Brocade Virtual Traffic Manager: Trafficscript Guide

Total Page:16

File Type:pdf, Size:1020Kb

Brocade Virtual Traffic Manager: Trafficscript Guide 53-1005270-01 3 July 2017 Brocade Virtual Traffic Manager: TrafficScript Guide Supporting 17.3 Copyright © 2017 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, The Effortless Network, VCS, VDX, Vplane, and Vyatta are registered trademarks, and Fabric Vision and vADX are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of others. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. .The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain “open source” software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/en/support/support-tools/oscd.html. Brocade Communications Systems, Incorporated Corporate and Latin American Headquarters Asia-Pacific Headquarters Brocade Communications Systems, Inc. Brocade Communications Systems China HK, Ltd. 130 Holger Way No. 1 Guanghua Road San Jose, CA 95134 Chao Yang District Tel: 1-408-333-8000 Units 2718 and 2818 Fax: 1-408-333-8101 Beijing 100020, China E-mail: [email protected] Tel: +8610 6588 8888 Fax: +8610 6588 9999 E-mail: [email protected] European Headquarters Asia-Pacific Headquarters Brocade Communications Switzerland Sàrl Brocade Communications Systems Co., Ltd. (Shenzhen WFOE) Centre Swissair Citic Plaza Tour B - 4ème étage No. 233 Tian He Road North 29, Route de l'Aéroport Unit 1308 – 13th Floor Case Postale 105 Guangzhou, China CH-1215 Genève 15 Tel: +8620 3891 2000 Switzerland Fax: +8620 3891 2111 Tel: +41 22 799 5640 E-mail: [email protected] Fax: +41 22 799 5641 E-mail: [email protected] Contents Preface.........................................................................................................................................................1 Document Conventions ................................................................................................................................1 Notes and Warnings...............................................................................................................................1 Text Formatting Conventions ...............................................................................................................2 Command Syntax Conventions............................................................................................................2 Brocade Resources .........................................................................................................................................3 Document Feedback ......................................................................................................................................3 Contacting Brocade Technical Support.......................................................................................................3 Brocade Customers.................................................................................................................................3 Brocade OEM Customers ......................................................................................................................4 Chapter 1 - Introduction.............................................................................................................................5 About This Guide ..........................................................................................................................................5 The TrafficScript Language...........................................................................................................................5 TrafficScript Examples ...........................................................................................................................6 Application of Rules......................................................................................................................................7 Using a TrafficScript Rule .............................................................................................................................8 Chapter 2 - TrafficScript Syntax ..............................................................................................................13 Statements.....................................................................................................................................................13 Constants.......................................................................................................................................................14 Variables........................................................................................................................................................14 Expressions ...................................................................................................................................................15 Operators ...............................................................................................................................................15 Type Casts in TrafficScript...................................................................................................................17 Conditionals .................................................................................................................................................18 The “If” Statement................................................................................................................................18 The "switch" Statement ........................................................................................................................19 Loops .............................................................................................................................................................20 Brocade Virtual Traffic Manager: TrafficScript Guide i Contents “for” Loops ............................................................................................................................................20 ‘while’ Loops .........................................................................................................................................20 “do” Loops.............................................................................................................................................21 “foreach” Loops ....................................................................................................................................21 Other Flow Control......................................................................................................................................21 Complex Data Types ...................................................................................................................................22 Arrays.....................................................................................................................................................22 Hashes ....................................................................................................................................................23 The Global Associative Array.............................................................................................................23 The Process-Local Associative Array.................................................................................................24 The Connection-Local Array...............................................................................................................24 Libraries .................................................................................................................................................25 Functions.......................................................................................................................................................26 Escaping Regular Expressions ...................................................................................................................26 Creating New Subroutines in TrafficScript ..............................................................................................27 Syntax .....................................................................................................................................................27 Request and Response Rules......................................................................................................................28 Processing Multiple
Recommended publications
  • Elastic Load Balancing Application Load Balancers Elastic Load Balancing Application Load Balancers
    Elastic Load Balancing Application Load Balancers Elastic Load Balancing Application Load Balancers Elastic Load Balancing: Application Load Balancers Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Elastic Load Balancing Application Load Balancers Table of Contents What is an Application Load Balancer? .................................................................................................. 1 Application Load Balancer components ......................................................................................... 1 Application Load Balancer overview ............................................................................................. 2 Benefits of migrating from a Classic Load Balancer ........................................................................ 2 Related services ......................................................................................................................... 3 Pricing ...................................................................................................................................... 3 Getting started .................................................................................................................................
    [Show full text]
  • Elastic Load Balancing Application Load Balancers Elastic Load Balancing Application Load Balancers
    Elastic Load Balancing Application Load Balancers Elastic Load Balancing Application Load Balancers Elastic Load Balancing: Application Load Balancers Elastic Load Balancing Application Load Balancers Table of Contents What is an Application Load Balancer? .................................................................................................. 1 Application Load Balancer components ......................................................................................... 1 Application Load Balancer overview ............................................................................................. 2 Benefits of migrating from a Classic Load Balancer ........................................................................ 2 Related services ......................................................................................................................... 3 Pricing ...................................................................................................................................... 3 Getting started .................................................................................................................................. 4 Before you begin ....................................................................................................................... 4 Step 1: Configure your target group ............................................................................................. 4 Step 2: Choose a load balancer type ...........................................................................................
    [Show full text]
  • Requests Documentation Release 2.26.0
    Requests Documentation Release 2.26.0 Kenneth Reitz Sep 21, 2021 Contents 1 Beloved Features 3 2 The User Guide 5 2.1 Installation of Requests.........................................5 2.2 Quickstart................................................6 2.3 Advanced Usage............................................. 15 2.4 Authentication.............................................. 30 3 The Community Guide 33 3.1 Recommended Packages and Extensions................................ 33 3.2 Frequently Asked Questions....................................... 34 3.3 Integrations................................................ 35 3.4 Articles & Talks............................................. 35 3.5 Support.................................................. 36 3.6 Vulnerability Disclosure......................................... 36 3.7 Release Process and Rules........................................ 38 3.8 Community Updates........................................... 38 3.9 Release History.............................................. 39 4 The API Documentation / Guide 71 4.1 Developer Interface........................................... 71 5 The Contributor Guide 93 5.1 Contributor’s Guide........................................... 93 5.2 Authors.................................................. 96 Python Module Index 103 Index 105 i ii Requests Documentation, Release 2.26.0 Release v2.26.0. (Installation) Requests is an elegant and simple HTTP library for Python, built for human beings. Behold, the power of Requests: >>>r= requests.get ('https://api.github.com/user',
    [Show full text]
  • Pulse Secure Virtual Traffic Manager: Trafficscript Guide, V19.3
    Pulse Secure Virtual Traffic Manager: TrafficScript Guide Supporting Pulse Secure Virtual Traffic Manager 19.3 Product Release 19.3 Published 15 October, 2019 Document Version 1.0 Pulse Secure Virtual Traffic Manager: TrafficScript Guide Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 www.pulsesecure.net © 2019 by Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Pulse Secure Virtual Traffic Manager: TrafficScript Guide The information in this document is current as of the date on the title page. END USER LICENSE AGREEMENT The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at http://www.pulsesecure.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. © 2019 Pulse Secure, LLC. Pulse Secure Virtual Traffic Manager: TrafficScript Guide Contents PREFACE . 1 DOCUMENT CONVENTIONS . 1 TEXT FORMATTING CONVENTIONS . 1 COMMAND SYNTAX CONVENTIONS . 1 NOTES AND WARNINGS. 2 REQUESTING TECHNICAL SUPPORT . 2 SELF-HELP ONLINE TOOLS AND RESOURCES. 2 OPENING A CASE WITH PSGSC . 3 INTRODUCTION.
    [Show full text]
  • Web Tracking: Mechanisms, Implications, and Defenses Tomasz Bujlow, Member, IEEE, Valentín Carela-Español, Josep Solé-Pareta, and Pere Barlet-Ros
    ARXIV.ORG DIGITAL LIBRARY 1 Web Tracking: Mechanisms, Implications, and Defenses Tomasz Bujlow, Member, IEEE, Valentín Carela-Español, Josep Solé-Pareta, and Pere Barlet-Ros Abstract—This articles surveys the existing literature on the of ads [1], [2], price discrimination [3], [4], assessing our methods currently used by web services to track the user online as health and mental condition [5], [6], or assessing financial well as their purposes, implications, and possible user’s defenses. credibility [7]–[9]. Apart from that, the data can be accessed A significant majority of reviewed articles and web resources are from years 2012 – 2014. Privacy seems to be the Achilles’ by government agencies and identity thieves. Some affiliate heel of today’s web. Web services make continuous efforts to programs (e.g., pay-per-sale [10]) require tracking to follow obtain as much information as they can about the things we the user from the website where the advertisement is placed search, the sites we visit, the people with who we contact, to the website where the actual purchase is made [11]. and the products we buy. Tracking is usually performed for Personal information in the web can be voluntarily given commercial purposes. We present 5 main groups of methods used for user tracking, which are based on sessions, client by the user (e.g., by filling web forms) or it can be collected storage, client cache, fingerprinting, or yet other approaches. indirectly without their knowledge through the analysis of the A special focus is placed on mechanisms that use web caches, IP headers, HTTP requests, queries in search engines, or even operational caches, and fingerprinting, as they are usually very by using JavaScript and Flash programs embedded in web rich in terms of using various creative methodologies.
    [Show full text]
  • Part II Parsing and Disambiguation of Source Code
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/238758491 Analysis and Transformation of Source Code by Parsing and Rewriting Article · January 2005 CITATIONS READS 43 305 1 author: Jurgen Vinju Centrum Wiskunde & Informatica 145 PUBLICATIONS 1,926 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: CROSSMINER: Developer-Centric Knowledge Mining from Large Open-Source Software Repositories View project ASF+SDF Meta-Environment View project All content following this page was uploaded by Jurgen Vinju on 10 January 2014. The user has requested enhancement of the downloaded file. Downloaded from UvA-DARE, the institutional repository of the University of Amsterdam (UvA) http://dare.uva.nl/document/17005 File ID 17005 SOURCE (OR PART OF THE FOLLOWING SOURCE): Type Dissertation Title Analysis and transformation of source code by parsing and rewriting Author J.J. Vinju Faculty Faculty of Science Year 2005 Pages 230 FULL BIBLIOGRAPHIC DETAILS: http://dare.uva.nl/record/165444 Copyright It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other then for strictly personal, individual use. UvA-DARE is a service provided by the library of the University of Amsterdam (http://dare.uva.nl) Analysis and Transformation of Source Code by Parsing and Rewriting ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. mr. P.F. van der Heijden ten overstaan van een door het college voor promoties ingestelde commissie, in het openbaar te verdedigen in de Aula der Universiteit op dinsdag 15 november 2005, te 10:00 uur door Jurgen Jordanus Vinju geboren te Ermelo Promotor: prof.
    [Show full text]
  • Generic Traversal Over Typed Source Code Representations
    i i “main” — 2002/12/19 — 13:02 — page iii — #1 i i Generic Traversal over Typed Source Code Representations i i i i i i “main” — 2002/12/19 — 13:02 — page iv — #2 i i The work reported in this thesis has been carried out at the Center for Mathematics and Computer Science (CWI) in Amsterdam under the auspices of the research school IPA (Institute for Programming research and Algorithmics). i i i i i i “main” — 2002/12/19 — 13:02 — page iii — #3 i i Generic Traversal over Typed Source Code Representations ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. mr. P. F. van der Heijden ten overstaan van een door het college voor promoties ingestelde commissie, in het openbaar te verdedigen in de Aula der Universiteit op vrijdag 14 februari 2003, te 10.00 uur door Johannes Michiel Willem Visser geboren te Middelburg, Nederland i i i i i i “main” — 2002/12/19 — 13:02 — page iv — #4 i i Promotor: prof. dr P. Klint Co-promotor: Dr.-Ing. R. Lammel¨ Faculteit: Faculteit der Natuurwetenschappen, Wiskunde en Informatica Faculteit der Natuurwetenschappen, Wiskunde en Informatica Universiteit van Amsterdam Kruislaan 403 1098 SJ Amsterdam i i i i i i “main” — 2002/12/19 — 13:02 — page v — #5 i i Preface Environment is of decisive importance to the success or failure of a starting re- searcher. To get into a productive research and publication mode, one is helped tremendously by the challenges and examples that others set before him.
    [Show full text]
  • Powerterm Interconnect Series of Products
    PowerTerm® Series Terminal Emulator User's Guide ii PowerTerm Series User’s Guide Important Notice This guide is subject to the following conditions and restrictions: • This User’s Guide provides documentation for the PowerTerm Interconnect series of products. Your specific PowerTerm product might include only a portion of the features documented in this Guide. • The proprietary information belonging to Ericom® Software Ltd. is supplied solely for the purpose of assisting explicitly and properly authorized users of PowerTerm®. • No part of its contents may be used for any other purpose, disclosed to any person or firm, or reproduced by any means, electronic and mechanical, without the express prior written permission of Ericom® Software Ltd. • The text and graphics are for the purpose of illustration and reference only. The specifications on which they are based are subject to change without notice. • The software described in this document is furnished under a license agreement. The software may be used or copied only in accordance with the terms of that agreement. • Information in this document is subject to change without notice. Corporate and individual names and data used in examples herein are fictitious unless otherwise noted. Copyright 2002 Ericom® Software Ltd. Ericom® and PowerTerm® are registered trademarks of Ericom® Software Ltd., which may be registered in certain jurisdictions. Other company and brand, product and service names are trademarks or registered trademarks of their respective holders. iii Table of Contents About This Guide This guide assumes that you are familiar with the operation of the terminal you intend to emulate. The PowerTerm User's Guide is comprised of the following chapters: Chapter 1, Introduction to PowerTerm, presents PowerTerm and describes its main features.
    [Show full text]
  • Database Management Systems Ebooks for All Edition (
    Database Management Systems eBooks For All Edition (www.ebooks-for-all.com) PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sun, 20 Oct 2013 01:48:50 UTC Contents Articles Database 1 Database model 16 Database normalization 23 Database storage structures 31 Distributed database 33 Federated database system 36 Referential integrity 40 Relational algebra 41 Relational calculus 53 Relational database 53 Relational database management system 57 Relational model 59 Object-relational database 69 Transaction processing 72 Concepts 76 ACID 76 Create, read, update and delete 79 Null (SQL) 80 Candidate key 96 Foreign key 98 Unique key 102 Superkey 105 Surrogate key 107 Armstrong's axioms 111 Objects 113 Relation (database) 113 Table (database) 115 Column (database) 116 Row (database) 117 View (SQL) 118 Database transaction 120 Transaction log 123 Database trigger 124 Database index 130 Stored procedure 135 Cursor (databases) 138 Partition (database) 143 Components 145 Concurrency control 145 Data dictionary 152 Java Database Connectivity 154 XQuery API for Java 157 ODBC 163 Query language 169 Query optimization 170 Query plan 173 Functions 175 Database administration and automation 175 Replication (computing) 177 Database Products 183 Comparison of object database management systems 183 Comparison of object-relational database management systems 185 List of relational database management systems 187 Comparison of relational database management systems 190 Document-oriented database 213 Graph database 217 NoSQL 226 NewSQL 232 References Article Sources and Contributors 234 Image Sources, Licenses and Contributors 240 Article Licenses License 241 Database 1 Database A database is an organized collection of data.
    [Show full text]
  • Pulse Secure Virtual Traffic Manager: Trafficscript Guide Supporting Pulse Secure Virtual Traffic Manager 18.2
    Pulse Secure Virtual Traffic Manager: TrafficScript Guide Supporting Pulse Secure Virtual Traffic Manager 18.2 Product Release 18.2 Published 1 August, 2018 Document Version 1.0 Pulse Secure Virtual Traffic Manager: TrafficScript Guide 2 © 2018 Pulse Secure, LLC. Pulse Secure Virtual Traffic Manager: TrafficScript Guide Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 www.pulsesecure.net © 2018 by Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Pulse Secure Virtual Traffic Manager: TrafficScript Guide The information in this document is current as of the date on the title page. END USER LICENSE AGREEMENT The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at http://www.pulsesecure.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. © 2018 Pulse Secure, LLC. Pulse Secure Virtual Traffic Manager: TrafficScript Guide 4 © 2018 Pulse Secure, LLC. Pulse Secure Virtual Traffic Manager: TrafficScript Guide Contents PREFACE . 1 DOCUMENT CONVENTIONS . 1 TEXT FORMATTING CONVENTIONS . 1 COMMAND SYNTAX CONVENTIONS .
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9.426,152 B2 Pieczul Et Al
    USOO9426152B2 (12) United States Patent (10) Patent No.: US 9.426,152 B2 Pieczul et al. (45) Date of Patent: Aug. 23, 2016 (54) SECURE TRANSFER OF WEB APPLICATION (56) References Cited CLIENT PERSISTENT STATE INFORMATION INTO A NEW DOMAIN U.S. PATENT DOCUMENTS 7,194.552 B1* 3/2007 Schneider ........... HO4L 61,3015 (71) Applicant: International Business Machines 709/217 Corporation, Armonk, NY (US) 7,664,724 B2 * 2/2010 Lucovsky ............. GO6F 21,335 707/781 8,504,692 B1 8, 2013 Henderson (72) Inventors: Olgierd S. Pieczul, Dublin (IE): 2004.0054898 A1 3/2004 Chao et al. Mariusz Pajecki, Dublin (IE); Izabela 2005/0204148 A1* 9/2005 Mayo .................. HO4L 63,0815 Pogorzelska-Pieczul, Dublin (IE): T13,185 Mustansir Banatwala, Hudson, NH 2006.0056317 A1 3/2006 Manning et al. (US) (Continued) (73) Assignee: International Business Machines OTHER PUBLICATIONS Corporation, Armonk, NY (US) Nirmal, K.; Ewards, S.E. Vinodh; Geetha, K. Maximizing Online Security by providiniga 3 Factor Authenticationi System to counter (*) Notice: Subject to any disclaimer, the term of this attack Phishing. 2010 International Conference on Emerging patent is extended or adjusted under 35 Trends in Robotics and Communication Technologies. http:// U.S.C. 154(b) by 0 days. ieeexplore.ieee.org/stampfstamp.jsp?tp=&arnumber=5706.185.* (Continued) (21) Appl. No.: 14/326,255 Primary Examiner — Jeremiah Avery (22) Filed: Jul. 8, 2014 (74) Attorney, Agent, or Firm — David B. Woycechowsky; David H. Judson (65) Prior Publication Data US 2016/OO14153 A1 Jan. 14, 2016 (57) ABSTRACT A technique to reassign one or more stored elements of web (51) Int.
    [Show full text]
  • Consumer Market Study on Online Market Segmentation Through
    Consumer market study on online market segmentation through personalised pricing/offers in the European Union Request for Specific Services 2016 85 02 for the implementation of Framework Contract EAHC/2013/CP/04 Final report Ipsos – London Economics – Deloitte consortium June 2018 Justice and Consumers Consumer market study on online market segmentation through personalised pricing/offers in the European Union EUROPEAN COMMISSION Produced by Consumers, Health, Agriculture and Food Executive Agency (Chafea) on behalf of Directorate-General for Justice and Consumers Unit 03 – Economic Analysis & Evaluation Contact: Konstantinos Zisis E-mail: [email protected] European Commission B-1000 Brussels 2 EUROPEAN COMMISSION Consumer market study on online market segmentation through personalised pricing/offers in the European Union Request for Specific Services 2016 85 02 for the implementation of Framework Contract EAHC/2013/CP/04 Final report 2018 3 Consumer market study on online market segmentation through personalised pricing/offers in the European Union Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Find out which disclaimer you need : http://ec.europa.eu/dgs/communication/services/visual_identity/pdf/guidelines-studies-publications-by- external-organisations_en.pdf This report was produced under the EU Consumer Programme (2014-2020) in the frame of a service contract with the Consumers, Health, Agriculture and Food Executive Agency (Chafea) acting under the mandate from the European Commission. The content of this report represents the views of the contractor and is its sole responsibility; it can in no way be taken to reflect the views of the European Commission and/or Chafea or other body of the European Union.
    [Show full text]