Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology


Sort results

DevSecCon Singapore Survey Results and Trip Recap

Survey results and trip recap from DevSecCon Singapore (Feb 28-Mar 1, 2019). Read more
1 Review

Authenticating Kubernetes Demo

Please enjoy our demonstration of Kubernetes API/Dashboard authentication with BIG-IP using mTLS, Basic Auth (Username/Password), and OAuth Tokens.  This illustrates how BIG-IP Access Policy Manager (APM) can securely authenticate to Kubernetes. Read more
1 Review

Real Attack Stories: Bank Gets DDoS Attacked

One of our Silverline SOC customers (a financial institution) got attacked with a Distributed Denial of Service attack, and our Silverline SOC saved the day. This attack was highly distributed... Read more
2 Reviews

Support Your Local User Groups

We interact online every day here at DevCentral, but it's especially nice to interact in person with all of you whenever we get the chance.  I had the pleasure of attending and speaking at several local user groups over the past two weeks... Read more
Average Rating: 4.9
9 Reviews

DevOps Explained to the Layman

DevOps Explained to non-Developers Read more
Average Rating: 5.0
23 Reviews
0 Reviews

HTTP/2 Protocol in Plain English using Wireshark

A quick HTTP/2 lab test using BIG-IP VE, one client and Wireshark Read more
Average Rating: 5.0
18 Reviews

Mitigating Ruby YAML.load Universal RCE Deserialization Gadget with BIG-IP ASM

Recently a new YAML deserialization gadget was published that may lead to arbitrary code execution when deserialized by supplying it to Ruby's YAML.load function as input. Prior to this new gadget it was known that calling YAML.load on... Read more
0 Reviews

Authenticating Kubernetes

How do you know what your external users and services are doing in your Kubernetes cluster? Using BIG-IP Access Policy Manager and Application Security Manager we can create a secure method of... Read more
1 Review

Drupal 8 REST Module Remote Code Execution (CVE-2019-6340)

In the recent days Drupal released a security advisory regarding a new highly critical risk vulnerability affecting Drupal 8 instances. The vulnerability may allow unauthenticated users to execute arbitrary code by forcing the vulnerable Drupal 8... Read more
0 Reviews

Deploy BIG-IP in AWS with HA across AZ’s - without using EIP’s

This article shows how to deploy BIG-IP devices in AWS with HA across Availability Zones (AZ’s), without using any Elastic IP’s (EIP’s). This is a reference architecture for advanced F5 BIG-IP deployments in AWS. Read more
2 Reviews

F5 Meet-up With The Load Balancer Crew

The Load Balancer Crew is hosting a F5 Meet-Up in San Luis Obispo, California on Friday, March 1.  Come join us!! Read more
Average Rating: 4.9
4 Reviews

2019 DevCentral MVP Announcement

Congratulations to the 2019 DevCentral MVPs! The DevCentral MVP Award is given to a select group of exemplary people in the technical community who actively engage and share their experience and knowledge with others. We recognize their... Read more
Average Rating: 4.9
10 Reviews

iControl REST Cookbook - LTM policy (ltm policy)

This cookbook lists selected ready-to-use iControl REST curl commands for LTM policy related resources. Each receipe consists of the curl command, it's tmsh equivallent, and sample output (default hidden) Read more
2 Reviews

Using the Python SDK with the Flask Web Framework

I received from a member of our fine community on how to make the Python SDK work with the Django web framework. I haven't worked with Django, but I do work with the Flask web framework, which is very bare bones compared to Django, but has a... Read more
0 Reviews

Real Attack Stories: DDoS Against Email Provider

An email service provider was attacked with a DDoS attack that used many different attack types (amplification, flood, etc).  F5 Silverline services were used to mitigate the attack... Read more
2 Reviews

Devopsdays NYC Survey Results and Trip Recap

Why we were there, who we met, and what we learned Read more
1 Review

Troubleshooting Kerberos Constrained Delegation: Strong Encryption Types Allowed for Kerberos

Over the past week, I was approached by two separate customers who happened to be enabling smart card authentication and ran into the same issue with Kerberos Constrained Delegation (KCD).  While this was a rare coincidence, over the past few... Read more
2 Reviews

Lightboard Lessons: Be Ready...DNS Flag Day is Coming!

February 1, 2019 is DNS Flag Day. This day could be catastrophic to your website if you don't have the appropriate configurations in place for your DNS servers... Read more
Average Rating: 4.9
5 Reviews

State of Application Services 2019: Cloud and DevOps influencing NetOps

It has been noted, by yours truly, that cloud is not finished disrupting the data center. That is particularly true within IT, for roles across all four operational concerns: network, security, storage, and infrastructure. In our dive into the... Read more
0 Reviews

F5 Rules for AWS WAF - Rule ID to Attack Type Reference

F5 offers security solutions for AWS customers who use the platform's hosting and load balancing services along with the AWS WAF offering. Read more
0 Reviews

Creating iRules LX via iControl REST

This article describes a method to create a working iRules LX instance completely remotely via the iControl REST framework. Read more
2 Reviews

Mitigating Fortnite Vulnerabilities with BIG-IP ASM

A recently published research by Checkpoint introduced a couple of undiscovered vulnerabilities in the online gaming platform of “Epic Games” – the developers of the famous "Fortnite" game. It was claimed in the research paper that a... Read more
1 Review

Lightboard Lessons: Choosing Strong vs Weak Ciphers

When you configure TLS cipher suites, you have a lot to choose from.  But, what should you look for when choosing these cipher suites?  And, what should you stay away from... Read more
2 Reviews

F5 SSL Orchestrator and FireEye NX Integrated Solution

Blind SpotsIt is nearly impossible to defend against an attack you cannot see. Increased adoption of TLS/SSL is helping organizations secure IP communications between users and web services through encryption. But increased use of encryption also... Read more
0 Reviews