Skip to content

Instantly share code, notes, and snippets.

@kaz-tk
Created March 30, 2015 06:01
Show Gist options
  • Save kaz-tk/032bb1cd317a3715952a to your computer and use it in GitHub Desktop.
Save kaz-tk/032bb1cd317a3715952a to your computer and use it in GitHub Desktop.
interface,key,node,pool,rule,self_ip,virtual_address,virtual_server,vlan
"bigip": {
"ansible_facts": {
"interface": {
"1.1": {
"active_media": "MT_NONE",
"actual_flow_control": "FLOW_CONTROL_PAUSE_NONE",
"bundle_state": "INTERFACE_BUNDLE_NOT_SUPPORTED",
"description": "",
"dual_media_state": "STATE_DISABLED",
"enabled_state": "STATE_ENABLED",
"flow_control": "FLOW_CONTROL_PAUSE_TX_RX",
"learning_mode": "LEARNING_MODE_ENABLE_FORWARD",
"lldp_admin_status": "INTERFACE_LLDP_TXONLY",
"lldp_tlvmap": 130943,
"mac_address": "08:00:27:17:F3:13",
"media": "MT_10000T_FULL",
"media_option": {
"interface_name": "1.1",
"media_options": [
"MT_10000T_FULL"
]
},
"media_option_sfp": {
"interface_name": "1.1",
"media_options": [
"MT_NONE",
"MT_AUTO"
]
},
"media_sfp": "MT_AUTO",
"media_speed": 10000,
"media_status": "MEDIA_STATUS_UP",
"mtu": 9198,
"phy_master_slave_mode": "PHY_MODE_AUTO",
"prefer_sfp_state": "STATE_ENABLED",
"sfp_media_state": "STATE_DISABLED",
"stp_active_edge_port_state": "STATE_ENABLED",
"stp_enabled_state": "STATE_ENABLED",
"stp_link_type": "STP_LINK_TYPE_AUTO",
"stp_protocol_detection_reset_state": "STATE_DISABLED"
},
"1.2": {
"active_media": "MT_NONE",
"actual_flow_control": "FLOW_CONTROL_PAUSE_NONE",
"bundle_state": "INTERFACE_BUNDLE_NOT_SUPPORTED",
"description": "",
"dual_media_state": "STATE_DISABLED",
"enabled_state": "STATE_ENABLED",
"flow_control": "FLOW_CONTROL_PAUSE_TX_RX",
"learning_mode": "LEARNING_MODE_ENABLE_FORWARD",
"lldp_admin_status": "INTERFACE_LLDP_TXONLY",
"lldp_tlvmap": 130943,
"mac_address": "08:00:27:D4:99:AF",
"media": "MT_10000T_FULL",
"media_option": {
"interface_name": "1.2",
"media_options": [
"MT_10000T_FULL"
]
},
"media_option_sfp": {
"interface_name": "1.2",
"media_options": [
"MT_NONE",
"MT_AUTO"
]
},
"media_sfp": "MT_AUTO",
"media_speed": 10000,
"media_status": "MEDIA_STATUS_UNINITIALIZED",
"mtu": 9198,
"phy_master_slave_mode": "PHY_MODE_AUTO",
"prefer_sfp_state": "STATE_ENABLED",
"sfp_media_state": "STATE_DISABLED",
"stp_active_edge_port_state": "STATE_ENABLED",
"stp_enabled_state": "STATE_ENABLED",
"stp_link_type": "STP_LINK_TYPE_AUTO",
"stp_protocol_detection_reset_state": "STATE_DISABLED"
},
"1.3": {
"active_media": "MT_NONE",
"actual_flow_control": "FLOW_CONTROL_PAUSE_NONE",
"bundle_state": "INTERFACE_BUNDLE_NOT_SUPPORTED",
"description": "",
"dual_media_state": "STATE_DISABLED",
"enabled_state": "STATE_ENABLED",
"flow_control": "FLOW_CONTROL_PAUSE_TX_RX",
"learning_mode": "LEARNING_MODE_ENABLE_FORWARD",
"lldp_admin_status": "INTERFACE_LLDP_TXONLY",
"lldp_tlvmap": 130943,
"mac_address": "08:00:27:FC:A2:E1",
"media": "MT_10000T_FULL",
"media_option": {
"interface_name": "1.3",
"media_options": [
"MT_10000T_FULL"
]
},
"media_option_sfp": {
"interface_name": "1.3",
"media_options": [
"MT_NONE",
"MT_AUTO"
]
},
"media_sfp": "MT_AUTO",
"media_speed": 10000,
"media_status": "MEDIA_STATUS_UP",
"mtu": 9198,
"phy_master_slave_mode": "PHY_MODE_AUTO",
"prefer_sfp_state": "STATE_ENABLED",
"sfp_media_state": "STATE_DISABLED",
"stp_active_edge_port_state": "STATE_ENABLED",
"stp_enabled_state": "STATE_ENABLED",
"stp_link_type": "STP_LINK_TYPE_AUTO",
"stp_protocol_detection_reset_state": "STATE_DISABLED"
},
"mgmt": {
"active_media": "MT_100TX_FULL",
"actual_flow_control": "FLOW_CONTROL_PAUSE_NONE",
"bundle_state": "INTERFACE_BUNDLE_NOT_SUPPORTED",
"description": "",
"dual_media_state": "STATE_DISABLED",
"enabled_state": "STATE_ENABLED",
"flow_control": "FLOW_CONTROL_PAUSE_TX_RX",
"learning_mode": "LEARNING_MODE_ENABLE_FORWARD",
"lldp_admin_status": "INTERFACE_LLDP_TXONLY",
"lldp_tlvmap": 130943,
"mac_address": "08:00:27:90:C5:B7",
"media": "MT_AUTO",
"media_option": {
"interface_name": "mgmt",
"media_options": [
"MT_NONE",
"MT_AUTO",
"MT_10T_FULL",
"MT_10T_HALF",
"MT_100TX_FULL",
"MT_100TX_HALF"
]
},
"media_option_sfp": {
"interface_name": "mgmt",
"media_options": [
"MT_NONE",
"MT_AUTO"
]
},
"media_sfp": "MT_AUTO",
"media_speed": 100,
"media_status": "MEDIA_STATUS_UP",
"mtu": 1500,
"phy_master_slave_mode": "PHY_MODE_AUTO",
"prefer_sfp_state": "STATE_ENABLED",
"sfp_media_state": "STATE_DISABLED",
"stp_active_edge_port_state": "STATE_ENABLED",
"stp_enabled_state": "STATE_ENABLED",
"stp_link_type": "STP_LINK_TYPE_AUTO",
"stp_protocol_detection_reset_state": "STATE_DISABLED"
}
},
"key": {
"/Common/default": {
"file_name": "/Common/default.key",
"flags": 0,
"key_info": {
"bit_length": 2048,
"id": "/Common/default",
"key_type": "KTYPE_RSA_PRIVATE",
"security": "STYPE_NORMAL"
}
}
},
"node": {
"/Common/google2": {
"address": "192.168.0.2",
"connection_limit": 0,
"description": "",
"dynamic_ratio": 1,
"monitor_instance": [
{
"enabled_state": true,
"instance": {
"instance_definition": {
"address_type": "ATYPE_EXPLICIT_ADDRESS",
"ipport": {
"address": "192.168.0.2",
"port": 0
}
},
"template_name": "/Common/gateway_icmp"
},
"instance_state": "INSTANCE_STATE_UP"
}
],
"monitor_rule": {
"monitor_templates": [
"/Common/gateway_icmp"
],
"quorum": 0,
"type": "MONITOR_RULE_TYPE_SINGLE"
},
"monitor_status": "MONITOR_STATUS_UP",
"object_status": {
"availability_status": "AVAILABILITY_STATUS_GREEN",
"enabled_status": "ENABLED_STATUS_ENABLED",
"status_description": "Node address is available"
},
"rate_limit": 0,
"ratio": 1,
"session_status": "SESSION_STATUS_ENABLED"
},
"/Common/gw": {
"address": "192.168.0.1",
"connection_limit": 0,
"description": "",
"dynamic_ratio": 1,
"monitor_instance": [
{
"enabled_state": true,
"instance": {
"instance_definition": {
"address_type": "ATYPE_EXPLICIT_ADDRESS",
"ipport": {
"address": "192.168.0.1",
"port": 0
}
},
"template_name": "/Common/icmp"
},
"instance_state": "INSTANCE_STATE_UP"
}
],
"monitor_rule": {
"monitor_templates": [
"/Common/icmp"
],
"quorum": 0,
"type": "MONITOR_RULE_TYPE_SINGLE"
},
"monitor_status": "MONITOR_STATUS_UP",
"object_status": {
"availability_status": "AVAILABILITY_STATUS_GREEN",
"enabled_status": "ENABLED_STATUS_ENABLED",
"status_description": "Node address is available"
},
"rate_limit": 0,
"ratio": 1,
"session_status": "SESSION_STATUS_ENABLED"
}
},
"pool": {
"/Common/front_pool": {
"action_on_service_down": "SERVICE_DOWN_ACTION_NONE",
"active_member_count": 1,
"aggregate_dynamic_ratio": 0,
"allow_nat_state": "STATE_DISABLED",
"allow_snat_state": "STATE_DISABLED",
"client_ip_tos": 65535,
"client_link_qos": 65535,
"description": "",
"gateway_failsafe_device": "",
"ignore_persisted_weight_state": "STATE_DISABLED",
"lb_method": "LB_METHOD_LEAST_CONNECTION_NODE_ADDRESS",
"member": [
{
"address": "/Common/gw",
"port": 0
}
],
"minimum_active_member": 0,
"minimum_up_member": 0,
"minimum_up_member_action": "HA_ACTION_FAILOVER",
"minimum_up_member_enabled_state": "STATE_DISABLED",
"monitor_association": {
"monitor_rule": {
"monitor_templates": [
"/Common/gateway_icmp"
],
"quorum": 0,
"type": "MONITOR_RULE_TYPE_SINGLE"
},
"pool_name": "/Common/front_pool"
},
"monitor_instance": [
{
"enabled_state": true,
"instance": {
"instance_definition": {
"address_type": "ATYPE_EXPLICIT_ADDRESS_EXPLICIT_PORT",
"ipport": {
"address": "192.168.0.1",
"port": 0
}
},
"template_name": "/Common/gateway_icmp"
},
"instance_state": "INSTANCE_STATE_UP"
}
],
"object_status": {
"availability_status": "AVAILABILITY_STATUS_GREEN",
"enabled_status": "ENABLED_STATUS_ENABLED",
"status_description": "The pool is available"
},
"profile": [],
"queue_depth_limit": 0,
"queue_on_connection_limit_state": "STATE_DISABLED",
"queue_time_limit": 0,
"reselect_tries": 0,
"server_ip_tos": 65535,
"server_link_qos": 65535,
"simple_timeout": 0,
"slow_ramp_time": 10
}
},
"rule": {
"/Common/_sys_auth_krbdelegate": {
"definition": "when HTTP_REQUEST {\n set thecert \"\"\n set ckname F5KRBAUTH\n set ckpass abc123\n set authprofiles [PROFILE::list auth]\n # Search the auth profiles for the krbdelegate(7) and grab cookie info\n foreach profname $authprofiles {\n if { [PROFILE::auth $profname type] == 7 } {\n set tmpckname [PROFILE::auth $profname cookie_name]\n set tmpckpass [PROFILE::auth $profname cookie_key]\n if {[PROFILE::auth $profname cookie_name] != \"\" } {\n set ckname $tmpckname\n set ckpass $tmpckpass\n break\n }\n }\n }\n set seecookie 0\n set insertcookie 0\n # check for the cookie\n if {not [info exists tmm_auth_http_sids(krbdelegate)]} {\n set tmm_auth_sid [AUTH::start pam default_krbdelegate]\n set tmm_auth_http_sids(krbdelegate) $tmm_auth_sid\n AUTH::subscribe $tmm_auth_sid\n } else {\n set tmm_auth_sid $tmm_auth_http_sids(krbdelegate)\n }\n if { [PROFILE::exists clientssl] } {\n set certcmd \"SSL::cert 0\"\n set thecert [ eval $certcmd ]\n }\n if { $thecert == \"\" } {\n # if no cert, assume old kerb delegation\n # if there is no Authorization header and no cookie, get one.\n if { ([HTTP::header Authorization] == \"\") and\n (not [HTTP::cookie exists $ckname])} {\n HTTP::respond 401 WWW-Authenticate Negotiate\n return\n }\n }\n if {[HTTP::cookie exists $ckname]} {\n set ckval [HTTP::cookie decrypt $ckname $ckpass]\n AUTH::username_credential $tmm_auth_sid \"cookie\"\n AUTH::password_credential $tmm_auth_sid $ckval\n set seecookie 1\n } else {\n if { $thecert == \"\" } {\n # Kerberos Delegation - set username\n # Strip off the Negotiate before the base64d goodness\n AUTH::username_credential $tmm_auth_sid [lindex [HTTP::header Authorization] 1]\n }\n else {\n # Protocol Transition - set ttm_auth_sid\n AUTH::username_credential $tmm_auth_sid \"krpprottran\"\n AUTH::cert_credential $tmm_auth_sid $thecert\n }\n AUTH::password_credential $tmm_auth_sid \"xxxx\"\n }\n AUTH::authenticate $tmm_auth_sid\n\n if {not [info exists tmm_auth_http_collect_count]} {\n HTTP::collect\n set tmm_auth_http_successes 0\n set tmm_auth_http_collect_count 1\n } else {\n incr tmm_auth_http_collect_count\n }\n }\n when AUTH_RESULT {\n if {not [info exists tmm_auth_http_sids(krbdelegate)] or \\\n ($tmm_auth_http_sids(krbdelegate) != [AUTH::last_event_session_id]) or \\\n (not [info exists tmm_auth_http_collect_count])} {\n return\n }\n if {[AUTH::status] == 0} {\n incr tmm_auth_http_successes\n }\n # If multiple auth sessions are pending and\n # one failure results in termination and this is a failure\n # or enough successes have now occurred\n if {([array size tmm_auth_http_sids] > 1) and \\\n ((not [info exists tmm_auth_http_sufficient_successes] or \\\n ($tmm_auth_http_successes >= $tmm_auth_http_sufficient_successes)))} {\n # Abort the other auth sessions\n foreach {type sid} [array get tmm_auth_http_sids] {\n unset tmm_auth_http_sids($type)\n if {($type ne \"krbdelegate\") and ($sid != -1)} {\n AUTH::abort $sid\n incr tmm_auth_http_collect_count -1\n }\n }\n }\n # If this is the last outstanding auth then either\n # release or respond to this session\n incr tmm_auth_http_collect_count -1\n if {$tmm_auth_http_collect_count == 0} {\n unset tmm_auth_http_collect_count\n if { [AUTH::status] == 0 } {\n array set pamout [AUTH::response_data]\n HTTP::header replace Authorization \"Negotiate $pamout(krbdelegate:attr:SPNEGO)\"\n if {$seecookie == 0} {\n set insertcookie $pamout(krbdelegate:attr:KRB5CCNAME)\n }\n HTTP::release\n } else {\n HTTP::respond 401 WWW-Authenticate Negotiate \"Set-Cookie\" \"$ckname= ; expires=Wed Dec 31 16:00:00 1969\"\n }\n }\n }\n # When the response goes out, if we need to insert a cookie, do it.\n when HTTP_RESPONSE {\n if {$insertcookie != 0} {\n HTTP::cookie insert name $ckname value $insertcookie\n HTTP::cookie encrypt $ckname $ckpass\n }\n }\ndefinition-signature mILi/VF69pqpNg+XJ4nClBl8+zq4v9FsiBYnKjX3zLZOChRWKt5CwkwpsbCRzx5DnvHglp9uXDYrjqcAFvM5aRA2R5LAhKQSq6pVPwHdZUJluYv0t3n6af/vSyc7KYsx6gga1jLuiFZaEzmG8c+r4igxwEee874iQBjYaWhHyKYGhlhly/Ez2FE9DNRpRepz2sq/jaKzEmmMod3CCXurXVGlC/Pk8qnbNid1yC15DGosrAKW1d8lhYbVBaXVQ1ahrr/UPYnDdHB1BiWUzRSS4uOKuUyUmT/xPI14/Nwv8zdFvlu+AnnD543zH6KhdSHhJ3zCVy2HSZ5wPuN3YswcBA==\n",
"description": ""
},
"/Common/_sys_auth_ssl_cc_ldap": {
"definition": "when CLIENT_ACCEPTED {\n set tmm_auth_ssl_cc_ldap_sid 0\n set tmm_auth_ssl_cc_ldap_done 0\n }\n when CLIENTSSL_CLIENTCERT {\n set tmm_auth_ssl_cc_ldap_done 0\n if {$tmm_auth_ssl_cc_ldap_sid == 0} {\n set tmm_auth_ssl_cc_ldap_sid [AUTH::start pam default_ssl_cc_ldap]\n if {[info exists tmm_auth_subscription]} {\n AUTH::subscribe $tmm_auth_ssl_cc_ldap_sid\n }\n }\n AUTH::cert_credential $tmm_auth_ssl_cc_ldap_sid [SSL::cert 0]\n AUTH::authenticate $tmm_auth_ssl_cc_ldap_sid\n SSL::handshake hold\n }\n when CLIENTSSL_HANDSHAKE {\n set tmm_auth_ssl_cc_ldap_done 1\n }\n when AUTH_RESULT {\n if {[info exists tmm_auth_ssl_cc_ldap_sid] and \\\n ($tmm_auth_ssl_cc_ldap_sid == [AUTH::last_event_session_id])} {\n set tmm_auth_status [AUTH::status]\n if {$tmm_auth_status == 0} {\n set tmm_auth_ssl_cc_ldap_done 1\n SSL::handshake resume\n } elseif {$tmm_auth_status != -1 || $tmm_auth_ssl_cc_ldap_done == 0} {\n reject\n }\n }\n }\ndefinition-signature ngQlx90MhJE25h5RJcXL8JWwGZQjMuOOisHV876CwOSP319nIAr0VTBcAoOWF6x2Y29seinXiUigiQ5mMbo4NhMiE1k20XGO17zsuzhRb/btIbw0auL836WZ26Jss0SRPeJO0aJ7OZ/WP644WGgSu17JPsm34KPw1Ca5ZRy/0hpH4UDFrBYM0QiLdzb1J6J26GnI4JcjmQvbTlHkhJB2GzzZq5ltuBKvv797yEiLh05tcUyz7JrOfmZZA6FWfV3SaCy2c2KT1LQ1LaEGbghh8trhFYY9rdcX41g6T71Y0sej13kkTOZXUVEadWDtaJzYkXQBulVgwG4FxNtamyQfNg==\n",
"description": ""
},
"/Common/_sys_auth_ssl_crldp": {
"definition": "when CLIENT_ACCEPTED {\n set tmm_auth_ssl_crldp_sid 0\n set tmm_auth_ssl_crldp_done 0\n }\n when CLIENTSSL_CLIENTCERT {\n set tmm_auth_ssl_crldp_done 0\n if {$tmm_auth_ssl_crldp_sid == 0} {\n set tmm_auth_ssl_crldp_sid [AUTH::start pam default_ssl_crldp]\n if {[info exists tmm_auth_subscription]} {\n AUTH::subscribe $tmm_auth_ssl_crldp_sid\n }\n }\n AUTH::cert_credential $tmm_auth_ssl_crldp_sid [SSL::cert 0]\n AUTH::cert_issuer_credential $tmm_auth_ssl_crldp_sid [SSL::cert issuer 0]\n AUTH::authenticate $tmm_auth_ssl_crldp_sid\n SSL::handshake hold\n }\n when CLIENTSSL_HANDSHAKE {\n set tmm_auth_ssl_crldp_done 1\n }\n when AUTH_RESULT {\n if {[info exists tmm_auth_ssl_crldp_sid] and \\\n ($tmm_auth_ssl_crldp_sid == [AUTH::last_event_session_id])} {\n set tmm_auth_status [AUTH::status]\n if {$tmm_auth_status == 0} {\n set tmm_auth_ssl_crldp_done 1\n SSL::handshake resume\n } elseif {$tmm_auth_status != -1 || $tmm_auth_ssl_crldp_done == 0} {\n reject\n }\n }\n }\ndefinition-signature Wr7rrhc3cX2sRb1dFv/utR/rA8V4xtQ+3x8DjmlFXs/g/AV0TKd5vxQMHrfvvvGFJadPJG6KSGaKidVlDuU9SYEEisqqnF+gaObvLdLMDNW4uMlD9Rr2FuJ65XHRIGbmFrw6yhWR4pi79Q3a8C7g68CAedq1G45WiKAnlIhaz6HDLAHxDM01Snt/x1+x9j4yC2bM7FiL2MbDMQECVQTteY6au1qgCvumC0greBgbvCkbCtYDnVlRkpBj3BPXgcD0cQ373VxBtcUmoJLFvhxl/Vo8BzmCr1PzmVJjMjCEme26YA0fTr0fpvshrFDhgRFlWhm8o8lPsGxArZ9vVhmNUA==\n",
"description": ""
},
"/Common/_sys_auth_ssl_ocsp": {
"definition": "when CLIENT_ACCEPTED {\n set tmm_auth_ssl_ocsp_sid 0\n set tmm_auth_ssl_ocsp_done 0\n }\n when CLIENTSSL_CLIENTCERT {\n set tmm_auth_ssl_ocsp_done 0\n if {$tmm_auth_ssl_ocsp_sid == 0} {\n set tmm_auth_ssl_ocsp_sid [AUTH::start pam default_ssl_ocsp]\n if {[info exists tmm_auth_subscription]} {\n AUTH::subscribe $tmm_auth_ssl_ocsp_sid\n }\n }\n AUTH::cert_credential $tmm_auth_ssl_ocsp_sid [SSL::cert 0]\n AUTH::cert_issuer_credential $tmm_auth_ssl_ocsp_sid [SSL::cert issuer 0]\n AUTH::authenticate $tmm_auth_ssl_ocsp_sid\n SSL::handshake hold\n }\n when CLIENTSSL_HANDSHAKE {\n set tmm_auth_ssl_ocsp_done 1\n }\n when AUTH_RESULT {\n if {[info exists tmm_auth_ssl_ocsp_sid] and \\\n ($tmm_auth_ssl_ocsp_sid == [AUTH::last_event_session_id])} {\n set tmm_auth_status [AUTH::status]\n if {$tmm_auth_status == 0} {\n set tmm_auth_ssl_ocsp_done 1\n SSL::handshake resume\n } elseif {$tmm_auth_status != -1 || $tmm_auth_ssl_ocsp_done == 0} {\n reject\n }\n }\n }\ndefinition-signature d8lro5/CxaPN2Tl4ktO940QgTQrrt6oPqjWxx2997wwA5kiK+xVeVolBhSFk3znMM07rA2J0A6ff7UqZDn6w1viC7M1QcB0LY0sbjc5YDLXpVBLlQzYLO7jDEb8qjPPLQGpprKzIX/78jTCYvYg9tXT2XkAxnZCuTE/U2SgUbRTHB2EJhmgdXznM/kbRzWWq94k0Y/etrPh5QOggWrskny4RotLOH3urkIJD2wXHlHMZfgtLmS59i/BQzTuBnnW2TGWbmD13mtn49rfkDRPEdhbqOHzMW1si5Lk4c406MXZw/9wEclSFE2EyXvU83EzrgHrh+W06HqyfL+ovZA0C4g==\n",
"description": ""
},
"/Common/_sys_https_redirect": {
"definition": "when HTTP_REQUEST {\n HTTP::redirect https://[getfield [HTTP::host] \":\" 1][HTTP::uri]\n }\ndefinition-signature mwyl4XlRKRMQc0prWs7RtpgPcNfocOKb+MaFwAnQgAuUZZyG68OaGZsOCN3poUOFdHOc6fk2XAdGRmTRiP/7BCT7thsOX5zLFzA1N1wcr57KWVzEZt3ezxVXn2Z974OmbWm7P5Lclcr7N3adrLJMWfyfPPVF1tUYn0IQPD2QNMmfbcbr1oCuO93n/5dn0s6/EacHZGG53hVibW7xQuJXdMtoQ6ArSZ4U3n4vCDTb6NLYbAj6PirVzKY2pcsWFHFUSVrphSFwERc8+0XGHUE6Cb3ihzygoZc2cQ5jk3frFY70MkDluPTShFRbHd7PlMPRezrfkVZVeUHA/iBPcYcD+w==\n",
"description": ""
}
},
"self_ip": {
"/Common/front_ip": {
"address": "192.168.2.200",
"allow_access_list": {
"mode": "ALLOW_MODE_NONE",
"protocol_ports": []
},
"description": "",
"floating_state": "STATE_DISABLED",
"fw_rule": [],
"is_traffic_group_inherited": false,
"netmask": "255.255.255.0",
"traffic_group": "/Common/traffic-group-local-only",
"vlan": "/Common/front"
},
"/Common/rear_ip": {
"address": "192.168.0.201",
"allow_access_list": {
"mode": "ALLOW_MODE_NONE",
"protocol_ports": []
},
"description": "",
"floating_state": "STATE_DISABLED",
"fw_rule": [],
"is_traffic_group_inherited": false,
"netmask": "255.255.255.0",
"traffic_group": "/Common/traffic-group-local-only",
"vlan": "/Common/rear"
}
},
"virtual_address": {
"/Common/0.0.0.0": {
"address": "0.0.0.0",
"arp_state": "STATE_DISABLED",
"connection_limit": 0,
"description": "",
"enabled_state": "STATE_ENABLED",
"icmp_echo_state": "STATE_DISABLED",
"is_floating_state": "STATE_ENABLED",
"netmask": "0.0.0.0",
"object_status": {
"availability_status": "AVAILABILITY_STATUS_BLUE",
"enabled_status": "ENABLED_STATUS_ENABLED",
"status_description": null
},
"route_advertisement_state": "STATE_DISABLED",
"traffic_group": "/Common/traffic-group-1"
}
},
"virtual_server": {
"/Common/all_tcp_front": {
"actual_hardware_acceleration": "HW_ACCELERATION_MODE_NONE",
"authentication_profile": [],
"bw_controller_policy": "",
"clone_pool": [],
"cmp_enable_mode": "RESOURCE_TYPE_CMP_ENABLE_ALL",
"connection_limit": {
"high": 0,
"low": 10
},
"connection_mirror_state": "STATE_DISABLED",
"default_pool_name": "/Common/front_pool",
"description": "",
"destination": {
"address": "/Common/0.0.0.0",
"port": 0
},
"enabled_state": "STATE_ENABLED",
"fallback_persistence_profile": "",
"fw_rule": [],
"gtm_score": {
"high": 0,
"low": 0
},
"last_hop_pool": "",
"nat64_state": "STATE_DISABLED",
"object_status": {
"availability_status": "AVAILABILITY_STATUS_GREEN",
"enabled_status": "ENABLED_STATUS_ENABLED",
"status_description": "The virtual server is available"
},
"persistence_profile": [
{
"default_profile": true,
"profile_name": "/Common/dest_addr"
}
],
"profile": [
{
"profile_context": "PROFILE_CONTEXT_TYPE_ALL",
"profile_name": "/Common/fastL4",
"profile_type": "PROFILE_TYPE_FAST_L4"
}
],
"protocol": "PROTOCOL_ANY",
"rate_class": "",
"rate_limit": 0,
"rate_limit_destination_mask": 0,
"rate_limit_mode": "RATE_LIMIT_MODE_OBJECT",
"rate_limit_source_mask": 0,
"related_rule": [],
"rule": [],
"security_log_profile": [],
"snat_pool": "",
"snat_type": "SNAT_TYPE_NONE",
"source_address": "0.0.0.0/0",
"source_address_translation_lsn_pool": "",
"source_address_translation_snat_pool": "",
"source_address_translation_type": "SRC_TRANS_NONE",
"source_port_behavior": "SOURCE_PORT_PRESERVE",
"translate_address_state": "STATE_DISABLED",
"translate_port_state": "STATE_DISABLED",
"type": "RESOURCE_TYPE_POOL",
"vlan": {
"state": "STATE_DISABLED",
"vlans": []
},
"wildmask": "0.0.0.0"
}
},
"vlan": {
"/Common/front": {
"description": "",
"dynamic_forwarding": [],
"failsafe_action": "HA_ACTION_FAILOVER_ABORT_TRAFFIC_MGT",
"failsafe_state": "STATE_DISABLED",
"failsafe_timeout": 90,
"learning_mode": "LEARNING_MODE_ENABLE_FORWARD",
"mac_masquerade_address": "00:00:00:00:00:00",
"member": [
{
"member_name": "1.1",
"member_type": "MEMBER_INTERFACE",
"tag_state": "MEMBER_UNTAGGED"
}
],
"mtu": 1500,
"source_check_state": "STATE_DISABLED",
"true_mac_address": "08:00:27:17:F3:13",
"vlan_id": 2
},
"/Common/rear": {
"description": "",
"dynamic_forwarding": [],
"failsafe_action": "HA_ACTION_FAILOVER_ABORT_TRAFFIC_MGT",
"failsafe_state": "STATE_DISABLED",
"failsafe_timeout": 90,
"learning_mode": "LEARNING_MODE_ENABLE_FORWARD",
"mac_masquerade_address": "00:00:00:00:00:00",
"member": [
{
"member_name": "1.3",
"member_type": "MEMBER_INTERFACE",
"tag_state": "MEMBER_UNTAGGED"
}
],
"mtu": 1500,
"source_check_state": "STATE_DISABLED",
"true_mac_address": "08:00:27:FC:A2:E1",
"vlan_id": 3
}
}
},
"changed": false,
"invocation": {
"module_args": "include=interface,key,node,pool,rule,self_ip,virtual_address,virtual_server,vlan server=192.168.1.3 user=admin password=admin",
"module_name": "bigip_facts"
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment