Applies To:Show Versions
BIG-IQ Centralized Management
Evaluate LTM configuration changes
- At the top of the screen, clickDeployment.
- UnderEVALUATE & DEPLOY, selectLocal Traffic & Network.The screen opens a list of LTM evaluations and deployments that have been created on this device.
- Under Evaluations, clickCreate.The New Evaluation screen opens.
- If the device to which you are deploying these changes is in a silo as part of a conflict resolution work flow, select thatSilohere; otherwise, leave the default setting.
- Type aNameand an optionalDescriptionfor the evaluation task you are creating.
- Type a briefDescriptionfor the evaluation task you are creating.
- For theSource, select what you want to evaluate.
- When you want to compare the object settings currently on the managed device with the object settings in the pending version, selectCurrent Changes.
- When you want to compare the object settings currently on the managed device with the object settings in a stored snapshot, selectExisting Snapshot, then choose the snapshot you want to use.
- Determine theSource Scope; that is, choose whether you want to evaluate all of the changes from the selected source, or specify which changes to evaluate (eitherAll ChangesorPartial Changes).If you choose to do a partial deployment, the screen displays additional controls.If you selectAll Changes, skip the rest of this step.
- If you want to evaluate changes only to the selected objects, forSupporting Objects, clear theIncludecheck box. It is almost always best to evaluate changes to the associated objects, as well.The objects that you manage using BIG-IQ depend on associations with other, supporting objects. These object associations form relationship trees that are sometimes quite complex. Generally, when you deploy a change to a managed object, it is a very good idea to include these supporting objects in the deployment. This diagram illustrates a typical relationship tree for a Network Services managed object. For Local Traffic objects, the trees are equally complex and just as vital to include.
- Under Available, select the object type for which you want to evaluate changes.
- From the list of objects, select the ones that you want to deploy, and move them to the Selected list.If you include objects in an deployment that have not been changed, the unchanged objects are not deployed to your BIG-IP device. Only objects that have been changed are deployed.
- If you want to include additional object types in this deployment, repeat the last two sub-steps (steps 3 and 4) for each object type.
- If you add an object to the deployment and then change your mind, you can move it back to the Available list.
- Under Target Device(s), clickFind Relevant Devices.The objects you select for deployment determine which devices display in theAvailablelist. You cannot deploy a device-specific object (like a pool) to a device on which it does not already exist. You can deploy a shared object (like a profile) to a device on which it does not exist, as long as the shared object is referenced by an object on that device. For example, consider a device (BIG-IP1) with a virtual server (Virt1). If you add a profile namedPro1toVirt1, thenBIG-IP1will appear in the list of devices that you can deploy changes to.BIG-IQ lists all devices to which you can deploy the selected objects.
- From the list of relevant devices, select the devices that you want to deploy these changes to, and move them to the Selected list.
- If you selectedAll Changes, there are a couple of extra options to specify.
- Specify whether you want unused objects to be deleted from the BIG-IP devices to which you are deploying changes. If you do not want unused objects to be deleted, selectKeep Unused Objects.To understand what an unused object is, consider the following example:There are two address lists on the BIG-IP device to which you are about to deploy changes (AddressList-aandAddressList-b).
If you leaveRemove Unused Objects(the default) selected, then when you deploy changes to the BIG-IP device,AddressList-bis deleted. If you don’t want it deleted, selectKeep Unused Objects.
- AddressList-ais referenced by a policy that is in turn referenced by a firewall context.
- AddressList-bis not referenced (directly or indirectly) by any objects.
- From the Available list under Target Devices, select the devices to which you want to deploy changes, and move them to the Selected list.If you deploy changes to a device in a DSC cluster, you must make changes to all devices in the cluster before you can create the evaluation.
- Click theCreatebutton at the bottom of the screen.The system adds the new evaluation to the list, and analyzes the changes for errors. When the configuration evaluation finishes, you see how many changes or errors the evaluation found.
- Review the evaluation to determine whether you are going to deploy it.
- If there are critical errors, you cannot deploy these changes. In the Critical Errors column, click each error to see what it is, and then go back to where you made the change to fix it.After resolving any critical errors, you can come back and repeat the evaluation.
- If there are verification warnings, you can still deploy your changes, but you will probably want to resolve the warnings first. In the Verification Warnings column, click each warning to see what it is, and then go back to where you made the change to fix it.After resolving any verification warnings, you can come back and repeat the evaluation.
- If there are no critical errors or verification warnings, review the changes by clicking theviewlink.Each change is listed. You can review each one by clicking the name.When you create an evaluation to deploy an ASM or AFM object that is referenced by a Local Traffic & Network object, it can trigger a verification error. This occurs for a few related object types that require manual intervention before you can deploy objects that reference them. To deploy these objects, you must deploy the related object and the object that references it using the Local Traffic & Network user interface. In some cases, before you deploy, you need to pin the related object to a pinning policy that establishes the relationship between a device and that object.
Managing Object PinninginF5 BIG-IQ Centralized Management: Securityonsupport.f5.com.
- If you get a verification error that requires a Local Traffic & Network deployment, use the partial deployment option to deploy the Local Traffic & Network object. After you complete the partial deployment, you can complete the deployment that triggered the error.
- If you get a verification error with aPin Objectbutton that requires a Local Traffic & Network deployment, click the button to associate the two objects, and then use the partial deployment option to deploy the Local Traffic & Network object. After you complete the partial deployment, you can complete the deployment that triggered the error.
- When you finish reviewing the differences, clickCancel.