As the old adage goes, “You can’t manage what you can’t measure.” In light of digital transformation initiatives quickly becoming a “checkbox” for modern enterprises, effective management of app services—and the devices that power them—is paramount. It’s also not easy, simple, or straightforward, especially in the multi-cloud world. That is why F5 is so dedicated to delivering end-to-end app visibility and control from code to customer.
According to F5’s latest State of Application Services report, 58% of respondents say that the most challenging aspect of multi-cloud operations is maintaining security, policy, and compliance of apps and the services that power them. If visibility and control are such big issues for networking pros, security teams, and app owners alike, it stands to reason that successfully identifying and fixing problems when they occur is equally challenging.
So, in this complex world of multi-and-hybrid cloud architectures, digital transformation, and app proliferation, the question becomes, “How can one maintain consistency, gain visibility, and enable simple troubleshooting of applications and the services and devices that support them?”
Enter BIG-IQ Centralized Management
In a previous post, we covered the BIG-IQ 7.0 release and how it helps network, security, and app teams effectively taking control of their F5 estate and ensure that application capital is protected. BIG-IQ essentially creates a “one-stop” BIG-IP management shop with features and functionality that include end-to-end app services management, security-specific dashboards, and tight integrations with the declarative F5 Automation Toolchain.
In short, BIG-IQ is an easy button for taking control of BIG-IP.
But no product is perfect. At F5, priority one is delighting our customers. And that means when they provide us with input and feedback, we listen. When talking to customers about BIG-IQ there is a common thread: A particular adoption and deployment blocker that involves deploying an application service without using a template or without using BIG-IQ. This “brownfield” or “legacy” application service scenario could result in limited visibility of that application service—no application dashboards, no deep analytics, no simple troubleshooting.
We thought customers would find BIG-IQ’s robust app-centric visibility compelling enough to redeploy their applications with a template—and it was for some. But others, especially those with particularly large estates of existing application services, were not as interested in this approach. It simply wasn’t feasible for them to redeploy all of these BIG-IP services.
We Heard You Loud and Clear
BIG-IQ 7.1 is exciting in part because it directly addresses the issue mentioned above. For the first time, users can gain an app-centric view into legacy application services that were either deployed without a template or not using BIG-IQ at all.
That means both administrators and application owners (with appropriate permissions) can gain visibility into the overall health, security status, and performance of BIG-IP app delivery and security services from a unified application-centric dashboard.
In addition to visibility, BIG-IQ 7.1 makes it possible for administrators and their trusted application owners to enact basic changes—such as enabling and disabling virtual servers and pool members—to their legacy app services and devices from the app-centric dashboard. App owners can now move faster, as they no longer have to submit tickets to network teams. Networking teams will no longer “drown” in these request tickets or have to find extremely narrow windows to work in—pain points that we heard and actively work to address.
Beyond support for legacy app visibility and control, BIG-IQ 7.1 includes:
- Overall simplification of security and networking operations
- Analytics, monitoring, and visibility into TCP app services profiles—one of the most common app protocols used
- Presenting and grouping of interrelated app services as a “single” service
- Increased scale of BIG-IP device management
Additionally, BIG-IQ 7.1 helps provide consistent security across platforms and enables unified management. Some of the highlights include:
- Support for anti-bot detection and protection profiles
- Enhanced Behavioral DoS visibility and analytics dashboard
- Improved web application security management through event logs
- Supports scaled deployment options
- Support for web app security policy template creation
- Full web app security management and visibility on automated actions for AS3-enabled apps
- Integration with “Let’s Encrypt” for simplified certificate management
- Enhanced logging capabilities for SSL Orchestrator
In short, BIG-IQ 7.1 represents a series of vast improvements to an already powerful solution for holistic management of your BIG-IP estate.
For more information on this exciting development, visit: https://f5.com/bigiq
About the Author
Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
F5 Silverline: Our Data Centers are your Data Centers
Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.
Volterra and the Power of the Distributed Cloud (Video)
How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.
The Internet of (Increasingly Scary) Things
There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...