Check example application is running

From the Visual Studio Code Terminal, invoke terraform output.

terraform output | grep Bigip1VipEipAddress

…Ctrl + click on the Bigip1VipEipAddress=. This is the same Elastic IP we just reviewed in the AWS Console.

../../_images/11_f5_aws_console_virtual_server.png

We are using self-signed certificates in the lab. Bypass the TLS warnings. “Accept the Risk and Continue”. You will see the example app.

../../_images/12_f5_example_app.png

Survive a fail-over event across Availability Zones

From the AWS Console, Services => EC2 => NETWORK & SECURITY => Elastic IPs. Note the Elastic IP address (public IPv4 address) mapping for the Secondary IP address of our Active Big-IP1 (10.0.1.x).

../../_images/13_f5_aws_console_elastic_ip_before_failover.png

Big-IP1 => Device Management => Devices => Self => [Force to Standby]. Click [OK] to confirm.

../../_images/14_f5_bigip1_force_to_standby.png

Big-IP2 is now active.

../../_images/15_f5_bigip2_confirm_now_active.png

From the AWS Console, Services => EC2 => NETWORK & SECURITY => Elastic IPs. Note the Elastic IP address (public IPv4 address) mapping for the Secondary IP has changed to the new Active Big-IP2 (10.0.2.x). Hit the refresh icon in the upper-right-hand side a few times until you notice the change.

../../_images/16_f5_bigip2_confirm_elastic_ip_moved.png

Back to the example app screen. We are using self-signed certificates in the lab. Bypass the TLS warnings. “Accept the Risk and Continue”. You will see the example app now behind the new active Big-IP2.

../../_images/17_f5_bigip2_confirm_example_app.png

Attention

The example application reports which Availability Zone is serving up the content (pool member), not which Availability Zone is hosting the active Big-IP.