BIG-IP Analytics

BIG-IP Dashboards

LP_F5 Load Balancer v11_6

This dashboard consists of the following widgets:

Widget Name

Description

Top 10 Failed User Authentication

The top ten failed user authentication due to multiple failed attempts or for the F5 Load Balancer system to process a high volume of invalid credential authentication requests.

Top 10 User Agent by SessionID

The top ten user agents such as web browsers, media players or plug-ins to get onto the internet and access online content based on a session ID that a Web site’s server assigns a specific user agent for the duration of that user’s visit (session).

Failed User Authentication

The user authentication failed or denied during login based on log timestamp, user, host, session ID and message.

User Agent Details - List

A list of user agent details such as which browser is being used, what version and on which operating system based on log timestamp, user agent, device name, device ID, session ID and message.

Top 10 User vs SessionID

The top ten users assigned a session ID by a server to identify and track user activity.

Top 10 DeviceID vs SessionID

The top ten device ID associated with a device from which a user sends a browsing request to the web server and a session ID that allows those users to be identified on a website and assigned to their session.

Top 10 User that Doesn’t Exist

The top ten users whose account may have been permanently deleted because of inactivity. As a result, those users do not exist. A registered user list should be made for this dashboard to work correctly. REGISTERED_USERS should contain all registered users.

Top 10 Successful User Authentication

The top ten successful user authentication by F5 load balancer that verified a user’s session ID allowing them access to an online service or connected device.

Successful vs Failed User Authentication

The count of user authentication that is failed, denied or successful.

Session Details - List

A list of session details provides a holistic view of the performance metrics of the selected session based on log timestamp, device ID, event category, session ID, user agent and message. It helps the administrator correlate available bandwidth’s and network latency’s impact on session score.

Number of Unique External Devices

The number of user agents identified as unique external devices.

Top 10 Distinct DeviceID per User Agent

The top ten distinct device ID in the user agent gives information about the actual device. It allows the administrator to identify browsers and devices.

Time Trend Count

A count on the dynamic view of F5 load balancer that can help forecast future threats.

File Access Error

The error occurred when a file access session request does not meet the configured access policy item for server-side or client-side checks. The administrator can review the access policy configuration and the affected user device.

LP_BIGIP ASM

This dashboard consists of the following widgets:

Widget Name

Description

Trend of Attack

The trend of web application’s threat types such as web scraping, web injection, brute force and JSON web threats counted hourly.

Top 10 Attacks Based on Geolocation

Entails web application attacks such as path traversal and local file inclusion analyzed through its countrywide geolocation. It allows the administrator to identify where threats originate.

Top Attacking Countries

The top web application attack traffic based on countries from where particular applications are hosted on a web server.

Trend of Attack Distribution by Country

The trend of attack distribution to disrupt the normal traffic of a targeted server, service or network by overwhelming the target with a flood of Internet traffic based on countries counted hourly.

Top 10 Attack

The top ten web attacks based on attack occurrence or severity of attacks on a web application and its components.

Top 10 Attack Information

The top ten attack information such as attack types or processes based on log timestamp, host, source address, threat type, source country code, policy, event category, subcategory, domain, malware and violation.

Top 10 Source Address

The top ten source IP address of the host that sent the packets of malicious data to overwhelm computer servers with web application attacks. It allows the administrator to treat certain source IP addresses specifically for a security policy.

Top 10 Destination Address

The top ten destination IP address to which the packets of malicious data were sent.

Top 10 Security Policy by Event Category

The top ten security policies such as automatic or manual security policy created as per the event category to block malicious traffic like traffic that is not compliant with HTTP protocol, has malformed payloads, uses evasion techniques, performs web scraping, contains sensitive information or illegal values.

Top 10 Malware Detected

The top ten malware such as trojan, worms or ransomware that exploits target system vulnerabilities, such as a bug in legitimate web application plug-in that can be hijacked detected by BIG-IP Application Security Manager.

Top 10 Action on Client Request

The top ten actions performed on the target device on a client request.

LP_F5 Load Balancer v11_4_1

This dashboard consists of the following widgets:

Widget

Description

Client Connection Details

Entails successful or failed connection attempts made by the client based on object, client address, virtual address, server address and status.

Traffic Details

The traffic details on the amount of data packets moving across a computer network at any given time based on server address, host, user agent, content type, request method and status_code.

Top 10 LB Servers

The top ten load balancer (LB) server used to distribute network traffic across multiple servers and route users to available resources freeing up busy sites and servers.

Top 10 Virtual Hosts

The top ten virtual hosts providing reachability to destinations when the server is in the inside network and the clients are in the outside network. It allows the administrator to host multiple websites (each with their name and content) on a single server.

Top 10 Content Types

The top ten content types that drive web traffic back to your site.

Top 10 User Agents

The top ten user agents such as web browsers, media players or plug-ins to identify and handle requests from certain types of the traffic requesting online content.

Top 10 Errors from Client

The top ten errors occurred on the client (or user) side of a client-server system, such as a web application based on host, user agent and status code.

Top 10 Error from Server

The top ten errors on the server side based on host, user agent and status code, caused by any number of things from uploading the incorrect file to a bug in a piece of code.

Top 10 Redirect Requests

The top ten redirect requests to forward traffic from one URL to another. The redirection is triggered by a server sending a special redirect response to a request.

Top 10 Successful Requests

The top ten successful requests with status code 2, which denotes the browser has received the expected information.

Top Transection Details

Entails interaction between a client, usually a web browser and server.

Adding the BIG-IP Dashboard

  1. Go to Settings >> Knowledge Base from the navigation bar and click Dashboard.

  2. Select VENDOR DASHBOARD from the drop-down.

  3. Click the Use icon from Actions of the required dashboard.

  4. Click Choose Repos.

Barracuda Ask Repos Panel

Selecting Repos

  1. Select the repo configured to store the BIG-IP logs and click Done.

Barracuda Ask Repos Panel

Selecting Repos

  1. Select the dashboard and click Ok.

You can find the BIG-IP dashboards under Dashboards.

BIG-IP Dashboard

BIG-IP Dashboard

BIG-IP Labels

Labels available in LP_F5 Load Balancer v11_4_1 are:

LABELS

DESCRIPTION

Server,Error,Network,Authentication,Require

Events with the 511 server status.

Server,Error,HTTP,Version,Not,Support

Events with the 505 server status.

Server,Error,Gateway,Timeout

Events with the 504 server status.

Server,Error,Service,Unavailable

Events with the 503 server status.

Server,Error,Bad,Gateway

Events with the 502 server status.

Internal,Server,Error

Events with the 500 server status.

Client,Error,Expectation,Fail

Events with the 416 server status.

Client,Error,Media,Type,Not,Support

Events with the 415 server status.

Client,Error,Request,URL,Too,Long

Events with the 414 server status.

Client,Error,Precondition,Fai

Events with the 412 server status.

Client,Error,Length,Require

Events with the 411 server status.

Client,Error,Conflict

Events with the 409 server status.

Client,Error,Request,Timeout

Events with the 408 server status.

Client,Error,Proxy,Authentication,Require

Events with the 407 server status.

Client,Error,Not,Accept

Events with the 406 server status.

Client,Error,Method,Not,Allow

Events with the 405 server status.

Client,Error,Not,Find

Events with the 404 server status.

Client,Error,Forbidden

Events with the 403 server status.

Client,Error,Authorization,Fail

Events with the 401 server status.

Client,Error,Bad,Request

Events with the 400 server status.

Permanent,Redirect

Events with the 308 server status.

Temporary,Redirect

Events with the 307 server status.

Unused,Response,Code

Events with the 306 server status.

Use,Proxy

Events with the 305 server status.

Cache,Not,Modify

Events with the 304 server status.

Redirect,Other,URL

Events with the 303 server status.

Request,Resource,Not,Change

Events with the 302 server status.

Request,Resource,Change

Events with the 301 server status.

Multiple,Choice

Events with the 300 server status.

Partial,Content

Events with the 206 server status.

Reset,Content

Events with the 205 server status.

Empty,Content

Events with the 204 server status.

Not,Authoritative,Information

Events with the 203 server status.

Successful,Response,Create

Events with the 201 server status.

Request,Successful

Events with the 200 server status.

Labels available in LP_F5 Load Balancer are:

LABELS

DESCRIPTION

User,Create,Successful

Events with the create action, the Command Ok status and the userdb_entry string in raw log.

Delete,User,Successful

Events with the obj_delete action, the Command Ok status and the userdb_entry string in raw log.

Create,User,Role,Successful

Events with the create action, the Command Ok status and the user_role_partition string.

Change,Audit,Service,Stop,Successful

Events with the modify action, the Command Ok status and the db_variable string for config*auditing db_variable_name with disable db_variable_value in raw log.

Change,Audit,Service,Start,Successful

Events with the modify action, the Command Ok status and the db_variable string for config*auditing db_variable_name with enable db_variable_value in raw log.

Modify,Audit,Setting,Successful

Events with the modify action, the Command Ok status and the db_variable string for config*auditing db_variable_name with verbose db_variable_value in raw log.

Change,User,Successful

Events with the modify action, the Command Ok status and the userdb_entry string in all values of -userdb_entry_passwd in raw log.

Change,User,Password,Successful

Events with the modify action, the Command Ok status and the userdb_entry string in all values of userdb_entry_passwd in raw log.

Delete,User,Role,Successful

Events with the obj_delete action, the Command Ok status and the user_role_partition string in all values of user_role_partition_partition in raw log.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support