Forum Discussion
Persistence records point to 127.0.0.1:10001
- Jan 19, 2024
It seems that you are using APM based on the 127.0.0.1:10001 entry in the persistence table.
When a user accesses the Virtual Server, during the login procedure, the server communicates with the apd daemon, causing it to automatically enter the persistence table due to the association of a persistence profile with the corresponding VS.
I don't think this IP address "127.0.0.1:10001" is associated with any pool, so its timer will not affect the persistence functionality of the pool member.
- Jan 19, 2024
Those are probably the connections from the local user-space APMD (it implements many of the 3rd party authentication libraries and other stuff that APM uses and does session database CRUD operations to TMM's sessiondb via port 10001), which does occur over a normal socket connection. AFAIK no VSs are used normally.
I wonder why TMM would be getting that traffic and applying persistence in this situation, I'd suppose it would have to match a VS?
You can see all of this in wireshark so probably the next step is to do a port 10001 and ARP packet capture to see what interface is handling it.
It seems that you are using APM based on the 127.0.0.1:10001 entry in the persistence table.
When a user accesses the Virtual Server, during the login procedure, the server communicates with the apd daemon, causing it to automatically enter the persistence table due to the association of a persistence profile with the corresponding VS.
I don't think this IP address "127.0.0.1:10001" is associated with any pool, so its timer will not affect the persistence functionality of the pool member.
- Lucas_ThompsonJan 19, 2024Employee
Those are probably the connections from the local user-space APMD (it implements many of the 3rd party authentication libraries and other stuff that APM uses and does session database CRUD operations to TMM's sessiondb via port 10001), which does occur over a normal socket connection. AFAIK no VSs are used normally.
I wonder why TMM would be getting that traffic and applying persistence in this situation, I'd suppose it would have to match a VS?
You can see all of this in wireshark so probably the next step is to do a port 10001 and ARP packet capture to see what interface is handling it.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com