Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

irules

iRules is a highly customized, Tcl-based scripting language allowing you complete programmatic access to application traffic in real time. If you’re looking to inspect, analyze, modify, route, re-direct, discard, or manipulate traffic in any way, chances are you can do it with an iRule. They even give you the ability to write business logic into your network layer.

Learn more

Articles

Jibin
Updated 3 days ago by Jibin
5 out of 5 stars

This article answers some frequently asked questions about the iRules tracing feature and offers some suggestions on best practices.

Jibin
Updated 1 week ago by Jibin
5 out of 5 stars

This article continues the introduction of iRules tracing and profiling feature. It uses examples to describe how to configure and run the feature.

Peter Silva
Updated 1 week ago by Peter Silva

When we prepare for our Featured Member series, I typically send out a questionnaire and the DevCentral member writes out their answers. With the opening question I'll do a bit of editing and use that for the intro. This month however,...

Peter Silva
Updated 1 week ago by Peter Silva

Today, let’s look at a couple ways to mitigate a DDoS attack with BIG-IP ASM. We’ve logged into a BIG-IP ASM and navigated to Security>DDoS Protection>DDoS Profiles. In the General Settings of Application Security, we’ll activate an...

Jibin
Updated 2 weeks ago by Jibin
5 out of 5 stars

This article is the first of a series to introduce a new iRule feature in BIP-IP v13.1 release, iRule execution tracing and performance profiling.

Jason Rahm
Updated 1 month ago by Jason Rahm

In this week’s Post of Week, I address community member Shann_P’s question on how to make an iRule update a string at a specific location within the path of the URI: The iRule needs to be able to locate the 7th "chunk" of the URI, add a...

John Wagnon
Updated 1 month ago by John Wagnon

In this "Post of the Week" video, we show how to block a specific URI using a custom ASM signature and an iRule.

Lori MacVittie
Updated 2 months ago by Lori MacVittie
5 out of 5 stars

For three years now, my cohort Cindy Borovick and I have been tracking the app services, trends, and technology that ultimately shape the lives of folks in the trenches. It sometimes takes a while (almost ten years for cloud) before the winds of...

John Wagnon
Updated 2 months ago by John Wagnon
5 out of 5 stars

John discusses HTTP redirects using datagroups and iRules.

Peter Silva
Updated 3 months ago by Peter Silva
5 out of 5 stars

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time...

Jibin
Updated 3 days ago by Jibin
5 out of 5 stars

This article answers some frequently asked questions about the iRules tracing feature and offers some suggestions on best practices.

Jibin
Updated 1 week ago by Jibin
5 out of 5 stars

This article continues the introduction of iRules tracing and profiling feature. It uses examples to describe how to configure and run the feature.

Jibin
Updated 2 weeks ago by Jibin
5 out of 5 stars

This article is the first of a series to introduce a new iRule feature in BIP-IP v13.1 release, iRule execution tracing and performance profiling.

Lori MacVittie
Updated 2 months ago by Lori MacVittie
5 out of 5 stars

For three years now, my cohort Cindy Borovick and I have been tracking the app services, trends, and technology that ultimately shape the lives of folks in the trenches. It sometimes takes a while (almost ten years for cloud) before the winds of...

John Wagnon
Updated 2 months ago by John Wagnon
5 out of 5 stars

John discusses HTTP redirects using datagroups and iRules.

Peter Silva
Updated 3 months ago by Peter Silva
5 out of 5 stars

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time...

Pascal Tene
Updated 3 months ago by Pascal Tene
5 out of 5 stars

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications.

Graham
Updated 4 months ago by Graham
5 out of 5 stars

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice!

Peter Silva
Updated 4 months ago by Peter Silva
5 out of 5 stars

Piotr Lewandowski has been working in IT for well over 20 years – and not really conscious decision to go this way – just blind luck. He started in the era without Internet…yes, not so long ago it was possible to live without Internet J…and IBM...

Lori MacVittie
Updated 5 months ago by Lori MacVittie
5 out of 5 stars

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.

Have a iRules Question or Discussion Topic?