Skip to content

Commit 42a9b77

Browse files
authored
Merge pull request #22 from f5devcentral/develop
updates to align with UDF blueprint running AST v0.9.1
2 parents 5b63c5d + 3a7a1a2 commit 42a9b77

File tree

7 files changed

+245
-127
lines changed

7 files changed

+245
-127
lines changed

docs/class1/module2/lab2.rst

+84-8
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,7 @@ F5 Application Study Tool Installation and Setup
149149
# The data_types that should be enabled or disabled. Default-disabled module users can enable those modules
150150
# by setting the below to true. These will apply to all devices and may be better specified on the
151151
# per-reciever settings file.
152+
# The full list of available data types is [here](https://f5devcentral.github.io/application-study-tool/components/otel_collector/receiver_readme.html#available-data_types).
152153
data_types:
153154
f5.apm:
154155
enabled: false
@@ -162,6 +163,18 @@ F5 Application Study Tool Installation and Setup
162163
enabled: false
163164
f5.gtm:
164165
enabled: false
166+
f5.policy.api_protection:
167+
enabled: false
168+
f5.policy.asm:
169+
enabled: false
170+
f5.policy.firewall:
171+
enabled: false
172+
f5.policy.ip_intelligence:
173+
enabled: false
174+
f5.policy.nat:
175+
enabled: false
176+
f5.profile.dos:
177+
enabled: false
165178
# The TLS settings to use. Either a CA file must be specified or insecure_skip_verify
166179
# set to true (not recommended)
167180
tls:
@@ -223,12 +236,21 @@ F5 Application Study Tool Installation and Setup
223236
# Each entry must have a unique name, starting with bigip/
224237
# (e.g. bigip/1, bigip/2)
225238
bigip/1:
239+
# Endpoint must be specified for each device
240+
# Set this to the management IP for the device. This must be
241+
# reachable from the Application Study Tool host (port 443).
226242
endpoint: https://10.1.1.5
243+
## Uncommenting any of the following lines will override the defaults in
244+
## ast_defaults.yaml bigip_receiver_defaults section.
245+
# username: SOME_OVERRIDE_ACCOUNT_NAME
246+
# password: "${SOME_OTHER_ENV_VAR_WITH_ANOTHER_PASSWORD}"
247+
# collection_interval: 30s
248+
# timeout: 20s
227249
data_types:
228250
f5.apm:
229-
enabled: false
251+
enabled: true
230252
f5.cgnat:
231-
enabled: false
253+
enabled: true
232254
f5.dns:
233255
enabled: true
234256
f5.dos:
@@ -237,36 +259,90 @@ F5 Application Study Tool Installation and Setup
237259
enabled: true
238260
f5.gtm:
239261
enabled: true
262+
f5.policy.api_protection:
263+
enabled: false
264+
f5.policy.asm:
265+
enabled: false
266+
f5.policy.firewall:
267+
enabled: false
268+
f5.policy.ip_intelligence:
269+
enabled: false
270+
f5.policy.nat:
271+
enabled: false
272+
f5.profile.dos:
273+
enabled: false
274+
tls:
275+
insecure_skip_verify: true
276+
# ca_file:
240277
bigip/2:
278+
# Endpoint must be specified for each device
279+
# Set this to the management IP for the device. This must be
280+
# reachable from the Application Study Tool host (port 443).
241281
endpoint: https://10.1.1.6
282+
## Uncommenting any of the following lines will override the defaults in
283+
## ast_defaults.yaml bigip_receiver_defaults section.
284+
# username: SOME_OVERRIDE_ACCOUNT_NAME
285+
# password: "${SOME_OTHER_ENV_VAR_WITH_ANOTHER_PASSWORD}"
286+
# collection_interval: 30s
287+
# timeout: 20s
242288
data_types:
243289
f5.apm:
244290
enabled: false
245291
f5.cgnat:
246292
enabled: false
247293
f5.dns:
248-
enabled: false
294+
enabled: true
249295
f5.dos:
250296
enabled: false
251297
f5.firewall:
252298
enabled: true
253299
f5.gtm:
300+
enabled: true
301+
f5.policy.api_protection:
302+
enabled: false
303+
f5.policy.asm:
304+
enabled: false
305+
f5.policy.firewall:
254306
enabled: false
307+
f5.policy.ip_intelligence:
308+
enabled: false
309+
f5.policy.nat:
310+
enabled: false
311+
f5.profile.dos:
312+
enabled: false
313+
tls:
314+
insecure_skip_verify: true
315+
# ca_file:
255316
bigip/3:
256317
endpoint: https://10.1.1.7
257318
data_types:
258319
f5.apm:
259-
enabled: false
320+
enabled: true
260321
f5.cgnat:
261-
enabled: false
322+
enabled: true
262323
f5.dns:
263-
enabled: false
324+
enabled: true
264325
f5.dos:
265-
enabled: false
326+
enabled: true
266327
f5.firewall:
267-
enabled: false
328+
enabled: true
268329
f5.gtm:
330+
enabled: true
331+
f5.policy.api_protection:
332+
enabled: false
333+
f5.policy.asm:
334+
enabled: false
335+
f5.policy.firewall:
269336
enabled: false
337+
f5.policy.ip_intelligence:
338+
enabled: false
339+
f5.policy.nat:
340+
enabled: false
341+
f5.profile.dos:
342+
enabled: false
343+
tls:
344+
insecure_skip_verify: true
345+
# ca_file:
270346
271347
To save your changes, press ``escape``, then type ``:wq`` and ``return``. You should see a message similar to the following upon successful save:
272348

docs/class1/module2/lab3.rst

+76-28
Original file line numberDiff line numberDiff line change
@@ -104,26 +104,50 @@ F5 AST Configuration Setting Files
104104

105105
.. code-block:: console
106106
107-
# Your bigip targets
108-
# Values not explicitly configured here inherit values in
109-
# the ast_defaults.yaml bigip_receiver_defaults section.
110-
# Each entry must have a unique name, starting with bigip/
111-
# (e.g. bigip/1, bigip/2)
112-
bigip/1:
113-
endpoint: https://10.1.1.5
114-
data_types:
115-
f5.apm:
116-
enabled: false
117-
f5.cgnat:
118-
enabled: false
119-
f5.dns:
120-
enabled: true
121-
f5.dos:
122-
enabled: true
123-
f5.firewall:
124-
enabled: true
125-
f5.gtm:
126-
enabled: true
107+
# Your bigip targets
108+
# Values not explicitly configured here inherit values in
109+
# the ast_defaults.yaml bigip_receiver_defaults section.
110+
# Each entry must have a unique name, starting with bigip/
111+
# (e.g. bigip/1, bigip/2)
112+
bigip/1:
113+
# Endpoint must be specified for each device
114+
# Set this to the management IP for the device. This must be
115+
# reachable from the Application Study Tool host (port 443).
116+
endpoint: https://10.1.1.5
117+
## Uncommenting any of the following lines will override the defaults in
118+
## ast_defaults.yaml bigip_receiver_defaults section.
119+
# username: SOME_OVERRIDE_ACCOUNT_NAME
120+
# password: "${SOME_OTHER_ENV_VAR_WITH_ANOTHER_PASSWORD}"
121+
# collection_interval: 30s
122+
# timeout: 20s
123+
data_types:
124+
f5.apm:
125+
enabled: true
126+
f5.cgnat:
127+
enabled: true
128+
f5.dns:
129+
enabled: true
130+
f5.dos:
131+
enabled: true
132+
f5.firewall:
133+
enabled: true
134+
f5.gtm:
135+
enabled: true
136+
f5.policy.api_protection:
137+
enabled: false
138+
f5.policy.asm:
139+
enabled: false
140+
f5.policy.firewall:
141+
enabled: false
142+
f5.policy.ip_intelligence:
143+
enabled: false
144+
f5.policy.nat:
145+
enabled: false
146+
f5.profile.dos:
147+
enabled: false
148+
tls:
149+
insecure_skip_verify: true
150+
# ca_file:
127151
128152
Notice how the configuration for this BIG-IP consists of the *endpoint* (management) IP address and the *data_types* (modules) enabled/disabled for collection. Its authentication settings are inherited from the ``ast_defaults.yaml`` file.
129153

@@ -151,10 +175,36 @@ F5 AST Configuration Setting Files
151175

152176
.. code-block:: console
153177
154-
bigip/3:
155-
endpoint: https://10.1.1.7
156-
tls:
157-
insecure_skip_verify: true
178+
bigip/3:
179+
endpoint: https://10.1.1.7
180+
data_types:
181+
f5.apm:
182+
enabled: true
183+
f5.cgnat:
184+
enabled: true
185+
f5.dns:
186+
enabled: true
187+
f5.dos:
188+
enabled: true
189+
f5.firewall:
190+
enabled: true
191+
f5.gtm:
192+
enabled: true
193+
f5.policy.api_protection:
194+
enabled: false
195+
f5.policy.asm:
196+
enabled: false
197+
f5.policy.firewall:
198+
enabled: false
199+
f5.policy.ip_intelligence:
200+
enabled: false
201+
f5.policy.nat:
202+
enabled: false
203+
f5.profile.dos:
204+
enabled: false
205+
tls:
206+
insecure_skip_verify: true
207+
# ca_file:
158208
159209
To save your changes, press ``escape``, then type ``:wq`` and ``return``. You should see a message similar to the following upon successful save:
160210

@@ -186,8 +236,6 @@ Once the ``bigip_receivers.yaml`` file has been updated, you must run the config
186236
187237
sudo docker-compose restart otel-collector
188238
189-
190-
191239
Updating F5 AST
192240
---------------
193241

@@ -206,7 +254,7 @@ Let's check the AST OTel collector version by examining the ``docker-compose.yam
206254
otel-collector:
207255
image: ghcr.io/f5devcentral/application-study-tool/otel_custom_collector:v0.8.1
208256
209-
This particular output reveals ``v0.8.1`` of the OTel Custom Collector. If that version is lower than what's listed on the `f5devcentral / application-study-tool Releases board <https://github.com/f5devcentral/application-study-tool/releases/>`_, perform the following steps. Otherwise, you're ready and free to roll on to :ref:`Accessing F5 AST`.
257+
This particular output reveals ``v0.9.1`` of the OTel Custom Collector. If that version is lower than what's listed on the `f5devcentral / application-study-tool Releases board <https://github.com/f5devcentral/application-study-tool/releases/>`_, perform the following steps. Otherwise, you're ready and free to roll on to :ref:`Accessing F5 AST`.
210258

211259
#. Since local changes have been made to files which are actively tracked for changes in the repo, such as ``.env.device-secrets`` and ``config/bigip_receivers.yaml``, we must stash away those changes prior to performing a ``git pull``. Stashing simply sets them aside temporarily. We'll reincorporate them after pulling the latest code from GitHub.
212260

@@ -230,7 +278,7 @@ Let's check the AST OTel collector version by examining the ``docker-compose.yam
230278

231279
.. code-block:: console
232280
233-
sudo git checkout tags/v0.8.1
281+
sudo git checkout tags/v0.9.1
234282
235283
#. Undo the ``git stash`` action, bringing our local changes back where they need to be:
236284

Loading

docs/class1/module3/lab1.rst

+12-14
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,13 @@ The **Fleet Inventory** dashboard is your one-stop shop for a list of all the F5
3535

3636
Available Metrics include:
3737

38-
* Total Inventory by Software Version
39-
* Inventory Total by Device Type
38+
* Inventory Total by Software Version
39+
* Inventory Total by Product Name
40+
* Inventory Total by Product Type
4041
* Online Inventory by Version
42+
* Module Status
4143
* Inventory Detail
4244

43-
4445
.. image:: images/fleet_inventory_dashboard.png
4546
:width: 800
4647

@@ -71,8 +72,7 @@ Available Metrics include:
7172

7273
* Current Client Side Connections
7374

74-
* Client Side Total Bytes In/Out
75-
75+
* Client Side Data Rate In/Out
7676

7777
.. image:: images/device_utilization_dashboard.png
7878
:width: 800
@@ -86,13 +86,12 @@ From here, you can also see *if changes have occurred within the past 24 hours*
8686

8787
Available Metrics include:
8888

89-
* Virtual Server Availability
89+
* Virtual Server Availability (24h)
9090
* Is Virtual Server Available?
9191
* Virtual Server Connection Rate
9292
* Virtual Server Data Rate
9393
* Fleet Virtual Server Details
9494

95-
9695
.. image:: images/fleet_virtual_servers_dashboard.png
9796
:width: 800
9897

@@ -103,18 +102,17 @@ The **SSL Certificate Status** dashboard is both self-explanatory and extraordin
103102

104103
Available Metrics include:
105104

106-
- Summary
107-
108-
- Certificate Type
105+
* Summary
109106

110-
- Certs Expiring in less than 30 days
107+
* Certificate Type
111108

112-
- Certs Expiring in less than 90 days
109+
* Certs Expiring in less than 30 days
113110

114-
- Certs Expiring in less than 180 days
111+
* Certs Expiring in less than 90 days
115112

116-
- Certificate Detail List
113+
* Certs Expiring in less than 180 days
117114

115+
* Certificate Detail List
118116

119117
.. image:: images/ssl_certificate_status_dashboard.png
120118
:width: 800

0 commit comments

Comments
 (0)