Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Utilize a sophisticated global load balancing system built on infrastructure designed for optimal speed and efficiency. The DNS is entirely customizable through APIs and comes equipped with DDoS protection, eliminating the need for physical appliances. Route traffic to the closest application instance and ensure compliance with GDPR regulations by managing traffic routing effectively. Balance workloads across various computing instances, while also identifying and redirecting clients from failed or subpar resource instances. Ensure continuous availability through robust disaster recovery protocols, which automatically identify primary site failures and facilitate zero-touch failover, seamlessly transferring applications to designated or available instances. Streamline the management of cloud-based DNS and load balancing, allowing your operations and development teams to focus on other priorities while benefiting from enhanced disaster recovery solutions. F5’s intelligent cloud-based DNS with global server load balancing (GSLB) adeptly manages application traffic across diverse environments worldwide, conducts health assessments, and automates reactions to different activities and events, thereby sustaining high-performance levels across applications. By implementing this advanced system, organizations can not only improve operational efficiency but also enhance user experience significantly.
Description
Optimize and simplify the management of Kubernetes (north-south) network traffic to ensure reliable, consistent performance at scale, all while maintaining the speed of your applications. Employ advanced application-centric configurations by utilizing role-based access control (RBAC) alongside self-service options to establish security guardrails, allowing your teams to manage their applications with both security and agility. This approach fosters multi-tenancy and reusability while offering simpler configurations and additional benefits. With a native, type-safe, and indented configuration style, you can streamline functionalities such as circuit breaking, advanced routing, header manipulation, mTLS authentication, and WAF. Furthermore, if you're currently utilizing NGINX, the NGINX Ingress resources facilitate a seamless transition of your existing configurations from other environments, enhancing your overall operational efficiency. This not only simplifies your network management but also empowers your development teams to innovate faster.
API Access
Has API
API Access
Has API
Integrations
Amazon EKS
Azure Kubernetes Service (AKS)
Azure Marketplace
Diamanti
F5 Distributed Cloud Platform
Google Kubernetes Engine (GKE)
IBM Cloud Private
Kubernetes
NGINX
Red Hat OpenShift
Integrations
Amazon EKS
Azure Kubernetes Service (AKS)
Azure Marketplace
Diamanti
F5 Distributed Cloud Platform
Google Kubernetes Engine (GKE)
IBM Cloud Private
Kubernetes
NGINX
Red Hat OpenShift
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
F5
Founded
1996
Country
United States
Website
www.f5.com/products/distributed-cloud-services/dns-load-balancer
Vendor Details
Company Name
F5
Founded
1996
Country
United States
Website
www.f5.com/products/nginx/nginx-ingress-controller
Product Features
Load Balancing
Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers
Product Features
Load Balancing
Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers