Cookie Persistence and Troubleshooting
The BIG-IP persistence cookie is a valuable configuration option that allows stateful applications to remain persistent to a specific node with no additional configurations within the application or on the server(s) by doing something like clustering.
I hear application development teams refer to this as “sticky session” or “stick sessions”, but in reality this cookie has nothing to do with a user’s “application” session, but has everything to do with the user’s session persistence to the same server that the application session was started on.
After reading an F5 Solution article (SOL6917: Overview of BIG-IP persistence cookie encoding) and learning that the information encoded within a BIG-IP Cookie could be useful I decided to make a tool that could decipher this information quickly so that I could use it for troubleshooting.
What is useful in a BIG-IP Cookie?
The BIG-IP Cookie contains the IP Address of the server that the client is being persisted to, as well as the server port that the connection is being established on.
So? Why is this useful? I could get that information from an iRule…
True, you can get this information logged within the LB::selected event within an iRule, but that requires you to make an iRule change to gather the information that you actually already have (unless you are encrypting your BIG-IP Cookies which negate the usefulness of this tool). Most changes in Production require change management approval, which you get to bypass when using this tool if cookie persistence is configured.
There are many tools that you can use to capture the persistence cookie being provided by the BIG-IP. I commonly use Fiddler2 (http://www.fiddler2.com/fiddler2/)…
This is the application that I created to decipher the BIG-IP Cookies.
The tool is semi-intelligent for the input. It can take any of the following and give the correct output:
BIGipServerpool.ltm.ve.gamezone.com=336202250.40475.0000 336202250.40475.0000 336202250.40475
Paste the cookie into the tool and select ‘Auto-Parse’ option:
This will populate the Conversion Area:
Then select the ‘Decipher’ option:
This becomes useful for troubleshooting purposes to determine which server you are persisted to when you are trying to determine which member server is or is not having an issue.
As you can see, this correctly identified which server I was communicating with in this pool of servers:
I hope that everyone finds this tool useful.
If you find any issues or have any questions please feel free to contact me on DevCentral.
Source Code
The full source for this application can be retrieved at this link: CookietoolRelease.zip
- prNimbostratus
Working fine for me thanks for sharing this tool
- keshav_163381Nimbostratus
Its seems you have missed one digit while decoding that. Please check and tried one more time it will work for you also.
i used same value which you provided in the comments
You mentioned BIGipServerP80_pool1=185860362.20480.0000
Added another digit BIGipServerP80_pool1=1858603621.20480.0000 IP address 101.10.200.10 Port 80
- daszNimbostratus
For some reason it cannot decipher valid cookie: BIGipServerP80_pool1=185860362.20480.0000
- Michael_YatesNimbostratusUnfortunately No. It was only designed to decipher the default (IPv4) persistence cookie.
- Jacob_39432NimbostratusDoes this tool handle the cookie format changes when using route domains?