Known issues
This document lists and describes the known issues and possible workarounds in F5 NGINX Instance Manager. We also list the issues resolved in the latest releases.
We recommend you upgrade to the latest version of NGINX Instance Manager to take advantage of new features, improvements, and bug fixes.
November 07, 2025
| Issue ID | Status |
|---|---|
| 46754 | Open |
If an F5 WAF for NGINX policy has more than one version, the same policy name may appear more than once when you’re assigning access during RBAC role creation. This happens because the system doesn’t show which version is which.
| Issue ID | Status |
|---|---|
| 46763 | Open |
When you sign in using a custom user account that has:
- read permissions for Security Monitoring
- create, read, update, and delete (CRUD) permissions for Security Policies
the Security Monitoring dashboard shows the message: Metrics are disabled
This happens even when ClickHouse is enabled.
Add license read permission to the custom role or user. This allows the Security Monitoring dashboard to complete its license check and load as expected.
| Issue ID | Status |
|---|---|
| 46867 | Fixed in Instance Manager 2.21.1 |
The reported usage in NGINX Instance Manager can be higher than the actual consumption.
June 16, 2025
| Issue ID | Status |
|---|---|
| 46177 | Fixed in Instance Manager 2.21.0 |
Fetching latest CVE data from internet might fail if you enable "ssl_verify" in Kubernetes environments.
-
Switch to the offline CVE database. To switch add the property "offline_nginx_cve: true" under the DPM section in the "nms.conf" file.
cfg dpm: offline_nginx_cve: true -
Download the latest security advisories file from the nginx.org repository and save them with "cve.xml" as filename in "/usr/share/nms/cve.xml”
-
Restart the
nmsservice.sudo systemctl restart nms
After the restart you will see the line “loading CVE data from file” in the "nms.log" file.
| Issue ID | Status |
|---|---|
| 46726 | Open |
The NGINX configuration editor may show errors for files in the conf.d directory when a configuration created with augment templates is published to an instance group. The configuration is valid, but the editor doesn’t recognize all template-generated files.
To avoid this issue, use a standalone nginx.conf file instead of augment templates when publishing to instance groups.
March 27, 2025
| Issue ID | Status |
|---|---|
| 45991 | Fixed in Instance Manager 2.20.0 |
When the dashboard page and certificates page are loaded, the count displayed for total, valid, expired, expires soon, managed and unmanaged are incorrect.
The changes required have been made and the UI displays the values correctly now. Pagination also works well along with the certificate stats.
February 06, 2025
| Issue ID | Status |
|---|---|
| 45845 | Fixed in Instance Manager 2.19.1 |
In NGINX Instance Manager v2.19.0, publishing an F5 WAF for NGINX policy from the UI fails if the latest F5 WAF for NGINX compiler v5.264.0 (for F5 WAF for NGINX v4.13.0 or v5.5.0) is manually installed without adding the NGINX repository certificate and key.
-
Download the NGINX repository certificate and key:
- Log in to MyF5.
- Go to My Products and Plans > Subscriptions.
- Download the SSL certificate (nginx-repo.crt) and private key (nginx-repo.key) for your NGINX App Protect subscription.
-
Upload the certificate and key using the NGINX Instance Manager web interface:
- Go to Settings > NGINX Repo Connect.
- Select Add Certificate.
- Choose Select PEM files or Manual entry.
- If using manual entry, copy and paste your certificate and key details.
For detailed steps, see Upload F5 WAF for NGINX certificate and key.
-
Restart the
nms-integrationsservice:sudo systemctl restart nms-integrations
November 08, 2024
| Issue ID | Status |
|---|---|
| 45024 | Fixed in Instance Manager 2.19.0 |
There is an issue that causes previous error messages to persist in the web interface, even after fixing the error causing the message.
| Issue ID | Status |
|---|---|
| 45301 | Fixed in Instance Manager 2.19.0 |
.tgz files are not accepted in templates while .tar.gz files are.
| Issue ID | Status |
|---|---|
| 45570 | Fixed in Instance Manager 2.19.0 |
If there is an NGINX configuration error when pushing a template configuration, the text overlaps outside the error window.
| Issue ID | Status |
|---|---|
| 45573 | Fixed in Instance Manager 2.19.0 |
Saving templates as “staged configs” causes syntax errors due to Augment templates being multiple directories down the tree.
| Issue ID | Status |
|---|---|
| 45846 | Fixed in Instance Manager 2.19.1 |
On Ubuntu 24.04, NGINX Instance Manager v2.18.0 and v2.19.0 fail to automatically download NGINX App Protect WAF compiler v5.210.0 (for NGINX App Protect WAF v4.12.0) and v5.264.0 (for NGINX App Protect WAF v4.13.0) from the NGINX repository.
Manually install the missing compiler by following the instructions in Install the WAF compiler.
September 13, 2024
| Issue ID | Status |
|---|---|
| 45565 | Fixed in Instance Manager 2.19.0 |
The Certificate Management screen can only show up to 100 certificates.
July 10, 2024
| Issue ID | Status |
|---|---|
| 44971 | Fixed in Instance Manager 2.17.0 |
When editing a template submission, you can now choose between using a snapshot of the template from when it was first deployed or the latest version of the template. Important: Note that if you use the latest version, changes to the templates might make an augment template incompatible with a base template, causing the publication to the data plane to fail.
| Issue ID | Status |
|---|---|
| 44975 | Fixed in Instance Manager 2.18.0 |
When publishing a configuration template fails, the system only displays "Accepted" without providing the final result, such as "Success" or "Failure."
| Issue ID | Status |
|---|---|
| 45113 | Open |
If NGINX Agent is configured to monitor NGINX App Protect before App Protect is installed, NGINX Agent will send an empty App Protect metadata structure to NGINX Instance Manager. This causes Instance Manager to fail to register the NGINX instance properly.
Edit the "/etc/nginx-agent/nginx-agent.conf" file and configure "precompiled_publication" as "false". Then restart the nginx-agent process running sudo systemctl restart nginx-agent.
| Issue ID | Status |
|---|---|
| 45131 | Open |
When using NGINX Instance Manager, you configure OIDC by manually editing the /etc/nginx/conf.d/nms-http.conf and /etc/nms/nms.conf files.
During the upgrade to 2.17.0, the user is asked if they would like to keep their own nms-http.conf, or replace it with the new default. As Web Analytics are enabled via the /etc/nginx/conf.d/nms-http.conf file, if a user decides to keep their own config when prompted during upgrade, these will not get enabled.
To keep the existing nms-http.conf file while maintaining the web analytics functionality, add the following to "/etc/nginx/conf.d/nms-http.conf" , inside the /ui location block:
add_header Content-Security-Policy "default-src 'none'; block-all-mixed-content; frame-ancestors 'self'; object-src 'none'; manifest-src 'self'; script-src 'self' https://*.walkme.com 'unsafe-inline' 'unsafe-eval'; style-src 'self' https://*.walkme.com fonts.googleapis.com 'unsafe-inline'; img-src 'self' https://*.walkme.com s3.walkmeusercontent.com d3sbxpiag177w8.cloudfront.net data:; font-src 'self' https://*.walkme.com data: https://fonts.gstatic.com; connect-src 'self' https://*.walkme.com; frame-src 'self' https://*.walkme.com blob:; worker-src 'self' blob: https://*.walkme.com;";| Issue ID | Status |
|---|---|
| 45153 | Fixed in nginxagent-2.36.0 |
In NGINX Instance Manager 2.17.0, an "invalid number of arguments" error appears in the web interface when using specific configuration parameters in NGINX Agent 2.36.0.
Install NGINX Agent 2.35.1 if you’re using NGINX Instance Manager 2.17.0. This version is included with NGINX Instance Manager 2.17.0 by default.
If you’re installing NGINX Agent from package files, follow the steps in the Installing NGINX Agent guide.
| Issue ID | Status |
|---|---|
| 45512 | Fixed in Instance Manager 2.18.0 |
The months in the custom date range were not displayed correctly because NGINX Instance Manager assumed the data format was in the US timezone.
April 18, 2024
| Issue ID | Status |
|---|---|
| 44877 | Fixed in Instance Manager 2.17.0 |
If you get an "Error accessing resource: forbidden" message while using the NGINX Instance Manager REST API, try logging into the web interface. After logging in, you should be able to use the API.
| Issue ID | Status |
|---|---|
| 44961 | Fixed in Instance Manager 2.17.0 |
When editing a template submission, the system currently uses the latest template files instead of the specific snapshot of files associated with the submission. The latest template files might not be well-formed and can cause errors when generating a configuration. This can lead to an error message saying "malformed."
Use caution when editing template submissions. If you encounter a "malformed" error, check the template for any changes that could have caused the issue.
To keep a template from being changed accidentally, set it to "Ready for Use" by doing the following:
- Go to Templates.
- Find the template you want to lock and click the Actions button (three dots).
- Select Edit.
- Select the Ready for Use option.
If you need to modify a template that you have already submitted, create a copy instead of editing the original:
- On the Templates page, locate the template you want to edit.
- Select the Actions button and choose Edit Template Files.
- Select Save As to duplicate the template, then give it a name.
December 12, 2023
| Issue ID | Status |
|---|---|
| 44685 | Open |
With the introduction of Instance Manager 2.15, we are expanding the features available for some licenses, such as those with only NGINX Plus entitlement. If such a license was applied before upgrading to 2.15, the expanded set of features will not be available as intended.
Terminate the license applied previously. Re-apply the license.
| Issue ID | Status |
|---|---|
| 44686 | Fixed in Instance Manager 2.17.0 |
After deploying NGINX Management Suite in a Kubernetes environment, when a user tries to log on for the first time, a generic error is displayed.
Refreshing the browser clears the error and allows the user to log on.
| Issue ID | Status |
|---|---|
| 44698 | Open |
After adding a license, some NGINX Management Suite features might be disabled, even if they are included in the license.
Restart NGINX Management Suite to make all the features available for use. To restart NGINX Management Suite, open a terminal on the host and run the command:
sudo systemctl restart nms| Issue ID | Status |
|---|---|
| 44758 | Fixed in Instance Manager 2.15.1 |
Helm backup and restore will not run in 2.15.0 due to an underlying change in the dqlite client. Customers are advised to upgrade to 2.15.1.
Upgrade to NGINX Instance Manager 2.15.1.
| Issue ID | Status |
|---|---|
| 44759 | Fixed in Instance Manager 2.15.1 |
The predefined NGINX Management Suite Log Profiles are incompatible with NGINX App Protect 4.7.
To use the NGINX Management Suite predefined log profiles with NGINX App Protect 4.7 follow these steps:
-
Retrieve the content of the NMS predefined log profile through the NMS Log Profile APIs, accessible in the (Manage WAF Security Policies and Security Log Profiles) section.
-
Decode the content obtained in the previous step using base64 encoding.
-
Modify the "max_request_size" and "max_message_size" values within the decoded content to the following:
"max_request_size": "2k", "max_message_size": "32k"
-
Create a custom log profile using the NMS Log Profile APIs, incorporating the base64 encoded content from the adjusted configuration.
-
Update your NGINX configuration to reference the new custom log profile in the NGINX App Protect log profile directive.
October 16, 2023
| Issue ID | Status |
|---|---|
| 44351 | Fixed in Instance Manager 2.15.0 |
An upgrade to NGINX Agent v2.30 or later is required for instances to stream memory utilization data correctly. Note that even after the upgrade, historical data recorded before the upgrade will not be correct.
Upgrade NGINX Agent to version v2.30 or later.
| Issue ID | Status |
|---|---|
| 44504 | Fixed in Instance Manager 2.15.0 |
Dashboard data may update unexpectedly when opening a drawer view. The updated data accurately represents the latest available information about your NGINX instances.
| Issue ID | Status |
|---|---|
| 44520 | Open |
Users might not have permission to access the built-in policies (NginxDefaultPolicy and NginxStrictPolicy) while using NGINX Management Suite.
Use RBAC to assign the following permissions to the user:
- (At minimum) READ access to any other custom security policy or
- READ access to the security policy feature:
/api/platform/v1/security/policies
| Issue ID | Status |
|---|---|
| 44531 | Fixed in Instance Manager 2.14.0 |
NGINX Agent does not report NGINX App Protect as "Active" when the Attack Signature or Threat Campaign version is newer than 2023.10.01.
Upgrade NGINX Agent to version v2.30.1 or later.
| Issue ID | Status |
|---|---|
| 44536 | Fixed in Instance Manager 2.14.0 |
Sorting HTTP errors by “Request Count” sometimes shows the data in an incorrect order.
| Issue ID | Status |
|---|---|
| 44547 | Open |
Under certain conditions, instances that are not reporting request totals may not show in the Network Utilization panel or drawer when data is sorted by Request count. This typically happens when NGINX is not configured to stream metrics data to NGINX Agent.
Configure NGINX Plus or NGINX Stub Status APIs to send correctly the NGINX metrics using NGINX Agent. See the Metrics documentation to learn more.
| Issue ID | Status |
|---|---|
| 44554 | Open |
When using the Scan feature, the CVE column may provide a value of '–' for instances running specific versions of NGINX App Protect, including App Protect 4.4 and potentially others.
| Issue ID | Status |
|---|---|
| 44586 | Fixed in Instance Manager 2.15.0 |
The ClickHouse database service is a required component of the Instance Manager Dashboard. The dashboard may display an error message if the ClickHouse service does not start or quits unexpectedly.
Restart the Clickhouse service.
| Issue ID | Status |
|---|---|
| 44603 | Fixed in Instance Manager 2.15.0 |
NGINX App Protect Attack Signatures package, Threat Campaigns package, and WAF Compiler can fail to download automatically with an error similar to the following:
Oct 20 22:22:57 ip-127-0-0-1 <DPM>[9553]: 2023-10-20T22:22:57.648Z ERROR 81c818dd-ffff-aaaa-8b9d-134a60020d20 authz/authz.go:245 failed to get license status: getting license status: Get "http://unix-socket/api/platform/v1/license/status": context deadline exceeded
Oct 20 22:22:57 ip-127-0-0-1 <INT>[9527]: 2023-10-20T22:22:57.653Z ERROR nms-integrations compiler-controller/security_updates_downloader.go:94 security_updates_downloader: error when creating the nginx repo retriever - unexpected status when retrieving certs: 500 Internal Server ErrorDownload manually the latest Attack Signatures package, Threat Campaign package, and WAF Compiler.
September 05, 2023
| Issue ID | Status |
|---|---|
| 44323 | Fixed in Instance Manager 2.14.0 |
If you have certificates that were added to NGINX Management Suite before upgrading, they may not appear in the list of available certs when creating or editing a resource group.
Restarting the DPM process will make all certificates visible in the Resource Group web interface and API.
For VM and bare metal deployments:
sudo systemctl restart nms-dpmFor Kubernetes deployments:
kubectl -n nms scale --replicas=0 deployment.apps/dpm
kubectl -n nms scale --replicas=1 deployment.apps/dpmAugust 28, 2023
| Issue ID | Status |
|---|---|
| 43950 | Open |
If precompiled_publication is set to true, NGINX Management Suite may incorrectly report the version of Attack Signatures (AS) and Threat Campaigns (TC) that you previously installed on the NAP WAF instance.
| Issue ID | Status |
|---|---|
| 44051 | Fixed in Instance Manager 2.14.0 |
The reporting of severities has been disabled in NGINX App Protect 4.4. As a result, the getAttackCountBySeverity endpoint on the NGINX Management Suite’s API will report zeroes for all severities, and the related "Severity" donut diagram in the Security Monitoring Dashboard won’t display any values.
| Issue ID | Status |
|---|---|
| 44254 | Fixed in Instance Manager 2.13.1 |
If you upgrade to Instance Manager 2.13 and already have certificates in place, you may encounter validation errors in the web interface when you try to create or edit a Resource Group and access the Certs list. You will not be able to save the Resource Group if you encounter these errors.
This issue doesn’t occur if you upload certificates after upgrading to version 2.13, nor does it affect new 2.13 installations. Instance Groups and Systems are unaffected.
To work around this issue, you have two options:
- When creating or editing a Resource Group, don’t use the Certs list. Instance Groups and Systems can still be used.
- If you must use Resource Groups with Certs, delete any certificates that were uploaded before upgrading to 2.13, and then re-upload them.
| Issue ID | Status |
|---|---|
| 44267 | Open |
In Instance Manager 2.13, a new configuration is published before the compile stage of a WAF policy is complete. This happens only when the policy is first referenced. This leads to a deployment failure, and the configuration rolls back. Typically, by the time you try to submit the configuration again, the policy has finished compiling, and the request goes through.
The initial failure message looks like this:
Config push failed - err: failure from multiple instances. Affected placements: instance/70328a2c-699d-3a90-8548-b8fcec15dabd (instance-group: ig1) - err: failed building config payload: config: aux payload /etc/nms/NginxDefaultPolicy.tgz for instance:70328a2c-699d-3a90-8548-b8fcec15dabd not ready aux payload not ready, instance/2e637e08-64b3-36f9-8f47-b64517805e98 (instance-group: ig1) - err: failed building config payload: config: aux payload /etc/nms/NginxDefaultPolicy.tgz for instance:2e637e08-64b3-36f9-8f47-b64517805e98 not ready aux payload not readyRetry pushing the new configuration. The deployment should work the second time around.
| Issue ID | Status |
|---|---|
| 44277 | Fixed in Instance Manager 2.13.1 |
When configuring role-based access control (RBAC), you can’t assign access levels to some features, including Analytics and Security Policies.
July 20, 2023
| Issue ID | Status |
|---|---|
| 43438 | Fixed in Instance Manager 2.13.0 |
If NGINX Management Suite logging is set to debug, it may log an "unregistered clickhouse-adapter" failure every few seconds. These logs do not affect the system’s performance and can safely be ignored.
Choose a less verbose logging level, such as warning, error, or info.
| Issue ID | Status |
|---|---|
| 43580 | Fixed in Instance Manager 2.12.0 |
When a JWT license from an expired subscription is uploaded to NGINX Management Suite, it cannot be replaced or terminated from the web interface.
Upload a valid JWT or S/MIME license file using the Platform API.
More information is available in the Platform API reference guide, under the License endpoint. In a web browser, go to the FQDN for your NGINX Management Suite host and log in. Then, from the Launchpad menu, select API Documentation.
| Issue ID | Status |
|---|---|
| 43606 | Fixed in Instance Manager 2.16.0 |
Upgrading to Instance Manager 2.12 will stop NGINX Management Suite from transmitting telemetry.
Toggle the telemetry setting off and on. You can do this by selecting Settings > License from the NGINX Management Suite web interface.
| Issue ID | Status |
|---|---|
| 43655 | Fixed in Instance Manager 2.12.0 |
When uploading a JWT license to an NGINX Management Suite deployment on Kubernetes, you may see error messages in the web interface and logs similar to the following example:
[ERROR] /usr/bin/nms-integrations license/secrets.go:100 jwt-manager: failed to get [secret=dataEncryptionKey] from remote store. secret not found
This error can be resolved by deleting the integrations pod and restarting it. You can do this by running the following command on the NGINX Management Suite host:
kubectl -n nms scale --replicas=0 deployment.apps/integrations; kubectl -n nms scale --replicas=1 deployment.apps/integrations| Issue ID | Status |
|---|---|
| 43719 | Fixed in Instance Manager 2.18.0 |
If firewall rules prevent access to F5 servers, attempting to license NGINX Management Suite with a JWT license may result in the product being unable to terminate the license or upload another one, even if connectivity is restored.
To fix this issue, follow the steps below for your environment type.
-
Stop the integrations service:
sudo systemctl stop nms-integrations -
Delete the contents of
/var/lib/nms/dqlite/license -
Start the integrations service:
sudo systemctl start nms-integrations -
Upload a valid S/MIME license.
Alternatively, to use a JWT license, make sure to allow inbound and outbound access on port 443 to the following URLs:
-
Run the following command to stop the integrations service by scaling down:
kubectl -n nms scale --replicas=0 deployment.apps/integrations -
Access the Dqlite volume for the integrations service and delete the contents of
/var/lib/nms/dqlite/license. -
Run the following command to start the integrations service by scaling up:
kubectl -n nms scale --replicas=1 deployment.apps/integrations -
Upload a valid S/MIME license.
Alternatively, to use a JWT license, make sure to allow inbound and outbound access on port 443 to the following URLs:
June 12, 2023
| Issue ID | Status |
|---|---|
| 42838 | Won’t be resolved |
When updating Attack Signatures or Threat Campaign packages on multiple instances simultaneously, only one instance may be successfully updated. An error similar to the following is logged: security policy bundle object with given ID was not found.
Update the Attack Signatures or Threat Campaigns package one instance at a time.
| Issue ID | Status |
|---|---|
| 42967 | Fixed in Instance Manager 2.13.0 |
When deploying NGINX Management Suite in Kubernetes, if you have previously run the support package script and the output is still in the default location, you may encounter an error message similar to the following example when reinstalling or upgrading NGINX Management Suite:
Failed to create: Secret "sh.helm.release.v1.(release-name).v1"
Delete or move the support package output files: nms-hybrid/support-package/k8s-support-pkg-*.tgz.
| Issue ID | Status |
|---|---|
| 43010 | Fixed in nginxagent-2.26.1 |
NGINX Agent 2.26, which is packaged with Instance Manager 2.11, may fail to start on RHEL 9 systems with SELinux enabled. An error similar to the following is logged: "Unable to read dynamic config".
Use an earlier version of the NGINX Agent. You can install the NGINX Agent from GitHub or the NGINX Plus repository.
| Issue ID | Status |
|---|---|
| 43012 | Fixed in Instance Manager 2.12.0 |
In certain situations, when you update a certificate or key using the NGINX Management Suite web interface, and subsequently add or edit a Certificate permission for Role-Based Access Control (RBAC) in Settings > Roles, you may notice that the "Applies to" name appears as "nginx-repo".
Use the unique identifier to assign specific permissions to a particular certificate and key pair.
| Issue ID | Status |
|---|---|
| 43016 | Fixed in Instance Manager 2.12.0 |
After restarting the NGINX Management Suite services, the publication status of instance groups for deployments that include a security policy may show as "not available".
Redeploy a new version of the security policy or an updated nginx.conf.
| Issue ID | Status |
|---|---|
| 43034 | Fixed in Instance Manager 2.15.0 |
When querying the following API endpoints for Security deployment associations, you may encounter results where the UID value for Attack-Signatures and Threat-Campaigns is empty.
- /api/platform/v1/security/deployments/attack-signatures/associations
- /api/platform/v1/security/deployments/threat-campaigns/associations
- /api/platform/v1/security/deployments/associations/NginxDefaultPolicy
To obtain the UID value for Attack-Signatures and Threat-Campaigns, you can query the following API endpoints:
- /api/platform/v1/security/attack-signatures
- /api/platform/v1/security/threat-campaigns
April 26, 2023
| Issue ID | Status |
|---|---|
| 41257 | Fixed in Instance Manager 2.10.0 |
NGINX Agent introduced the config_reload_monitoring_period parameter under nginx to define the duration which Agent will monitor the logs for relevant errors and warnings after a configuration change. As a result, configuration changes will take at least one second to appear.
Adjust the config_reload_monitoring_period parameter to a value that suits your workflow.
| Issue ID | Status |
|---|---|
| 42105 | Fixed in Instance Manager 2.12.0 |
When you apply a filter with double backslashes (\\) on any of the Analytics endpoints, such as metrics, events, or the security dashboard, the API fails to parse and apply the filter correctly.
| Issue ID | Status |
|---|---|
| 42108 | Fixed in Instance Manager 2.11.0 |
After upgrading to Instance Manager 2.10, the publish status on App Security pages of Policies, Attack Signatures, and Threat Campaign shows "Invalid Date" until new configurations are published to the instance or instance group.
| Issue ID | Status |
|---|---|
| 42182 | Fixed in Instance Manager 2.11.0 |
When deploying a configuration with a certificate and key handled by NGINX Management Suite to a custom file path, it may deploy a duplicate copy of the certificate and key to the default /etc/nginx/ path. When deleting the certificate and key, it will only delete the certificate and key in the custom path, leaving the duplicate copy.
Manually delete the certificate and key from the /etc/nginx/ path.
| Issue ID | Status |
|---|---|
| 42217 | Open |
The list of Threat Campaigns will disappear when scrolling down, preventing the selection of the oldest versions.
Threat Campaign versions can be published with the API using the route: api/platform/v1/security/publish
| Issue ID | Status |
|---|---|
| 42219 | Fixed in Instance Manager 2.11.0 |
When installing the Metrics module on Red Hat 9, the following error will prevent it from finishing:
warning: Signature not supported. Hash algorithm SHA1 not available.
error: /tmp/nginx_signing.key: key 1 import failed.
Failed to import nginx signing key. exiting.Before installation, run the following command:
sudo update-crypto-policies --set DEFAULT:SHA1After installation, we recommend you return the default to a more secure algorithm such as SHA256.
| Issue ID | Status |
|---|---|
| 42598 | Fixed in Instance Manager 2.10.1 |
Sometimes, valid licenses for NGINX Management Suite are incorrectly identified as invalid when uploaded. As a result, you may not be able to access features that require a valid license.
| Issue ID | Status |
|---|---|
| 42932 | Fixed in Instance Manager 2.12.0 |
Configuration deployments that reference the log bundle for Security Monitoring (app_protect_security_log "/etc/nms/secops_dashboard.tgz" syslog:server=127.0.0.1:514;), may fail with an error message similar to the following:
: error while retrieving Nginx App Protect profile bundle secops_dashboard info for NAP version 4.279.0: Not Found. Please create it firstOn the NGINX Management Suite host, restart platform services:
sudo systemctl restart nms| Issue ID | Status |
|---|---|
| 42999 | Fixed in Instance Manager 2.12.0 |
The Disk Usage metric on the Metrics Summary page averages disk usage across all the partitions instead of summing it.
April 06, 2023
| Issue ID | Status |
|---|---|
| 43031 | Fixed in Instance Manager 2.14.0 |
When you use OIDC-based authentication in NGINX Management Suite, if the identity provider (IdP) sends an email address with an invalid format, users will be unable to access the list of Users through the web interface or API.
To resolve this issue, please update the email addresses in your identity provider and ensure that all addresses are properly formatted. Once the email addresses are correctly formatted, users will be able to view the list of Users in the NGINX Management Suite.
March 21, 2023
| Issue ID | Status |
|---|---|
| 41157 | Fixed in Instance Manager 2.10.0 |
Attempting to install NGINX Agent on FreeBSD fails with an error message: "error 2051: not implemented."
If you are using FreeBSD, you can download the NGINX Agent from https://github.com/nginx/agent/releases/tag/v2.23.2 or use a previously installed version.
| Issue ID | Status |
|---|---|
| 41557 | Fixed in Instance Manager 2.9.1 |
After upgrading to Instance Manager 2.9.0, the system may display a "URI malformed" error if you use the web interface to edit a staged configuration or nginx.conf that contains special characters, such as underscores ("_").
January 30, 2023
| Issue ID | Status |
|---|---|
| 39760 | Fixed in Instance Manager 2.9.0 |
On the Instances overview page, long hostnames may overlap and interfere with the visibility of the text in the Type column that displays the NGINX type and version.
Select the hostname to open the instance details page to view the full information.
| Issue ID | Status |
|---|---|
| 40020 | Fixed in Instance Manager 2.9.0 |
The default Attack Signature might be unavailable for publishing from Instance Manager, even though it is listed on the web interface. Attempting to publish this Attack Signature results in the error message "Error publishing the security content: attack signature does not exist."
Download another (latest recommended) version of the Attack Signature and publish it. Attack Signature 2019.07.16 should be removed from the list when you refresh the web interface.
| Issue ID | Status |
|---|---|
| 40085 | Fixed in Instance Manager 2.9.0 |
If you’ve published new policies by updating the nginx.config file, using the Instance Manager REST API, or through the web interface, you may not see the policy when you initially select Assign Policy and Signature Versions on the Policy Detail page.
To fix this issue, return to the Policy Detail page and select Assign Policy and Signature Versions again.
| Issue ID | Status |
|---|---|
| 40396 | Fixed in Instance Manager 2.8.0 |
If you use CentOS 7, RHEL 7, or Amazon Linux 2 and you have configured auto-downloads for new new Attack Signatures or Threat Campaigns in Instance Manager, you may encounter an error similar to the following example when attempting to publish an NGINX App Protect WAF policy:
{
"error_message": "Data::MessagePack->unpack: parse error",
"completed_successfully": false,
"componentVersions": {
"wafEngineVersion": "10.179.0"
},
"event": "configuration_load_failure"
}This issue is related to bug 39563 and has the same workaround.
| Issue ID | Status |
|---|---|
| 40484 | Fixed in Instance Manager 2.9.0 |
After enabling the precompiled_publication setting in the nginx-agent.conf file, you may encounter the following error when attempting to publish NGINX App Protect policies to an instance:
{"instance:6629a097-9d91-356a-bd70-de0ce846cf2b":"unsupported file type for Nginx App Protect. Please use Nginx App Protect JSON file"}.If this happens, the Precompiled Publication setting will be reverted to false/blank on the instance’s detail page in the NGINX Management Suite web interface.
- Log in to the instance you’re trying to publish the NGINX App Protect policies to and check if directory /etc/nms exists:
If directory /etc/nms doesn’t exist, please create it first.
bash sudo mkdir /etc/nms sudo chown root:nginx-agent /etc/nms - Change the precompiled_publication setting in nginx-agent.conf to false
sudo vi /etc/nginx-agent/nginx-agent.conf - Restart nginx-agent
sudo systemctl restart nginx-agent - Change the precompiled_publication setting in nginx-agent.conf to true
sudo vi /etc/nginx-agent/nginx-agent.conf - Restart nginx-agent
sudo systemctl restart nginx-agent
The instance on the NGINX Management Suite’s Instance Details page should show Precompiled Publication as enabled.
| Issue ID | Status |
|---|---|
| 41328 | Fixed in Instance Manager 2.9.0 |
Upgrading the NGINX Management Suite could result in the removal of your OIDC configuration, which would prevent users from being able to log in through OIDC.
Prior to upgrading, we recommend that you back up your configuration files and the platform proxy.
December 20, 2022
| Issue ID | Status |
|---|---|
| 39431 | Fixed in Instance Manager 2.9.0 |
When attempting to upgrade Instance Manager on a Debian-based system, the command sudo apt-get update may return the error “public key is not available,” preventing the NGINX Agent from being updated. To resolve this issue, you need to update the public key first.
To manually update the public key, take the following steps:
-
Download a new key from the NGINX Management Suite host:
-
secure
curl https://<NMS_FQDN>/packages-repository/nginx-signing.key | gpg --dearmor | sudo tee /usr/share/keyrings/nginx-signing.gpg >/dev/null -
insecure:
curl -k https://<NMS_FQDN>/packages-repository/nginx-signing.key | gpg --dearmor | sudo tee /usr/share/keyrings/nginx-signing.gpg >/dev/null
-
-
Update the
nginx-agent.listfile to reference the new key:printf "deb [signed-by=/usr/share/keyrings/nginx-signing.gpg] https://<NMS_FQDN>/packages-repository/deb/ubuntu `lsb_release -cs` agent\n" | sudo tee /etc/apt/sources.list.d/nginx-agent.list
| Issue ID | Status |
|---|---|
| 41327 | Fixed in Instance Manager 2.10.0 |
On RHEL9 with the SELinux policy loaded, NGINX Management Suite may report the following errors when starting:
ausearch -m AVC,USER_AVC,SELINUX_ERR,USER_SELINUX_ERR -ts recent
type=AVC msg=audit(1678828847.528:6775): avc: denied { watch } for pid=53988 comm="nms-core" path="/var/lib/nms/modules" dev="nvme0n1p4" ino=50345930 scontext=system_u:system_r:nms_t:s0 tcontext=system_u:object_r:nms_var_lib_t:s0 tclass=dir permissive=0If you encounter any of the errors mentioned above, you can attempt to rebuild and reload the NGINX Management Suite policy. To do so, follow these steps:
-
Copy the
nms.teandnms.fcfiles to a directory on your target machine. -
Change to the directory where you copied the
nms.teandnms.fcfiles. -
Rebuild the
nms.ppfile:make -f /usr/share/selinux/devel//Makefile nms.pp -
Remove any existing NGINX Management Suite policy:
sudo semodule -r nms -
Install the new policy:
sudo semodule -n -i nms.pp -
To finish installing the NGINX Management Suite policy, follow the remaining instructions from the package manager output and restart the NGINX Management Suite services:
sudo systemctl restart nms -
After 10 minutes, check there are no more SELinux errors:
sudo ausearch -m avc --raw -se nms -ts recent
November 17, 2022
| Issue ID | Status |
|---|---|
| 36265 | Open |
References to external files in a policy are not supported.
For example, in the F5 WAF for NGINX JSON declarative policy, these references are not supported:
- User-defined signatures - " not supporting for a while" @dan
- Security controls in external references
- Referenced OpenAPI Spec files
| Issue ID | Status |
|---|---|
| 37705 | Fixed in Instance Manager 2.11.0 |
When viewing the NGINX Plus usage in Instance Manager, the graph displaying usage over time requires several hours of data before displaying the count.
The data presented in the graph can be retrieved from the API.
| Issue ID | Status |
|---|---|
| 38589 | Fixed in Instance Manager 2.7.0 |
When using the NMS Instance Manager Helm upgrade command on a multi worker node kubernetes cluster setup, the core, dpm and integrations deployments may fail to upgrade.
Post upgrade, do the following steps:
kubectl -n nms scale –replicas=0 deployment.apps/dpm; kubectl -n nms scale –replicas=1 deployment.apps/dpm kubectl -n nms scale –replicas=0 deployment.apps/core; kubectl -n nms scale –replicas=1 deployment.apps/core kubectl -n nms scale –replicas=0 deployment.apps/integrations; kubectl -n nms scale –replicas=1 deployment.apps/integrations
| Issue ID | Status |
|---|---|
| 39563 | Fixed in Instance Manager 2.8.0 |
If you are trying to publish an NGINX App Protect WAF policy after adding a new Attack Signature or Threat Campaign to Instance Manager, either through the security/attack-signatures or security/threat-campaigns API endpoints, or by enabling auto-downloads of signatures and threat campaigns, you may encounter an error similar to the following:
{
"error_message": "Data::MessagePack->unpack: parse error",
"completed_successfully": false,
"componentVersions": {
"wafEngineVersion": "10.179.0"
},
"event": "configuration_load_failure"
}Example error output in /var/log/nms:
Feb 6 18:58:58 ip-172-16-0-23 <INT>: 2023-02-06T18:58:58.625Z#011[INFO] #011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:261#011starting compilation for compilation request identified by the fields - policy UID (19fa1ed0-c87d-4356-9ab0-d250c3b630f3), compiler version (4.2.0), attack signatures version (2022.10.27), threat campaigns version (2022.11.02), global state UID (d7b6b5b4-6aa6-4bd7-a3e2-bfaaf035dbe0)
Feb 6 18:58:58 ip-172-16-0-23 <INT>: 2023-02-06T18:58:58.625Z#011[DEBUG]#011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:294#011performing pre compilation
Feb 6 18:58:58 ip-172-16-0-23 <INT>: 2023-02-06T18:58:58.625Z#011[DEBUG]#011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:588#011Updating attack signatures from 2019.07.16 to 2022.10.27
Feb 6 18:58:58 ip-172-16-0-23 <INT>: 2023-02-06T18:58:58.643Z#011[DEBUG]#011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:487#011copying the files for attack signature 2022.10.27
Feb 6 18:58:58 ip-172-16-0-23 <INT>: 2023-02-06T18:58:58.644Z#011[DEBUG]#011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:515#011successfully copied over attack signatures version 2022.10.27 to compiler 4.2.0
Feb 6 18:58:58 ip-172-16-0-23 <INT>: 2023-02-06T18:58:58.644Z#011[INFO] #011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:639#011executing the following pre compilation command - /opt/nms-nap-compiler/app_protect-4.2.0/bin/config_set_compiler --update-signatures
Feb 6 18:59:02 ip-172-16-0-23 <INT>: 2023-02-06T18:59:02.750Z#011[INFO] #011b5c8de8a-8243-4128-bc8f-5c02ea8df839+1675709938565522240#011compiler-controller/compiler.go:642#011stdout and stderr produced from the pre compilation command '/opt/nms-nap-compiler/app_protect-4.2.0/bin/config_set_compiler --update-signatures':
Feb 6 18:59:02 ip-172-16-0-23 <INT>: --- stdout ---
Feb 6 18:59:02 ip-172-16-0-23 <INT>: {"error_message":"Data::MessagePack->unpack: parse error","completed_successfully":false,"componentVersions":{"wafEngineVersion":"10.179.0"},"event":"configuration_load_failure"}
Feb 6 18:59:02 ip-172-16-0-23 <INT>: --- stderr ---Download the attack-signatures and/or threat-campaigns packages for CentOS 7, RHEL 7, or Amazon Linux 2 from the NGINX repo directly to your Instance Manager host by following the instructions in the official NGINX App Protect documentation:
After downloading the attack-signatures and/or threat-campaigns packages onto your Instance Manager host, give Instance Manager about 15 seconds to recognize these packages.
If the logging level is set to debug, you should see the following logs that confirm a successful installation:
Feb 6 20:35:17 ip-172-16-0-23 <INT>: 2023-02-06T20:35:17.174Z#011[DEBUG]#011nms-integrations #011compiler-controller/security_updates_monitor.go:256#011detected change in attack signature files [/opt/app_protect/var/update_files/signatures/signatures.bin.tgz /opt/app_protect/var/update_files/signatures/signature_update.yaml /opt/app_protect/var/update_files/signatures/version]... syncing
Feb 6 20:35:17 ip-172-16-0-23 <INT>: 2023-02-06T20:35:17.175Z#011[DEBUG]#011nms-integrations #011compiler-controller/security_updates_monitor.go:307#011downloading attack signatures version - 2023.01.26
Feb 6 20:35:17 ip-172-16-0-23 <INT>: 2023-02-06T20:35:17.193Z#011[DEBUG]#011nms-integrations #011compiler-controller/security_updates_monitor.go:349#011successfully downloaded attack signatures version - 2023.01.26
Feb 6 20:46:02 ip-172-16-0-23 <INT>: 2023-02-06T20:46:02.176Z#011[DEBUG]#011nms-integrations #011compiler-controller/security_updates_monitor.go:274#011detected change in threat campaign files [/opt/app_protect/var/update_files/threat_campaigns/threat_campaigns.bin.tgz /opt/app_protect/var/update_files/threat_campaigns/threat_campaign_update.yaml /opt/app_protect/var/update_files/threat_campaigns/version]... syncing
Feb 6 20:46:02 ip-172-16-0-23 <INT>: 2023-02-06T20:46:02.176Z#011[DEBUG]#011nms-integrations #011compiler-controller/security_updates_monitor.go:370#011downloading threat campaigns version - 2023.01.11
Feb 6 20:46:02 ip-172-16-0-23 <INT>: 2023-02-06T20:46:02.191Z#011[DEBUG]#011nms-integrations #011compiler-controller/security_updates_monitor.go:412#011successfully downloaded threat campaigns version - 2023.01.11Once the attack-signatures and/or threat-campaigns packages have been added to the library, you can list them by making a GET request to the corresponding API endpoints.
- attack signatures -
https://{nms-fqdn}/api/platform/v1/security/attack-signatures - threat campaigns -
https://{nms-fqdn}/api/platform/v1/security/threat-campaigns
October 04, 2022
| Issue ID | Status |
|---|---|
| 37479 | Fixed in Instance Manager 2.13.0 |
After upgrading NGINX Management Suite to 2.5.0, when you try to publish a staged config from the web interface, the system returns an error similar to the following:
"The published configuration is older than the active instance configuration."
Make a minor edit to a staged config, such as adding a space, then save the change. You should be able to publish now.
June 30, 2022
| Issue ID | Status |
|---|---|
| 34255 | Open |
NGINX Instance Manager reports metrics at a per-minute interval and includes dimensions for describing the metric data’s characteristics.
An issue has been identified in which metric data is aggregated across all dimensions, not just for existing metrics data. When querying the Metrics API with aggregations like SUM(metric-name), the aggregated data causes the API to over count the metric. This overcounting skews some of the metrics dashboards.
When querying the Metrics API, you can exclude the data for an aggregated dimension by specifying the dimension name in the filterBy query parameter.
filterBy=<dimension-name>!= ''| Issue ID | Status |
|---|---|
| 35172 | Fixed in Instance Manager 2.9.0 |
When NGINX Plus is installed on a datapath instance, then removed and replaced with NGINX OSS, NGINX Instance Manager may incorrectly identify the instance as an NGINX Plus instance. This is due to multiple NGINX entries for the same datapath.
Use NGINX Instance Manager’s NGINX Instances API to remove the inactive NGINX instance. For instructions, refer to the API reference guide, which you can find at https://<NGINX-INSTANCE-MANAGER-FQDN>/ui/docs.
You may need to stop the NGINX Agent first. To stop the NGINX Agent, take the following steps:
sudo systemctl stop nginx-agentDecember 21, 2021
| Issue ID | Status |
|---|---|
| 31081 | Open |
In the web interface, when uploading a config file that’s larger than 50 MB (max size), the system incorrectly reports the state as Analyzing (Status code 403), although the upload failed.
Keep config files under 50 MB.
| Issue ID | Status |
|---|---|
| 31225 | Fixed in Instance Manager 2.7.0 |
After upgrading NGINX to a new version, the NGINX Instance Manager web interface and API report the old NGINX version until the NGINX Agent is restarted.
Restart the Agent to have the new version reflected properly:
systemctl restart nginx-agent