Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


articleadnbig-ipnewstechtip December 27, 2011 by Colin Walker
The iRules CodeShare on DevCentral is an amazingly powerful, diverse collection of iRules that perform a myriad of tasks ranging from credit card scrubbing to form based authentication to, as in today's example, limiting the number of HTTP sessions allowed. While the codeshare is outstanding, it is a collection of code that has been contributed over the last several years. As such, some of it is written for older versions, like 9.x, where we didn't have some of the powerful, efficient commands a...
BIG-IP LTM supports internal and external classes (called Data Groups in the GUI) of address, string, and integer types.  An internal class is stored in the bigip.conf file, whereas external classes are split between the bigip.conf and the file system (the class itself is defined in the bigip.conf file, but the values of the class are stored in the file system in a location of your choice, though /var/class is the location defined for synchronization in the cs.dat file)  Which flavor?&...
The concept of a friendly URL is a pretty simple one. Basically you want to make things in your application, on your website, etc. easier to access. This stems from the fact that most applications these days make use of increasingly complex paths for a multitude of reasons. Whether it’s user specific content, auto generated pages or otherwise, typing in a URL that looks like “http://domain.com/a7391/users/0928179/events/live/release/20110403/regions.php?region=atl” isn’t ...
articledevnewstechtip January 24, 2011 by Colin Walker
Welcome to the series in which we tear apart an iRule line by line to see what’s really going on.  What is iRule::ology, you ask?     i·Rule·ol·o·gy      –noun, plural -gies. 1.The derivation, that is, the study of the origin of, an iRule 2. An account of the history, purpose and creation of a particular iRule 3. The study of  an iRule, simple or advanced, in hopes of completely and totally understanding the functionality, intended purpose, a...
articleirulesbig-ipdevnewstechtip September 14, 2010 by Jason Rahm
It’s commonplace in IT departments to stay on top of system patches and upgrades.  There are internally developed standards as well as industry-defined processes (ITIL for example) that assist in managing the infrastructure.  Is this true with product configuration as well within your organization?  Each new release of product X undoubtedly introduces a different way of accomplishing the same goals.  Sometimes this is due to a bug resolution, and sometimes it’s to take advant...
Sometimes I need to log information from iRules to debug something. So I add a simple log statement, like this: when HTTP_REQUEST {   if { [HTTP::uri] equals "/secure" } {     log local0. "[IP::remote_addr] attempted to access /secure"   } } This is fine, but it clutters up the /var/log/ltm log file. Ideally I want to log this information into a separate log file. To accomplish this, I first change the log statement to incorporate a custom str...
I recently completed a successful major LTM hardware and software migration which accomplished two high-level goals: ·         Software upgrade from v9.3.1HF8 to v10.1.0HF1 ·         Hardware platform migration from 6400 to 6900   I encountered several problems during the migration event that would have stopped me in my tracks had I not (in most cases) encountered them already during my te...
In this second offering from Joe Malek’s delve into some advanced configuration concepts, and more specifically the logging and reporting world, we take a look at the vendors that he investigated, what they offer, and how they integrate with F5 products.  He discusses some of the capabilities of each, their strengths and weaknesses and some of the things you might use each for. If you’ve been wondering what your options are for more in-depth log analysis and reporting, take a look to see wh...
articledevnewstechtip October 01, 2009 by Jason Rahm
Beginning in version 10, the snmp mibs provide pre-calculated cpu utilization percentages for 5 second, 1 minute, and 5 minute intervals.  This eases the processing burden on the Cacti end, as with these oid we only need to reach out once per interval for data from the BIG-IP.  I'm getting ahead of myself, though.  We've created a data query with an indexed SNMP data query file in an earlier tech tip, this time we'll create a scripted data input method. SNMP MIB Infor...
Remote authorization for ldap was first introduced in version 9.4.  Now, however, in v10, the feature has been expanded to include radius and tacacs+.  In this article, I'll walk through the tacacs+ server configuration and the remoterole configuration on the BIG-IP required to get remote authorization working. Remote Roles Before we get to the configuration steps, we need to look at the remoterole requirements.  There are two approaches you can take.  You can configure...
Page 1 of 3First   Previous   [1]  2  3  Next   Last