Skip to content

Commit e1e738a

Browse files
author
bowler
committed
- building on module4, lab 2
1 parent 9c8dbd8 commit e1e738a

File tree

5 files changed

+52
-5
lines changed

5 files changed

+52
-5
lines changed
Loading
211 KB
Loading
Loading
Loading

docs/class1/module4/lab2.rst

+52-5
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,19 @@
11
.. _LADT - Grafana Instance Access:
22

3-
Accessing the F5 LADT Instance
4-
==============================
3+
Accessing the F5 LADT Instance Dashboards
4+
=========================================
55

6-
We've pre-provisioned an instance of F5 LADT in the UDF lab environment. If you're ready to dive in, follow the instructions below!
6+
We've pre-provisioned an instance of F5 LADT in the UDF lab environment. It's ready for you to dive in and take a look. Just follow the instructions below!
7+
8+
Accessing F5 LADT Grafana Instance
9+
----------------------------------
710

811
#. From within the UDF course deployment's **LADT** System, locate and select **ACCESS**, then **Grafana**.
912

10-
.. image:: images/udf_selfinstall_grafana_access.png
13+
.. image:: images/udf_ladt_grafana_access.png
1114
:width: 800
1215

13-
#. Once the new browser tab has loaded, you will be presented with the self-installed AST Grafana login. Enter the following credentials and select **Log in**.
16+
#. Once the new browser tab has loaded, you will be presented with the self-installed F5 LADT Grafana login. Enter the following credentials and select **Log in**.
1417

1518
Username
1619

@@ -27,3 +30,47 @@ We've pre-provisioned an instance of F5 LADT in the UDF lab environment. If you'
2730
.. image:: ../module2/images/grafana_login.png
2831
:width: 800
2932

33+
#. You'll be presented with the Grafana homepage. From here, select the hamburger menu next to **Home** in the upper left corner, then **Dashboards**
34+
35+
.. image:: images/ladt_grafana_home.png
36+
:width: 800
37+
38+
#. Once the Dashboards page has loaded, you can either expand the list of dashboards by selecting the **>** symbol next to **Local API Discovery** or selecting the **Local API Discovery** folder itself.
39+
40+
.. image:: images/ladt_dashboards.png
41+
:width: 800
42+
43+
API Detection Dashboard
44+
-----------------------
45+
46+
#. The **API Detection Dashboard** has three sections, as outlined below. Contract the *System Overview* and *System State Detail* sections by selecting the **v** next to each section title, as we're more interested in the *Detection Results*.
47+
48+
* System Overview
49+
* Clickhouse Service Status
50+
* OTel Service Status
51+
* Log Analyzer Status
52+
* Last Analysis Time
53+
* Logs Analyzed Last Time
54+
* New Logs Since Last Analysis
55+
- System State Detail
56+
- Analysis Settings
57+
- Logs Last Processed by Host
58+
- Logs Received
59+
- Logs Processed at Last Analysis
60+
- Last Analysis Duration
61+
- CPU Utilization
62+
- Memory Usage
63+
- Detection Results
64+
- Application Name
65+
- HTTP Method
66+
- Path
67+
- Authentication Detected
68+
- Sensitive Headers Present
69+
- Sensitive Body Present
70+
- Sensitive Data Types
71+
- # of Requests
72+
73+
.. image:: images/api_detection_dashboard.png
74+
:width: 800
75+
76+
As detailed above, **Detection Results** is where all of the API endpoints and their detected properties will be listed. Straight away, you will be able to get a view of the number of requests an API resource has seen for a given method and whether or not sensitive data or headers have been detected.

0 commit comments

Comments
 (0)