========================== BIG-IQ Support for rSeries ========================== Currently rSeries support in BIG-IQ will mimic iSeries functionality when vCMP is in use. In iSeries, a vCMP guest can be created via the local host CLI, webUI, or API and it can then be imported into BIG-IQ as a device. From there, statistics/analytics can be gathered, and L4-7 configurations can be managed in a variety of ways. An rSeries tenant will behave identically to an iSeries vCMP guest from a BIG-IQ perspective, meaning you can import it after it has been created to manage configuration and/or visualize analytics. When an rSeries tenant is created, it can be imported as a device into BIG-IQ. It will import just like any other BIG-IP instance or device. Once imported, it will show up with a Type of **BIG-IP Tenant**. .. image:: images/bigiq_support_for_rseries/image1.png :align: center :scale: 70% rSeries tenants can also be onboarded in BIG-IQ using Declarative Onboarding (DO). Once a tenant is created via one of the rSeries F5OS interfaces, you can run a DO declaration like the one below to BIG-IQ to provision, configure, and import it. In the DO declaration you will specify a **targetHost** which is the IP address of the tenant to be onboarded. The following is an example of a DO declaration for onboarding an rSeries tenant: .. code-block:: bash POST https://{{BigIQ_Mgmt}}/mgmt/shared/declarative-onboarding .. code-block:: json { "class": "DO", "declaration": { "schemaVersion": "1.5.0", "class": "Device", "async": true, "Common": { "class": "Tenant", "hostname": "tenant1.appliance1.f5demo.net", "myProvision": { "class": "Provision", "avr": "nominal", "ltm": "nominal" }, "myDns": { "class": "DNS", "nameServers": [ "192.168.10.0", "192.168.10.1" ] }, "myNtp": { "class": "NTP", "servers": [ "time.f5net.com" ], "timezone": "UTC" }, "internal-localself": { "class": "SelfIp", "address": "10.10.11.110/24", "vlan": "vlan-3010", "allowService": "all", "trafficGroup": "traffic-group-local-only" }, "internal-self": { "class": "SelfIp", "address": "10.10.11.120/24", "vlan": "vlan-3010", "allowService": "all", "trafficGroup": "traffic-group-1" }, "external-localself": { "class": "SelfIp", "address": "10.10.12.110/24", "vlan": "vlan-3011", "trafficGroup": "traffic-group-local-only", "allowService": "default" }, "external-self": { "class": "SelfIp", "address": "10.10.12.120/24", "vlan": "vlan-3011", "trafficGroup": "traffic-group-1", "allowService": "default" }, "ha-localself": { "class": "SelfIp", "address": "10.10.13.110/24", "vlan": "vlan-500", "trafficGroup": "traffic-group-local-only", "allowService": "default" }, "configsync": { "class": "ConfigSync", "configsyncIp": "10.10.13.110" }, "failoverAddress": { "class": "FailoverUnicast", "address": "10.10.13.110" }, "failoverGroup": { "class": "DeviceGroup", "type": "sync-failover", "members": [ "10.10.13.110", "10.10.13.244" ], "owner": "10.10.13.110", "autoSync": true, "saveOnAutoSync": false, "networkFailover": true, "fullLoadOnSync": false, "asmSync": false }, "trust": { "class": "DeviceTrust", "localUsername": "{{Tenant_Username}}", "localPassword": "{{Tenant_Password}}", "remoteHost": "{{Appliance1_Tenant1_IP}}", "remoteUsername": "{{Tenant_Username}}", "remotePassword": "{{Tenant_Password}}" }, "myDbVariables": { "class": "DbVariables", "ui.advisory.enabled": "true", "ui.advisory.color": "blue", "ui.advisory.text": "This is rSeries Tenant1 on Appliance1." }, "admin": { "class": "User", "userType": "regular", "shell": "bash", "partitionAccess": { "all-partitions": { "role": "admin" } }, "password": "{{Tenant_Password}}" }, "root": { "class": "User", "userType": "root", "newPassword": "{{Tenant_Password}}", "oldPassword": "{{Tenant_Password}}" } } }, "targetHost": "{{Appliance1_Tenant1_IP}}", "targetUsername": "admin", "targetPassphrase": "admin", "bigIqSettings": { "failImportOnConflict": false, "conflictPolicy": "USE_BIGIQ", "deviceConflictPolicy": "USE_BIGIP", "versionedConflictPolicy": "KEEP_VERSION", "clusterName": "Tenant1-Cluster", "statsConfig": { "enabled": true, "zone": "default" }, "snapshotWorkingConfig": false } } Shortly after the declaration is sent to BIG-IQ, you can see a new onboarding task. This will take a while to complete as it may require reboots of the tenant for module provisioning. After the tenant is onboarded, it will be imported into BIG-IQ. .. image:: images/bigiq_support_for_rseries/image2.png :align: center :scale: 70% At this point the rSeries tenant is managed just like any other BIG-IP device or guest inside of BIG-IQ. You can manage software upgrades, create, and restore backups, maintain configurations, and gather analytics. F5OS Backup for rSeries ========================== The configuration and monitoring of the F5OS platform layer is not managed by BIG-IQ, it must be managed locally on the rSeries appliance using the F5OS CLI, webUI, API or SNMP. The exception is that scheduled backups for F5OS configuration has been added in BIG-IQ version 8.3. This new functionality allows for rSeries and/or VELOS devices to be added to BIG-IQ for the purpose of backing up their F5OS configurations. The management IP address of the F5OS layer belonging to the rSeries appliance or VELOS system controller is added to the **F5OS** section in BIG-IQ. From this section, device credentials can be added to access the F5OS platform layer, and backups may be scheduled or created on demand. The F5OS tenants are backed up using the normal **Backup & Restore** workflows in BIG-IQ, just as any BIG-IP instance or vCMP guest would be. **IMPORTANT: The F5 rSeries system uses a primary key to perform encryption and decryption of highly sensitive passwords/passphrases in the configuration database. You should set this primary key prior to performing any configuration backup if you have not already done so. In the case of a configuration migration such as moving configuration to a replacement device due to RMA, it is important to set the primary key to a known value so that the same key can be used to decrypt the passwords/passphrases in the configuration restored on the replacement device. More details are in the K article below.** `K47512994: Back up and restore the F5OS-A configuration on an rSeries system `_ Below are the two sections needed to fully restore an rSeries appliance. The **Backup & Restore** section is used for the F5OS tenants, and the **F5OS** section is used to backup the F5OS platform layer. .. image:: images/bigiq_support_for_rseries/image3.png :align: center :scale: 70% Below is an example of a scheduled backup where VELOS and/or rSeries devices can be added to a scheduled backup. This will backup the F5OS platform layer only, F5OS tenants are backed up using the normal **Backup & Restore** workflows in BIG-IQ. .. image:: images/bigiq_support_for_rseries/image4.png :align: center :scale: 70% If a restore of the F5OS layer needs to occur, this is not facilitated from BIG-IQ. You will need to download the saved backup you wish to restore for F5OS from the BIG-IQ system, and then follow the restoration procedures as outlined in the article below. `K47512994: Back up and restore the F5OS-A configuration on an rSeries system `_ Note: You will need to have the passwords used to encrypt the primary key before restoring the F5OS configuration. Tenant configurations are restored separately from the F5OS layer.