Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

LB F5 UCS file : how to read it?

Posted on 2014-11-04
3
1,236 Views
Last Modified: 2014-11-08
I have quite a bit of virtual servers to IP address mapping which I would like
to export / extract out.  Heard these are in ucs file format.

How can I read / export them out?
0
Comment
Question by:sunhux
3 Comments
 
LVL 80

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 100 total points
ID: 40423189
F5 has a procedure for you to export the nodes to xml
https://devcentral.f5.com/articles/exporting-ltm-configuration-into-xml
0
 
LVL 63

Accepted Solution

by:
btan earned 400 total points
ID: 40423242
UCS is just another zipped file and once you exported that into your machine, just open the archive (as you can to zip or rar) and look for the "/config/bigip.conf". this txt file contain the virtual servers

below is the listing of all config file content scope
https://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/tmos_management_guide_10_1/tmos_save_and_load_cmds.html#1017919
Stores all configuration objects for managing local application traffic, such as virtual servers, load balancing pools, profiles, and SNATs.
Another mean is via the tmsh of the partition e.g. to get the entire config is to use tmsh save sys config file /var/tmp/myconfig.txt @ https://devcentral.f5.com/questions/listing-a-complete-config-with-partitions-tmsh
0
 

Author Comment

by:sunhux
ID: 40430864
bigip.conf ucs file was what's needed, thanks v much
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question