures (AS) and Threat Campaigns (TC) that you previously installed on the NAP WAF instance.


2.11.0

June 12, 2023

Updating Attack Signatures or Threat Campaigns on multiple instances simultaneously updates only one instance

Issue ID Status
42838 Open

Description

When updating Attack Signatures or Threat Campaign packages on multiple instances simultaneously, only one instance may be successfully updated. An error similar to the following is logged: security policy bundle object with given ID was not found.

Workaround

Update the Attack Signatures or Threat Campaigns package one instance at a time.


2.10.0

April 26, 2023

When publishing a new version of Threat Campaign, the last two versions in the list cannot be selected

Issue ID Status
42217 Open

Description

The list of Threat Campaigns will disappear when scrolling down, preventing the selection of the oldest versions.

Workaround

Threat Campaign versions can be published with the API using the route: api/platform/v1/security/publish


2.6.0

November 17, 2022

External references are not supported in App Protect policies

Issue ID Status
36265 Open

Description

References to external files in a policy are not supported.

For example, in the NGINX App Protect WAF JSON declarative policy, these references are not supported:

  • User-defined signatures - " not supporting for a while” @dan
  • Security controls in external references
  • Referenced OpenAPI Spec files

2.3.0

June 30, 2022

Metrics may report additional data

Issue ID Status
34255 Open

Description

NGINX Instance Manager reports metrics at a per-minute interval and includes dimensions for describing the metric data’s characteristics.

An issue has been identified in which metric data is aggregated across all dimensions, not just for existing metrics data. When querying the Metrics API with aggregations like SUM(metric-name), the aggregated data causes the API to over count the metric. This overcounting skews some of the metrics dashboards.

Workaround

When querying the Metrics API, you can exclude the data for an aggregated dimension by specifying the dimension name in the filterBy query parameter.

filterBy=<dimension-name>!= ''

2.0.0

December 21, 2021

Web interface doesn’t report error when failing to upload large config files

Issue ID Status
31081 Open

Description

In the web interface, when uploading a config file that’s larger than 50 MB (max size), the system incorrectly reports the state as Analyzing (Status code 403), although the upload failed.

Workaround

Keep config files under 50 MB.