Hi - Need to export VIP name, IP, status (offline/available/unknown), pool and Poolmembers
Hi, I went through many articles but couldn't find any script for a consolidated report that would have these details: VIP name VIP IP VIP Status (offline/available/unknown) pool poolmembers I did find separate articles though but not a consolidated one. I am new and not verse with scripting. https://my.f5.com/manage/s/article/K72255145 https://my.f5.com/manage/s/article/K000135606 If anyone can please help with this required script it would be of great help. Thanks in advance. Regards, Ravi55Views0likes1CommentHow to generate ASM report from a pre-defined filter using TMSH
Is there a way to generate a report using a pre-defined report (filter) using CLI (TMSH)? Though I should be able to generate the same report by typing down the filter for the report in TMSH but TMSH does not understand the Drilldown for Security Policy for some reason. For instanace, when I try to run the following command it is not able to identify the Policy save analytics application-security report view-by attack-type measures { occurrences } drilldown {{ entity policy values { My_Security_Policy_Name } } } format pdf file foo.pdf range now-3w The error I get for above is : Data Input Error: Invalid entity value My_Security_Policy_Name This is strange because I am able to see and set Security Policies in the filter in GUI. I am using Big-IP 12.1.0.202Views0likes0CommentsReport: 1) All servers which are behind ASM in transparent/blocking 2) All active attack signatures in the policy
Hello! I have a requirement from management for 2 reports: 1) a report which lists all the current servers with ASM active I tried to get this info from ArcSight SIEM but the hostname field is empty and all I get is IP address. 2) second report which lists all active attack signatures for a policy I tried exporting the policy but there are only signature numbers. Any suggestion how I could accomplish the mentioned tasks?Solved507Views0likes4CommentsSSL Certificate Usage Report
Our client has an fast approaching, expiring SHA1 SSL certificate and we need to plan for importing the new cert, creating a new Profile and and updating all LTM Virtuals accross all VCMP's Before we can do this, we need to identify the SSL Cert used in each SSL client profile on each VS on each VCMP! I have tried using the command: tmsh list / ltm virtual one-line | grep $cert But this doesn't always list VS that are in different partitions other than /Common Is there an easier way to identify which VS uses the SSL Cert used in each SSL client profile? To make matters worse, the previous company that set up the implemented different names and variations of client ssl profiles that use various combinations of the same certificate or a different file of the same certificate! Note: We also have two VCMP's licenced with the APM module, which may or may not be of importance here.244Views0likes0Comments