Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


articleadnbig-ipnewstechtip November 17, 2011 by George Watkins
Introduction Recently there was a forum post regarding using the exponential backoff algorithm to prevent or at the very least slow down dictionary attacks. A dictionary attack is when a perpetrator attacks a weak system or application by cycling through a common list of username and password combinations. If were to leave a machine connected Internet with SSH open for any length of time, it wouldn’t take long for an attacker to come along and start hammering the machine. He’ll go through his l...
articlestoragenewstechtip October 13, 2011 by Reinhard Frumm
Introduction This script imports existing Netapp Snapshots (hourly, nightly or weekly) into an ARX Managed Volume (for CIFS). The script reads the existing snapshots on the filer and generates an ARX command line script to incorporate the filer based snapshots into an existing ARX Managed Volume. Then clients can access snapshots via CIFS that were created before ARX was installed. What the Script Does The ARX Managed Snapshot feature can present snapshots, checkpoints, and volume shado...
The BIG-IP persistence cookie is a valuable configuration option that allows stateful applications to remain persistent to a specific node with no additional configurations within the application or on the server(s) by doing something like clustering. I hear application development teams refer to this as “sticky session” or “stick sessions”, but in reality this cookie has nothing to do with a user’s “application” session, but has everything to do with t...
articleirulesbig-ipdevnewstechtip April 06, 2011 by Joe Pruitt
This is the third article in a series on building link tracking functionality with iRules.  The previous articles were Link Tracking With iRules - Part 1 Link Tracking With iRules - Part 2 - Filtering Results In the first article, I focused on building the core link tracking logic and in the second I added the logic to implement a simple output filter to only list the URI’s you are interested in seeing the statistics for.  In this article I will build on additional funct...
Overview If you’re like most of our customers, you’re probably offloading SSL on your BIG-IPs. There is a large performance benefit to this PKI management strategy, but there is also the simplicity of being able to create, update, and manage SSL certificates at one strategic point of control. Using Ruby and iControl, we can take this one step further by allowing creation or updating of private keys and CSRs (certificate signing request) from one’s workstation. This can be a gr...
iRule performance has long been a question our users have asked about.  We get questions all the time about how to determine what impact a specific iRule has on the normal operation of the BIG-IP’s they are running on.  The question is a hard one to answer as we rarely see two iRules that are the same and the mere fact that you can code your iRule however you want, makes it very hard to provide info on the impact they would have in a generic manner. A while back we wrote a tech tip on...
This is the fifth article in the “Java iControl Objects” series in which I define a set of objects that implement the iControl methods in various iControl interfaces.  The previous articles covered the LocalLB Rule, Pool and PoolMember as well as the System Service interfaces. Java iControl Objects – System Service Java iControl Objects – LTM Pool Java iControl Objects – LTM PoolMember Java iControl Objects – LTM Rule For this article, I’m going to move to a different int...
articleirulesbig-ipisvdevnewstechtip November 03, 2010 by Joe Pruitt
In my previous article titled Session Table Exporting With iRules, I posted an example iRule that will allow you to export your session table entries for archival purposes.   If you are reading this and have no clue what the session table is, you’ll want to read the series titled “The Table Command” where we walk through all the ins and outs of accessing the session data table. As I mentioned on a recent podcast, I’ve been planning on adding to that tech tip by including the ability t...
This is the third article in the “Java iControl Objects” series in which I define a set of objects that implement the iControl methods in various iControl interfaces.  The previous articles covered the Pool and PoolMember interface. Java iControl Objects – LTM Pool Java iControl Objects – LTM PoolMember  For this article, I’ve decided to look at the LocalLB Rule interface where you manage the creation of iRules on your BIG-IP LTM.  For those that aren’t familiar with iR...
This is the second article in the “Java iControl Objects” series in which I define a set of software objects that implement the iControl methods in various iControl interfaces.  In my last article, I defined the LocalLB Pool class where you could define your application pools of servers and control attributes on any given pool.  In that article I mentioned that I couldn’t do the PoolMember class without having a Pool defined first.  So, since the Pool is there, this article will f...
Page 1 of 2First   Previous   [1]  2  Next   Last