Applies To:
Show Versions
BIG-IQ Security
- 4.2.0
About snapshots
BIG-IQ Security uses snapshots to protect the working-configuration set of the Security module. Thus, at any time, you can back up, restore, and deploy the BIG-IQ working configuration to a specific configuration state, or deploy a specific set of working configuration edits back to a BIG-IP device. You can also compare one snapshot against another, or compare a snapshot against the BIG-IQ working configuration.
The Snapshots panel displays a list of imported snapshots under the naming convention Import-self-ip. For example: Import-10.64.6.111. You can create a snapshot when you create a new deployment, or you can add snapshots through the New Snapshot panel and name the snapshot according to your own convention.
Adding snapshots
- Navigate to the Snapshots panel.
- Hover in the Snapshots banner and click the + icon to display the New Snapshot panel.
-
Edit the property fields as required.
Option Description Name Enter a name for the snapshot. Description Enter a description (optional) that will assist in remembering the reason for the snapshot.
Comparing snapshots
Restoring the working configuration from a snapshot
From the expanded panel, you can restore the working configuration using a selected snapshot as input. This process does not delete any shared objects that might have been added since the snapshot was taken.
- Navigate to the Snapshots panel.
- Hover over the snapshot containing the configuration you want to restore to, and click the gear icon to expand and display the panel.
- In the expanded panel, click the Compare tab.
-
In the Compare tab, you can compare the selected snapshot against the
Working Configuration or another
Snapshot.
Option Description Working Configuration If you select Working Configuration and click Evaluate, a popup screen displays the differences in the JSON between the snapshot (at left in the table) and the working configuration (at right in the table). Click any row to view the JSON for the two objects. Differences are listed by: name (name of the shared object), type (type of object), change (added, modified, deleted), and device (blank unless the type is firewall). Click any row to view the JSON for the two objects.
Snapshot If you select Snapshot, specify the snapshot selected by clicking Select Snapshot or by dragging-and-dropping a snapshot to the Compare against field. Then, click Evaluate to view the differences in the JSON between the two snapshots.
Differences are listed by: name (name of the shared object), type (type of object), change (added, modified, deleted), and device (blank unless the type is firewall).Click any row to view the JSON for the two objects.
- When you are satisfied that you are restoring the correct configuration, click Restore at the top of the expanded panel.
- In the popup screen, click OK to confirm that you want to continue. This popup screen explains that you cannot interrupt the restore process and that it provides an all-or-nothing restoration.
- Click Close when you receive the confirmation popup screen.