Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

iRules LX Logger Class

In version 13.1, the ILXLogger class was added to expand the ability to log from iRules LX. The API details have been added to to the wiki but in this article, I’ll add context and an example to boot. Let’s get to it! The first step is... Read more
2 Reviews

Verifying Local Traffic Policy and iRule Precedence

The BIG-IP platform has had Tcl-based iRules since the initial v9 release back in 2004. When version 11.4 released, the HTTP class was deprecated in favor of local traffic policies. The policies provide access to inspect and act on ingress and... Read more
Average Rating: 4.9
3 Reviews

Handling HTTP Requests on an HTTPS Virtual Server

There are scenarios where it might be prudent to support HTTP request redirection on a single port, and thus, a single virtual server. Yes, this can be done with the alias port zero, but that locks all other ports down unless you plan to build out... Read more
1 Review

DevCentral's Featured Member for July - Rhazi Youssef

Our Featured Member series is a way for us to show appreciation and highlight active contributors in our community. Communities thrive on interaction and our Featured Series gives you some insight on some of our most active folks. Rhazi Youssef... Read more
Average Rating: 4.9
4 Reviews

DevCentral's Featured Member for June - Jie Gao

Our Featured Member series is a way for us to show appreciation and highlight active contributors in our community. Communities thrive on interaction and our Featured Series gives you some insight on some of our most active folks. Jie Gao is a... Read more
0 Reviews

DevCentral's Featured Member for April - Daniel Varela

Our Featured Member series is a way for us to show appreciation and highlight active contributors in our community. Communities thrive on interaction and our Featured Series gives you some insight on some of our most active folks. Daniel Varela... Read more
0 Reviews

Increased Security With First Party Cookies

HTTP cookies are an essential part of many web based applications, useful for tracking session and state information.  But they can also be exploited to leak information to third party sites using a method known as Cross Site Request... Read more
0 Reviews

How to Set up F5 Application Connector

Last week we covered the basic overview of Application Connector and this week we’ll look at how to set it up. [The link to the setup guide] Settle in, this is detailed. F5 Application Connector is made up of two components: The Proxy and the... Read more
1 Review

Oracle Tuxedo "JOLTandBLEED" vulnerability (CVE-2017-10269)

In November 2017 Oracle published a vulnerability in the Jolt Server which is a component of Oracle Tuxedo. Just recently, a PoC exploit for this vulnerability has been published. Using the JOLT protocol, attackers could send specially crafted... Read more
0 Reviews

DevCentral's Featured Member for February - Lee Sutcliffe

After a brief hiatus for the New Year, we're kicking off the 2018 Featured Member series with a new DevCentral MVP: MrPlastic, Lee Sutcliffe. Like Kevin this past December, Lee does a great job with the opening question, so we'll let him... Read more
Average Rating: 4.9
3 Reviews

F5 Editor Eclipse Plugin v2

We are pleased to announce availability of our updated F5 Programmability Editor for Eclipse IDE v2. The F5 Programmability Development Environment for Eclipse allows you to use the Eclipse IDE to manage iRules, iRules LX, iControl LX, and iApps... Read more
2 Reviews

What is HTTP Part IX - Policies and iRules

In this article we pivot slightly from describing the protocol itself to showing ways to interact with the HTTP protocol via iRules and local traffic policies... Read more
0 Reviews

iRule Execution Tracing and Performance Profiling, Part 3

This article answers some frequently asked questions about the iRules tracing feature and offers some suggestions on best practices. Read more
1 Review

iRule Execution Tracing and Performance Profiling, Part 2

This article continues the introduction of iRules tracing and profiling feature. It uses examples to describe how to configure and run the feature. Read more
2 Reviews

DevCentral's Featured Member for December - Kevin Davies

When we prepare for our Featured Member series, I typically send out a questionnaire and the DevCentral member writes out their answers. With the opening question I'll do a bit of editing and use that for the intro. This month however,... Read more
2 Reviews

Mitigate L7 DDoS with BIG-IP ASM

Today, let’s look at a couple ways to mitigate a DDoS attack with BIG-IP ASM. We’ve logged into a BIG-IP ASM and navigated to Security>DDoS Protection>DDoS Profiles. In the General Settings of Application Security, we’ll activate an... Read more
1 Review

iRule Execution Tracing and Performance Profiling, Part 1

This article is the first of a series to introduce a new iRule feature in BIP-IP v13.1 release, iRule execution tracing and performance profiling. Read more
Average Rating: 4.7
4 Reviews

Post of the Week: Replacing a String in the Request URI

In this week’s Post of Week, I address community member Shann_P’s question on how to make an iRule update a string at a specific location within the path of the URI: The iRule needs to be able to locate the 7th "chunk" of the URI, add a... Read more
0 Reviews

Post of the Week: Blocking a Specific URI

In this "Post of the Week" video, we show how to block a specific URI using a custom ASM signature and an iRule. Read more
1 Review

NetOps is on the Move and You Can Help Give it Directions

For three years now, my cohort Cindy Borovick and I have been tracking the app services, trends, and technology that ultimately shape the lives of folks in the trenches. It sometimes takes a while (almost ten years for cloud) before the winds of... Read more
1 Review

Post of the Week: HTTP Redirect using Datagroups

John discusses HTTP redirects using datagroups and iRules. Read more
Average Rating: 4.9
4 Reviews

DevCentral’s Featured Member for September – Rob Carr

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time... Read more
2 Reviews

Tightening the Security of HTTP Traffic Part 2

This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and  iRules to include the latest HTTP security headers to all HTTP responses. Read more
Average Rating: 4.5
3 Reviews

Tightening the Security of HTTP Traffic part 1

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications. Read more
Average Rating: 4.9
10 Reviews

Office 365 Logon Enhancement – Username Capture

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice! Read more
Average Rating: 4.9
3 Reviews