Posts

F5-Big IP iHealth

Image
Proactive Security: Identifying BIG-IP Vulnerabilities Using QKView and iHealth In the world of Application Delivery Controllers (ADC), the F5 BIG-IP is a powerhouse. But as any seasoned NetOps engineer knows, high performance must be matched by high security. Manually tracking every CVE (Common Vulnerabilities and Exposures) against your specific configuration is nearly impossible. This is where the combination of QKView and F5 iHealth becomes your most valuable security audit tool. Step 1: Collect Your BIG-IP Snapshot (QKView) The first step in any health or security audit is taking a snapshot of your system's current state. The QKView utility gathers configuration data, logs, and performance metrics into a single .qkview file. How to generate it: Login: Access the BIG-IP GUI (Configuration Utility). Pro Tip: Always log in to the Standby node first to ensure no management-plane overhead affects active traffic. Navigate: Go to System > Support . Start: Ensure the ...

Monitoring and Performance on Linux System

Linux Performance Monitoring: sar vs. The Alternatives In our previous post, we looked at sar for CPU monitoring. However, on many Red Hat or CentOS minimal installs, sysstat might not be present. As a Linux engineer, you need a "Plan B." Today, we’ll explore how to get identical results using mpstat and the batch-mode capability of top . The Original Goal: Monitoring CPU You previously used: sar -u 1 3 This gave you a snapshot of %user , %system , and %iowait . Let’s look at how to get that same data with different tools. Alternative 1: mpstat (Multi-Processor Statistics) If you are on a modern RHEL system with multiple CPU cores, mpstat is often more descriptive than sar . It is also part of the sysstat suite but focuses specifically on CPU breakdown. The Command: Bash mpstat 1 3 The Output: Plaintext Linux 4.18.0 (cdk-pol-prod2) 02/24/2026 _x86_64_ (2 CPU) 09:45:01 AM CPU %usr %nice %sys %iowait %irq %soft %steal %guest %gnice %idle 0...