APM (& LTM) Session & Cookie Information - Chrome Extension

Problem this snippet solves:

If you've ever troubleshooted APM Portal Access issues, you know how annoying it can be to find the decoded internal url.

Note: This extension has been updated as more of an APM and LTM extension as opposed to just an APM one.

This chrome extension seeks to make that quick and easy by showing the decoded information. It will also display the cookies for that site (including the ever-useful

cookies) and allows you to delete cookies directly from the extension (useful for testing session timeout if you delete the MRHSession cookie).

Version History

  • 1.1 - Initial version
    • Includes APM portal access decoded url information
  • 1.2 - 2016.04.01
    • Added list of cookies associated with the current site (shows cookie name, domain and value)
  • 1.3 - 2016.04.25
    • Added ability to delete cookies from the extension for the site (Known Issue: if you have multiple cookies with the same name that match the page, deleting one will delete all of them)
    • Added decoded BIG-IP persistence cookie value in parenthesis to the list for quicker reference
  • 1.4 - 2016.06.30
    • Rebuilt the popup page using AngularJS
    • Introduced (but still disabled) options page and client-side functionality (will need iRules development as well)
  • 1.5 - 2016.09.07
    • Enabled the options page again, and finished code to allow the extension to add a header to requests on specific domains (user specified)
  • 1.5.1 - 2016.09.18
    • Updated the icon, and removed APM and replaced with debugging icon since this has morphed to APM and LTM usefulness
  • 1.6 - 2016.12.19
    • Now enables the extension when it determines a persistence cookie (based on value format)
    • Added a link that will popup APM session details (when management url specified in options page) (Note: must be logged into the management GUI already or else it won't redirect properly). Used alongside my APM Tampermonkey script you can see the session variables as well as the session detail
  • 1.7 - 2017.09.03
    • Added local tracking of sites that appear to use F5 BigIP

How to use this snippet:

As Chrome doesn't really like unpublished extensions, and it's not in the Chrome App Store (yet), you'll have to install the extension in Developer Mode.


  • Navigate to
  • Ensure that the
    Developer mode
    checkbox is enabled
  • Sub-Method 1: Load unpacked extension (preferred method)
    • Download all the code from the Github repository
    • Click the
      Load unpacked extension
      button and select the
  • Sub-Method 2: Load the crx file (may not always be current)
    • Download the crx from the Github repository
    • From the file system, click and drag the
      file onto the extension page to install it

Code :


Tested this on version:

Updated Jun 06, 2023
Version 2.0

Was this article helpful?

No CommentsBe the first to comment