PingIntelligence

Importing and configuring the PingIntelligence policy

To deploy the PingIntelligence policy, first import and configure the policy.

About this task

The PingIntelligence policy is specific to an ASE cluster. If you have more than one ASE cluster, then add the policy to a new workspace and create a new plugin. When you import the PingIntelligence policy, it is imported to an LX workspace and opens in a Node.js editor.

To import the PingIntelligence policy in F5:

Steps

  1. Sign on to F5 and navigate to Local Traffic → iRules → LX Workspaces.

    A screen capture of the LX Workspaces page in F5.
  2. In the Workspaces tab, click import.

    A screenshot of the LX Workspaces page with the Import button highlighted with a yellow square.

    Result:

    A Workspace import page is displayed.

  3. Enter the Name and choose the PingIntelligence policy that you downloaded in Prerequisites.

  4. Click Import.

    A screenshot of the New Workspace page with the Name field highlighted with a yellow square.

    Result:

    Clicking on Import creates an LX Workspace.

  5. Click the Workspace.

    The policy is pre-loaded with the extension oi_ext.

  6. Edit the ASE configuration by clicking the ASEConfig.js file.

    A screen capture of the ASEConfig.js file open in the policy editor.

The following table describes the ASE variables:

+

Variable Description

ase_primary

IP address of primary ASE node

ase_primary_port

Port number of primary ASE node

ase_secondary

IP address of secondary ASE node

ase_secondary_port

Port number of secondary ASE node

is_ase_ssl

Set to true if traffic to ASE is sent over HTTPS

ase_token

The ASE sideband authentication token that was generated as part of prerequisites

use_ca

Set to true if ASE is using a CA-signed certificate

include_paths

Provide the list of paths that the policy should process. If / is provided as path, then all the traffic is monitored. The maximum number of subpaths in path is 3. For example, /a/b/c/.

enable_auth

Set to true if traffic contains access token in authorization header or querystring.

is_access_token_in_header

Set to true if access token is present in authorization header.

access_token_variable

If the access token is present in querystring, then specify the key used for token.

authorization_header_prefix

If the access token is present in authorization header, then specify the prefix used for access token.

user_key_mapping

The location of username in JSON payload of JWT access token.

clientid_key_mapping

The location of client ID in JSON payload of JWT access token

+

Result:

+ The PingIntelligence policy opens in the editor.