Attached is a link to github which provides the user with an comprehensive example of how to discover and import many BIGIP device via BIGIQ CM REST API.
Script bulkDiscovery.pl is a standalone script installed directly in the BIGIQ shell.
1. Create a /shared/scripts/. directory
2. scp file to BIGIQ,
3. Usage below.
This automation will invoke a device trust task to negotiate certificate, discover device to population in resolver groups (maintained per module) and import configuration of BIGIP's as defined in bulk_discovery.csv file. This happens sequentially and is very useful when administrator's goal is to discover and import many BIGIP devices in a programmatic manner.
** tested with perl distribution present on bigiq v5.8.8
How to use this snippet:
./bulkDiscovery -c bulk_discovery.csv
Program: bulkDiscovery.pl Version: v2.00.00
##### Discover multiple BIG-IP devices.
-r Root credentials for every BIG-IP (such as root:default) - overrides root creds in CSV
-a Admin credentials for every BIG-IP (such as admin:admin) - overrides any creds in CSV
-v Verbose screen output
-s Discover ASM
-l Discover LTM
-p Discover APM
-c Path to CSV file with all BIG-IP devices - REQUIRED
-u Update framework if needed
-k Keep the CSV file after this finishes (not recommended if it contains creds)
-q BIG-IQ admin credentials in form admin:password - REQUIRED if not using default
-g access group name if needed
-f Discover AFM
csv format: ip, user, pw, cluster-name, framework-action, root-user, root-pw
ip: ip address of the BigIP to discover.
user, pw: username & password of the BigIP. Will be overridden if -a is specified on the command
configuration csv example format:
188.8.131.52, admin, pw
184.108.40.206, admin, pw, ha-name
220.127.116.11, admin, pw,, skip
18.104.22.168, admin, pw,, update, root, root-pw