Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results
Average Rating: 4.9
3 Reviews

Containers: plug-and-play code in DevOps world - part 2

Following Part1, this is a short hands-on lab test showing how to containerise your application using Docker. Read more
Average Rating: 4.9
3 Reviews

Apache Tomcat Remote Code Execution on Windows (CVE-2019-0232)

Apache Tomcat Remote Code Execution on Windows On 10th of April, information regarding a Remote Code Execution (RCE) vulnerability in Apache Tomcat was published.  Apache Tomcat, often referred to as Tomcat Server, is an open-source Java... Read more
0 Reviews

Building Trust with Service Mesh

The Istio Service Mesh is built on a “zero-trust network”; but how do you ensure that you can trust Istio? When trusted and untrusted services are co-mingled in a single Kubernetes cluster it can be challenging to secure outbound communicati... Read more
1 Review

Python SDK Cookbook: Encoding URLs and Using Proxies

Every now and then I get an inquiry if the Python SDK can do something I haven't personally used or seen a need for. In this article, I'll cover two such use cases: encoding URLs and using proxies to connect to BIG-IP. Both of these... Read more
1 Review

Simple BIG-IP to BIG-IP, On-prem to Public Cloud IPsec Configuration Guide

Hybrid infrastructure models are nothing new, they just happen to be the reality that most enterprises find themselves in today. Whether it’s compliance/data security that necessitates splitting workloads and/or data, or just a desire to build a... Read more
0 Reviews

Manage Infrastructure and Services Lifecycle with Terraform and Ansible + Demo

In this demo, we will use tools like Terraform, Ansible and F5 AS3 to show how we can do Infrastructure as Code (IaC): How can you manage the lifecycle of your infrastructure and services through automation and orchestration Read more
1 Review

Infrastructure as Code: AWS Cloud Formation, Ansible, and F5 AS3 Basics

This is a simple configuration example to show you the basics of integrating Ansible, Amazon Web Services Cloud Formation, and F5’s AS3 Declarative interface to create an ‘infrastructure-as-code’ BIG-IP implementation. Read more
2 Reviews

How Malware Evades Detection

Malware loves encryption since it can sneak around undetected. F5Labs 2018 Phishing & Fraud Report explains how malware tricks users and evades detection. With the cloning of legitimate emails from well-known companies, the quality of phishing... Read more
1 Review

Lightboard Lesson: What is vCMP?

F5's Virtual Clustered Multiprocessing, or vCMP for short, is virtualization technology that couples a custom hypervisor running on the BIG-IP host with a hardware-specific scalable number of guest virtual machines running TMOS. This article... Read more
1 Review
Average Rating: 4.9
5 Reviews

Ruby on Rails Arbitrary File Read (CVE-2019-5418)

A vulnerability recently discovered in the Ruby on Rails web framework may allow attackers to read arbitrary files from the server file system by sending a request that contains a specially crafted Accept header. The Rails application will be... Read more
0 Reviews

F5 Services in a CI/CD pipeline

This article shows you how it is possible to integrate F5 services in a CI/CD pipeline. It will provide a demo of such a scenario Read more
0 Reviews

DevSecCon Singapore Survey Results and Trip Recap

Survey results and trip recap from DevSecCon Singapore (Feb 28-Mar 1, 2019). Read more
2 Reviews
Average Rating: 4.9
4 Reviews

Authenticating Kubernetes Demo

Please enjoy our demonstration of Kubernetes API/Dashboard authentication with BIG-IP using mTLS, Basic Auth (Username/Password), and OAuth Tokens.  This illustrates how BIG-IP Access Policy Manager (APM) can securely authenticate to Kubernetes. Read more
1 Review

Real Attack Stories: Bank Gets DDoS Attacked

One of our Silverline SOC customers (a financial institution) got attacked with a Distributed Denial of Service attack, and our Silverline SOC saved the day. This attack was highly distributed... Read more
2 Reviews

Support Your Local User Groups

We interact online every day here at DevCentral, but it's especially nice to interact in person with all of you whenever we get the chance.  I had the pleasure of attending and speaking at several local user groups over the past two weeks... Read more
Average Rating: 4.9
9 Reviews

DevOps Explained to the Layman

DevOps Explained to non-Developers Read more
Average Rating: 5.0
24 Reviews
0 Reviews

HTTP/2 Protocol in Plain English using Wireshark

A quick HTTP/2 lab test using BIG-IP VE, one client and Wireshark Read more
Average Rating: 5.0
18 Reviews

Mitigating Ruby YAML.load Universal RCE Deserialization Gadget with BIG-IP ASM

Recently a new YAML deserialization gadget was published that may lead to arbitrary code execution when deserialized by supplying it to Ruby's YAML.load function as input. Prior to this new gadget it was known that calling YAML.load on... Read more
0 Reviews

Authenticating Kubernetes

How do you know what your external users and services are doing in your Kubernetes cluster? Using BIG-IP Access Policy Manager and Application Security Manager we can create a secure method of... Read more
1 Review

Drupal 8 REST Module Remote Code Execution (CVE-2019-6340)

In the recent days Drupal released a security advisory regarding a new highly critical risk vulnerability affecting Drupal 8 instances. The vulnerability may allow unauthenticated users to execute arbitrary code by forcing the vulnerable Drupal 8... Read more
0 Reviews

Deploy BIG-IP in AWS with HA across AZ’s - without using EIP’s

This article shows how to deploy BIG-IP devices in AWS with HA across Availability Zones (AZ’s), without using any Elastic IP’s (EIP’s). This is a reference architecture for advanced F5 BIG-IP deployments in AWS. Read more
2 Reviews