iRules is a highly customized, Tcl-based scripting language allowing you complete programmatic access to application traffic in real time. If you’re looking to inspect, analyze, modify, route, re-direct, discard, or manipulate traffic in any way, chances are you can do it with an iRule. They even give you the ability to write business logic into your network layer.
In this week’s Post of Week, I address community member Shann_P’s question on how to make an iRule update a string at a specific location within the path of the URI:
The iRule needs to be able to locate the 7th "chunk" of the URI, add a...
In this "Post of the Week" video, we show how to block a specific URI using a custom ASM signature and an iRule.
For three years now, my cohort Cindy Borovick and I have been tracking the app services, trends, and technology that ultimately shape the lives of folks in the trenches. It sometimes takes a while (almost ten years for cloud) before the winds of...
John discusses HTTP redirects using datagroups and iRules.
Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time...
This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and iRules to include the latest HTTP security headers to all HTTP responses.
In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications.
With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice!
Piotr Lewandowski has been working in IT for well over 20 years – and not really conscious decision to go this way – just blind luck. He started in the era without Internet…yes, not so long ago it was possible to live without Internet J…and IBM...
For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko's security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP...
Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.
On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies.
Figure 1: “WannaCry” ransom...
F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more.
Leonardo is DevCentral’s Featured Member for May and we got a chance to talk with Leonardo about his life, work and scripting prowess.
View more iRules Articles
Have a iRules Question or Discussion Topic?
View more iRules DownloadsView all Resources