{"id":2907,"date":"2016-04-12T12:27:20","date_gmt":"2016-04-12T10:27:20","guid":{"rendered":"http:\/\/vm.piszki.pl\/?p=2907"},"modified":"2016-04-12T12:27:20","modified_gmt":"2016-04-12T10:27:20","slug":"konfiguracja-vmware-log-insight-big-ip-f5-management-pack","status":"publish","type":"post","link":"https:\/\/vm.piszki.pl\/?p=2907","title":{"rendered":"Konfiguracja VMware Log Insight BIG-IP F5 Management Pack"},"content":{"rendered":"<p>Ca\u0142kiem niedawno pojawi\u0142 si\u0119 BIG-IP F5 Management Pack dla VMware Log Insight, modu\u0142 ten mo\u017ce da\u0107 wgl\u0105d w ruch na serwerach VIP osobom (Administratorom) kt\u00f3re normalnie nie maj\u0105 dost\u0119pu do interfejsu BIG-IP. Jak wiemy BIG-IP zawiera w sobie modu\u0142 analityczny Application Visibility and Reporting (AVR), modu\u0142 ten zbiera wszystkie potrzebne dane statystyczne i jest on wymagany przy wysy\u0142aniu informacji do Log Insight. Informacje w Dashboardzie s\u0105 pogrupowane nast\u0119puj\u0105co:<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big0.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border: 0px;\" title=\"big0\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big0_thumb-1.jpg\" alt=\"big0\" width=\"146\" height=\"240\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\"><!--more-->Widok og\u00f3lny pokazuje b\u0142\u0119dy w dost\u0119pie do BIG-IP, b\u0142\u0119dy procesu tmm i inne (przewa\u017cnie jest pusty). Nast\u0119pny jest widok og\u00f3lny statusu poszczeg\u00f3lnych cz\u0142onk\u00f3w puli. Jest to bardzo ciekawa informacja kt\u00f3rej wprost nie uzyskamy z AVR. Cz\u0119sto wypadni\u0119cie cz\u0142onka z puli mo\u017ce oznacza\u0107 problemy sieciowe lub z samym serwerem i warto im si\u0119 przyjrze\u0107 bli\u017cej.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big13.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border: 0px;\" title=\"big13\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big13_thumb-1.jpg\" alt=\"big13\" width=\"511\" height=\"608\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Kolejnym ciekawym widokiem jest Web Access \u2013 Traffic By Request. Ten widok pozwoli wy\u0142apa\u0107 najbardziej obci\u0105\u017conych cz\u0142onk\u00f3w puli oraz sprawdzi\u0107 kt\u00f3ry z VIP jest najbardziej \u201cgadatliwy\u201d. Dodatkowo mo\u017cemy sprawdzi\u0107 kt\u00f3ry z klient\u00f3w w danym czasie wykona\u0142 najwi\u0119cej zapyta\u0144, w trybie \u201cInteractive Analytics\u201d mo\u017cemy dok\u0142adnie sprawdzi\u0107 jakie pliki by\u0142y pobierane.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big3.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big3\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big3_thumb-1.jpg\" alt=\"big3\" width=\"506\" height=\"409\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">W widoku Web Access \u2013 Traffic By Response Time mo\u017cemy sprawdzi\u0107 czasy odpowiedzi w podziale na serwer, aplikacje, klienta i wielko\u015b\u0107 odpowiedzi.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big1.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big1\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big1_thumb-1.jpg\" alt=\"big1\" width=\"508\" height=\"495\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Przy ka\u017cdej informacji mo\u017cemy przechodzi\u0107 w tryb analizy i sprawdza\u0107 co dok\u0142adnie dzia\u0142o si\u0119 w danym czasie z wybranym obiektem.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big2.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big2\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big2_thumb-1.jpg\" alt=\"big2\" width=\"508\" height=\"495\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Pozosta\u0142e widoki to statystyka modu\u0142u AVR oraz statystyka DNS i widok operacji na serwerze DNS. Niestety nie posiadam aktywnego modu\u0142u GTM wi\u0119c nie poka\u017c\u0119 tych informacji tutaj.\u00a0 Mi osobi\u015bcie najbardziej brakuje informacji statystycznych z ASM, mam nadziej\u0119, \u017ce w kolejnych wersjach Management Pack pojawi\u0105 si\u0119 te\u017c Dashboardy pokazuj\u0105ce ataki na poszczeg\u00f3lne VIP. Instalacja BIG-IP F5 Management Pack po stronie VMware Log Insight jest standardowa i nie wymaga dodatkowej konfiguracji. Po stronie BIG-IP musimy spe\u0142ni\u0107 szereg warunk\u00f3w i wykona\u0107 kilka krok\u00f3w. Zaczynamy od stworzenia puli kt\u00f3rej cz\u0142onkiem jest Log Insight:<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big8.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big8\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big8_thumb-1.jpg\" alt=\"big8\" width=\"412\" height=\"285\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Je\u017celi u\u017cywamy klastra Log Insight to powinni\u015bmy poda\u0107 adres IP wsp\u00f3lny dla ca\u0142ego klastra.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big9.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big9\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big9_thumb-1.jpg\" alt=\"big9\" width=\"410\" height=\"314\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Nast\u0119pnie w sekcji System\u2014&gt;Logs\u2014&gt;Configuration\u2014&gt;Remote Logging dodajemy Log Insight jako serwer syslog.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big4.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big4\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big4_thumb-1.jpg\" alt=\"big4\" width=\"412\" height=\"146\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">W Log Destination tworzymy dwie konfiguracje, jedna to Remote HSL (High Speed Logging) wskazuj\u0105ca na pul\u0119 kt\u00f3r\u0105 stworzyli\u015bmy wcze\u015bniej.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big5.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big5\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big5_thumb-1.jpg\" alt=\"big5\" width=\"422\" height=\"322\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Druga to standardowy syslog ze wskazaniem na stworzyny przez nas HSL.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big6.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big6\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big6_thumb-1.jpg\" alt=\"big6\" width=\"422\" height=\"320\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Nast\u0119pnie tworzymy nowy Log Publisher kt\u00f3ry b\u0119dzie wysy\u0142a\u0142 logi na stworzony przez nas Log Destination (syslog).<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big7.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big7\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big7_thumb-1.jpg\" alt=\"big7\" width=\"422\" height=\"290\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Wysy\u0142anie log\u00f3w z VIP nie odbywa si\u0119 globalnie, dla ka\u017cdego serwera kt\u00f3ry nas interesuje musimy stworzy\u0107 oddzieln\u0105 konfiguracj\u0119. Jak ju\u017c wspomnia\u0142em, modu\u0142 AVR jest wymagany, zaczynamy zatem od stworzenia (lub skonfigurowania istniej\u0105cego) profilu analitycznego. W profilu tym musimy zaznaczy\u0107 Logging Type jako External i wybra\u0107 stworzony przez nas Publisher. Profil podpinamy pod interesuj\u0105cy nas Virtual Server.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big10.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big10\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big10_thumb-1.jpg\" alt=\"big10\" width=\"424\" height=\"448\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">To nie koniec konfiguracji, wraz z BIG-IP Management Pack dostarczana jest iRule kt\u00f3r\u0105 musimy podpi\u0105\u0107 pod Virtual Server. Wbrew temu co pisz\u0105 w dokumentacji, nazwa iRule i nazwa puli oraz noda mog\u0105 by\u0107 dowolne, wa\u017cne aby w iRule by\u0142a podana prawid\u0142owa nazwa puli. iRule wygl\u0105da tak:<\/p>\n<pre class=\"csharpcode\"># =============================\r\n# iRule: logInsight_iRule_http START\r\n# ==============================\r\n\r\nwhen CLIENT_ACCEPTED {\r\n    set client [IP::client_addr] \r\n    set client_req_start_time [clock clicks -milliseconds] \r\n}\r\n\r\nwhen SERVER_CONNECTED\r\n{\r\n     set server_req_start_time [clock clicks -milliseconds]    \r\n}\r\n\r\nwhen HTTP_REQUEST_SEND\r\n{\r\n    set http_req_send_start_time [clock clicks -milliseconds]\r\n    set node_elapsed_time [expr {$http_req_send_start_time - $server_req_start_time}]\r\n    \r\n}\r\n\r\nwhen HTTP_REQUEST {\r\n   \r\n    set client_latency [expr {[clock clicks -milliseconds] -  $client_req_start_time} ]\r\n    set vhost [HTTP::host]:[TCP::local_port]\r\n    set url [HTTP::uri]\r\n    set method [HTTP::method]\r\n    set http_version [HTTP::version]\r\n    set user_agent [HTTP::header <span class=\"str\">\"User-Agent\"<\/span>]\r\n    set tcp_start_time [clock clicks -milliseconds]\r\n    set req_start_time [clock format [clock seconds] -format <span class=\"str\">\"%Y\/%m\/%d %H:%M:%S\"<\/span>]\r\n    set req_elapsed_time 0\r\n    set virtual_server [LB::server]\r\n\r\n    <span class=\"kwrd\">if<\/span> { [HTTP::header Content-Length] &gt; 0 } then {\r\n        set req_length [HTTP::header <span class=\"str\">\"Content-Length\"<\/span>]\r\n        <span class=\"kwrd\">if<\/span> {$req_length &gt; 4000000} then {\r\n            set req_length 4000000\r\n        }\r\n        HTTP::collect $req_length\r\n    } <span class=\"kwrd\">else<\/span> {\r\n        set req_length 0\r\n    }\r\n\r\n    <span class=\"kwrd\">if<\/span> { [HTTP::header <span class=\"str\">\"Referer\"<\/span>] ne <span class=\"str\">\"\"<\/span> } then {\r\n        set referer [HTTP::header <span class=\"str\">\"Referer\"<\/span>]\r\n    } <span class=\"kwrd\">else<\/span> {\r\n        set referer -\r\n    }\r\n}\r\n\r\n\r\nwhen HTTP_RESPONSE {\r\n\r\n    set hsl [HSL::open -proto TCP -pool Syslog-LogInsight]\r\n    set resp_start_time [clock format [clock seconds] -format <span class=\"str\">\"%Y\/%m\/%d %H:%M:%S\"<\/span>]\r\n    set node [IP::server_addr]:[TCP::server_port]\r\n    set status [HTTP::status]\r\n   set req_elapsed_time [expr {[clock clicks -milliseconds] - $tcp_start_time}]\r\n    set server_latency [expr {[clock clicks -milliseconds] -  $server_req_start_time} ]\r\n    \r\n    <span class=\"kwrd\">if<\/span> { [HTTP::header Content-Length] &gt; 0 } then {\r\n        set response_length [HTTP::header <span class=\"str\">\"Content-Length\"<\/span>]\r\n    } <span class=\"kwrd\">else<\/span> {\r\n        set response_length 0\r\n    }\r\n\r\n   HSL::send $hsl <span class=\"str\">\"&lt;190&gt;f5_web_access_info|$vhost|$virtual_server|$client|$method|\\\"$url\\\"|HTTP\/$http_version|$req_start_time|$req_length|$req_elapsed_time|$node|$status|$resp_start_time|$response_length|$user_agent|$client_latency|$server_latency|\\\"$referer\\\"\\r\\n\"<\/span>\r\n}<\/pre>\n<p>&nbsp;<\/p>\n<p>W moim przypadku nazwa\u0142em j\u0105 SendToLogInsight i podpi\u0105\u0142em j\u0105 po interesuj\u0105cy mnie serwer.<\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big12.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big12\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big12_thumb-1.jpg\" alt=\"big12\" width=\"424\" height=\"260\" border=\"0\" \/><\/a><\/p>\n<p><a href=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big11.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border-width: 0px;\" title=\"big11\" src=\"https:\/\/vm.piszki.pl\/wp-content\/uploads\/2016\/03\/big11_thumb-1.jpg\" alt=\"big11\" width=\"213\" height=\"108\" border=\"0\" \/><\/a><\/p>\n<p align=\"justify\">Je\u017celi dysponujemy wszystkimi potrzebnymi komponentami to warto zainstalowa\u0107 i skonfigurowa\u0107 ca\u0142y zestaw. Dostarcza on naprawd\u0119 ciekawych informacji i mo\u017cliwo\u015bci ich analizy, skorzystaj\u0105 z niego tak\u00a0 Administratorzy BIG-IP jak i VMware lub Ci kt\u00f3rzy s\u0105 odpowiedzialni za poszczeg\u00f3lne aplikacje.<\/p>\n<div style='text-align:left' class='yasr-auto-insert-visitor'><\/div>","protected":false},"excerpt":{"rendered":"<p>Ca\u0142kiem niedawno pojawi\u0142 si\u0119 BIG-IP F5 Management Pack dla VMware Log Insight, modu\u0142 ten mo\u017ce da\u0107 wgl\u0105d w ruch na serwerach VIP osobom (Administratorom) kt\u00f3re normalnie nie maj\u0105 dost\u0119pu do interfejsu BIG-IP. Jak wiemy BIG-IP zawiera w sobie modu\u0142 analityczny &hellip; <a href=\"https:\/\/vm.piszki.pl\/?p=2907\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[93,45],"tags":[33,30],"class_list":["post-2907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nowosci","category-poradniki","tag-big-ip","tag-log-insight"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts\/2907"}],"collection":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2907"}],"version-history":[{"count":5,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts\/2907\/revisions"}],"predecessor-version":[{"id":2929,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/posts\/2907\/revisions\/2929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=\/wp\/v2\/media\/1952"}],"wp:attachment":[{"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vm.piszki.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}