Getting Started with iRules: Events & Priorities
As this series steams on we go deeper and deeper into what actually drives iRules as a technology. So far we have covered very basic concepts, from core programming ideas and F5 basic terminology thr...
Updated 2 years ago
Version 3.0JRahm
Admin
Christ Follower, Husband, Father, Technologist. I love community and I especially love THIS community. My background is networking, but I've dabbled in all the F5 iStuff, I'm a recovering Perl guy, and am very much a python enthusiast. Learning alongside all of you in this accelerating industry toward modern apps and architectures.gsharri
Altostratus
7 years agoHi Jason. Great stuff here. My students are always asking about this type of thing so thanks for posting this. However, am I misunderstanding something here in the diagrams? In my experiments with a vip, which has an APM access policy and ASM security policy, the access policy sees the request before the security policy. For example I have a L7 acl in the access policy to deny the uri path /stopme/*. When I request that uri the APM acl blocks me and the request never appears in the ASM request log.