Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Ruby on Rails Arbitrary File Read (CVE-2019-5418)

Posted March 25, 2019 by Gal Goldshtein

A vulnerability recently discovered in the Ruby on Rails web framework may allow attackers to read arbitrary files from the server file system by sending a request that contains a specially crafted Accept header. The Rails application will be... Read more

F5 Services in a CI/CD pipeline

Posted March 25, 2019 by nicolas menant

This article shows you how it is possible to integrate F5 services in a CI/CD pipeline. It will provide a demo of such a scenario Read more

DevSecCon Singapore Survey Results and Trip Recap

Posted March 21, 2019 by LHubertus

Survey results and trip recap from DevSecCon Singapore (Feb 28-Mar 1, 2019). Read more

Technical Article

Containers: plug-and-play code in DevOps world - part 1

Posted March 21, 2019 by Rodrigo Albuquerque

Understand what containers are at a high level Read more

Authenticating Kubernetes Demo

Posted March 20, 2019 by Eric Chen

Please enjoy our demonstration of Kubernetes API/Dashboard authentication with BIG-IP using mTLS, Basic Auth (Username/Password), and OAuth Tokens.  This illustrates how BIG-IP Access Policy Manager (APM) can securely authenticate to Kubernetes. Read more

Real Attack Stories: Bank Gets DDoS Attacked

Posted March 18, 2019 by John Wagnon

One of our Silverline SOC customers (a financial institution) got attacked with a Distributed Denial of Service attack, and our Silverline SOC saved the day. This attack was highly distributed... Read more

Support Your Local User Groups

Posted March 14, 2019 by John Wagnon

We interact online every day here at DevCentral, but it's especially nice to interact in person with all of you whenever we get the chance.  I had the pleasure of attending and speaking at several local user groups over the past two weeks... Read more

DevOps Explained to the Layman

Posted March 11, 2019 by Rodrigo Albuquerque

DevOps Explained to non-Developers Read more

Answers / discussion

iRule Event Order - HTTP

Asked 11/8/2013

by What Lies Beneath

23 Votes

OpenSSL and Heart Bleed Vuln

Asked 4/7/2014

by squip

21 Votes

TCP Traffic Path Diagram

Discussed 5/13/2014

by What Lies Beneath

14 Votes

F5 Big IP File Locations

Asked 8/24/2009

by JohnCzerwinski

10 Votes

APM with google authenticator

Discussed 7/9/2016

by Patrik Jonsson

8 Votes

A Protocol Profiler In a Few iRules

Discussed 11/12/2014

by Thomas Schockaert

8 Votes