ltmClientSslStatActiveHandshakeRejected for each ssl profile
Hi team,
I have a question/problem. In the company where I work as Devops we have several bigip instances with 6 SSL profile and each is limited depending on connection / sessions and sometimes on these profiles we receive more traffic than we limited the SSL profile and if a single SSL profile has the limit 1000 and reached threshold, then other sessions are rejected, but we do not receive alarms about the rejection session. If we receive alarms about the rejection session, we can increase the upper limit to 10% whenever we have this problem.
I mention that all these bigips have only 1 CPU core and are aws instances, so they are not powerful to encrypt every session and that is why they have been limited each SSL profile.
Let's take on ssl profile example :
ssl_profile_1 - has the following:
- SSL profile limit: F5-BIGIP-LOCAL-MIB::ltmClientSslMaxActiveHandshake."/Common/ssl_profile_1" = Gauge32: 1000
- Current active handshakes: F5-BIGIP-LOCAL-MIB::ltmClientSslStatCurrentActiveHandshakes."/Common/ssl_profile_1" = Counter64: 1000
- Is there a MIB that can show the Rejected Handshakes for each ssl profile? ( there is a MIB/oid that shows Rejected Handshakes but is not for ssl profile, is created for Invalid Certificates or other reason - F5-BIGIPLOCALMIB::ltmClientSslStatActiveHandshakeRejected."/Common/ssl_profile_1" = Counter64
- What tmsh command should I use for showing the MaxActiveHandshakes limit for ssl profile?
Thanks in advance