gtm monitor ldap
gtm monitor ldap(1) BIG-IP TMSH Manual gtm monitor ldap(1)
NAME
ldap - Configures a Lightweight Directory Access Protocol (LDAP) monitor.
MODULE
gtm monitor
SYNTAX
Configure the ldap component within the gtm monitor module using the syntax in the following sections.
CREATE/MODIFY
create ldap [name]
modify ldap [name]
options:
base [none | [string] ]
chase-referrals [ no | yes ]
debug [no | yes]
defaults-from [name]
description [string]
destination [ [ ipv4 address[:port] ] | [ ipv6 address[.port] ] ]
filter [ [LDAP key] | none]
ignore-down-response [enabled | disabled]
interval [integer]
mandatory-attributes [no | yes]
password [none | [password] ]
probe-timeout [integer]
security [none | ssl | tls]
timeout [integer]
username [ [name] | none]
edit ldap [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
DISPLAY
list ldap
list ldap [ [ [name] | [glob] | [regex] ] ... ]
show running-config ldap
show running-config ldap [ [ [name] | [glob] | [regex] ] ... ]
options:
all-properties
non-default-properties
one-line
partition
DELETE
delete ldap [name]
Note: You cannot delete default monitors.
DESCRIPTION
You can use the ldap component to configure a custom monitor, or you can use the default LDAP monitor that the
Global Traffic Manager provides. This type of monitor verifies the LDAP service by attempting to authenticate
the specified user.
EXAMPLES
create ldap my_ldap defaults-from ldap
Creates a monitor named my_ldap that inherits properties from the default LDAP monitor.
list ldap
Displays the properties of all of the LDAP monitors.
OPTIONS
base Specifies the location in the LDAP tree from which the monitor starts the health check. A sample value is
dc=bigip-test,dc=net. The default value is none.
chase-referrals
Specifies whether the monitor upon receipt of an LDAP referral entry chases that referral. The default
value is yes.
The options are:
no Specifies that the system will treat a referral entry as a normal entry and refrain from querying
the remote LDAP server(s) pointed to by the referral entry.
yes Specifies that the system upon receiving any referral entry from the monitored LDAP server query,
the system will then query the corresponding LDAP server(s) pointed to by the LDAP query. If the
query for the referral is unsuccessful the system will mark the monitored LDAP server down.
debug
Specifies whether the monitor sends error messages and additional information to a log file created and
labeled specifically for this monitor. You can use the log information to help diagnose and troubleshoot
unsuccessful health checks.
The default value is no. The options are:
no Specifies that the system does not redirect error messages and additional information related to
this monitor.
yes Specifies that the system redirects error messages and additional information to the
/var/log/monitors/--.log file.
defaults-from
Specifies the name of the monitor from which you want your custom monitor to inherit settings. The
default value is ldap.
description
User defined description.
destination
Specifies the IP address and service port of the resource that is the destination of this monitor. The
default value is *:*.
Possible values are:
*:* Specifies to perform a health check on the address and port supplied by a pool member.
*:port
Specifies to perform a health check on the server with the IP address supplied by the pool member
and the port you specify.
IP address:port
Specifies to mark a pool member up or down based on the response of the server at the IP address and
port you specify.
filter
Specifies an LDAP key for which the monitor searches. A sample value is objectclass=*. The default value
is none.
glob Displays the items that match the glob expression. See help glob for a description of glob expression
syntax
ignore-down-response
Specifies whether the monitor ignores a down response from the system it is monitoring. The default value
is disabled.
interval
Specifies the frequency at which the system issues the monitor check. The default value is 10 seconds.
mandatory-attributes
Specifies whether the target must include attributes in its response to be considered up. The default
value is no. The options are:
no Specifies that the system performs only a one-level search (based on the value of the filter
option), and does not require that the target returns any attributes.
yes Specifies that the system performs a sub-tree search, and if the target returns no attributes, the
target is considered down.
name Specifies a unique name for the component. This option is required for the commands create, delete, and
modify.
partition
Displays the administrative partition within which the component resides.
password
Specifies the password if the monitored target requires authentication. The default value is none.
probe-timeout
Specifies the number of seconds after which the BIG-IP(r) system times out the probe request to the BIG-
IP system. The default value is 5 seconds.
regex
Displays the items that match the regular expression. The regular expression must be preceded by an at
sign (@[regular expression]) to indicate that the identifier is a regular expression. See help regex for
a description of regular expression syntax.
security
Specifies the secure communications protocol that the monitor uses to communicate with the target. The
default value is none.
The options are:
none Specifies that the system does not use a security protocol for communications with the target.
ssl Specifies that the system uses the SSL protocol for communications with the target.
tls Specifies that the system uses the TLS protocol for communications with the target.
timeout
Specifies the number of seconds the target has in which to respond to the monitor request. The default
value is 31 seconds.
If the target responds within the set time period, it is considered up. If the target does not respond
within the set time period, it is considered down. Also, if the target responds with a RESET packet, the
system immediately flags the target as down without waiting for the timeout interval to expire.
username
Specifies the username, if the monitored target requires authentication. The default value is none.
SEE ALSO
create, delete, edit, glob, gtm pool, list, modify, regex, show, tmsh
COPYRIGHT
No part of this program may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.
F5 Networks and BIG-IP (c) Copyright 2008-2010, 2013-2014, 2016. All rights reserved.
BIG-IP 2017-08-15 gtm monitor ldap(1)