Explore and Analyze BIG-IP Events

After Logpoint ingests BIG-IP logs:

  • Use Search to access and examine events.

  • View events in real time through Dashboards.

Use the following queries to explore common BIG-IP events:

Scenario
Search Query

All BIG-IP logs

col_type IN ["bigip", "f5"]

All normalized BIG-IP events

norm_id = "F5*" OR norm_id = "BIGIP*"

Failed authentication events

norm_id = "F5*" label = "Authentication" label = "Fail"

Successful authentication

norm_id = "F5*" label = "Authentication" label = "Successful"

ASM attack detections

norm_id = "F5ASM" label = "Attack"

Malware detections

norm_id = "F5*" label = "Malware"

Client errors (4xx)

norm_id = "F5*" label = "Client" label = "Error"

Server errors (5xx)

norm_id = "F5*" label = "Server" label = "Error"

Successful requests (2xx)

norm_id = "F5*" label = "Request" label = "Successful"

Security policy violations

norm_id = "F5ASM" label = "Violation"

User account operations

norm_id = "F5*" label IN ["Create", "Delete", "Modify"] label = "User"

Load balancer traffic

norm_id = "F5LTM"

Virtual server traffic

norm_id = "F5*" virtual_server = *

Connection resets

norm_id = "F5*" label = "Reset"


Dashboards

LP_F5 Load Balancer v11_6 Dashboard

The LP_F5 Load Balancer v11_6 dashboard provides real-time insights into user authentication, session management, and device tracking across your BIG-IP environment. It helps you monitor authentication success/failure rates, track user sessions, identify external devices, analyze user agent behavior, and investigate file access errors.

Dashboard Widgets:

Widget Name
Description

Top 10 Failed User Authentication

The top ten failed user authentication due to multiple failed attempts or for the F5 Load Balancer system to process a high volume of invalid credential authentication requests.

Top 10 User Agent by SessionID

The top ten user agents such as web browsers, media players or plug-ins to get onto the internet and access online content based on a session ID that a Web site's server assigns a specific user agent for the duration of that user's visit (session).

Failed User Authentication

The user authentication failed or denied during login based on log timestamp, user, host, session ID and message.

User Agent Details - List

A list of user agent details such as which browser is being used, what version and on which operating system based on log timestamp, user agent, device name, device ID, session ID and message.

Top 10 User vs SessionID

The top ten users assigned a session ID by a server to identify and track user activity.

Top 10 DeviceID vs SessionID

The top ten device ID associated with a device from which a user sends a browsing request to the web server and a session ID that allows those users to be identified on a website and assigned to their session.

Top 10 User that Doesn't Exist

The top ten users whose account may have been permanently deleted because of inactivity. As a result, those users do not exist. A registered user list should be made for this dashboard to work correctly. REGISTERED_USERS should contain all registered users.

Top 10 Successful User Authentication

The top ten successful user authentication by F5 load balancer that verified a user's session ID allowing them access to an online service or connected device.

Successful vs Failed User Authentication

The count of user authentication that is failed, denied or successful.

Session Details - List

A list of session details provides a holistic view of the performance metrics of the selected session based on log timestamp, device ID, event category, session ID, user agent and message. It helps the administrator correlate available bandwidth's and network latency's impact on session score.

Number of Unique External Devices

The number of user agents identified as unique external devices.

Top 10 Distinct DeviceID per User Agent

The top ten distinct device ID in the user agent gives information about the actual device. It allows the administrator to identify browsers and devices.

Time Trend Count

A count on the dynamic view of F5 load balancer that can help forecast future threats.

File Access Error

The error occurred when a file access session request does not meet the configured access policy item for server-side or client-side checks. The administrator can review the access policy configuration and the affected user device.

LP_BIGIP ASM Dashboard

The LP_BIGIP ASM dashboard provides real-time insights into web application security events across your environment, showing patterns in attack types, geographic attack distribution, security policy violations, and malware detection. It helps you identify attack sources, track threat trends, monitor security policy effectiveness, and investigate web application vulnerabilities.

Dashboard Widgets:

Widget Name
Description

Trend of Attack

The trend of web application's threat types such as web scraping, web injection, brute force and JSON web threats counted hourly.

Top 10 Attacks Based on Geolocation

Entails web application attacks such as path traversal and local file inclusion analyzed through its countrywide geolocation. It allows the administrator to identify where threats originate.

Top Attacking Countries

The top web application attack traffic based on countries from where particular applications are hosted on a web server.

Trend of Attack Distribution by Country

The trend of attack distribution to disrupt the normal traffic of a targeted server, service or network by overwhelming the target with a flood of Internet traffic based on countries counted hourly.

Top 10 Attack

The top ten web attacks based on attack occurrence or severity of attacks on a web application and its components.

Top 10 Attack Information

The top ten attack information such as attack types or processes based on log timestamp, host, source address, threat type, source country code, policy, event category, subcategory, domain, malware and violation.

Top 10 Source Address

The top ten source IP address of the host that sent the packets of malicious data to overwhelm computer servers with web application attacks. It allows the administrator to treat certain source IP addresses specifically for a security policy.

Top 10 Destination Address

The top ten destination IP address to which the packets of malicious data were sent.

Top 10 Security Policy by Event Category

The top ten security policies such as automatic or manual security policy created as per the event category to block malicious traffic like traffic that is not compliant with HTTP protocol, has malformed payloads, uses evasion techniques, performs web scraping, contains sensitive information or illegal values.

Top 10 Malware Detected

The top ten malware such as trojan, worms or ransomware that exploits target system vulnerabilities, such as a bug in legitimate web application plug-in that can be hijacked detected by BIG-IP Application Security Manager.

Top 10 Action on Client Request

The top ten actions performed on the target device on a client request.

LP_F5 Load Balancer v11_4_1 Dashboard

The LP_F5 Load Balancer v11_4_1 dashboard provides real-time insights into load balancing operations, traffic distribution, and HTTP transaction processing across your environment. It helps you monitor client connections, track server performance, analyze content types, investigate error responses, and optimize traffic routing.

Dashboard Widgets:

Widget
Description

Client Connection Details

Entails successful or failed connection attempts made by the client based on object, client address, virtual address, server address and status.

Traffic Details

The traffic details on the amount of data packets moving across a computer network at any given time based on server address, host, user agent, content type, request method and status_code.

Top 10 LB Servers

The top ten load balancer (LB) server used to distribute network traffic across multiple servers and route users to available resources freeing up busy sites and servers.

Top 10 Virtual Hosts

The top ten virtual hosts providing reachability to destinations when the server is in the inside network and the clients are in the outside network. It allows the administrator to host multiple websites (each with their name and content) on a single server.

Top 10 Content Types

The top ten content types that drive web traffic back to your site.

Top 10 User Agents

The top ten user agents such as web browsers, media players or plug-ins to identify and handle requests from certain types of the traffic requesting online content.

Top 10 Errors from Client

The top ten errors occurred on the client (or user) side of a client-server system, such as a web application based on host, user agent and status code.

Top 10 Error from Server

The top ten errors on the server side based on host, user agent and status code, caused by any number of things from uploading the incorrect file to a bug in a piece of code.

Top 10 Redirect Requests

The top ten redirect requests to forward traffic from one URL to another. The redirection is triggered by a server sending a special redirect response to a request.

Top 10 Successful Requests

The top ten successful requests with status code 2, which denotes the browser has received the expected information.

Top Transaction Details

Entails interaction between a client, usually a web browser and server.

Adding BIG-IP Dashboards

  1. Navigate to Settings >> Knowledge Base >> Dashboard.

  2. Select VENDOR DASHBOARD from the dropdown.

  3. Click the Use icon under Actions of the required dashboard.

  4. Click Choose Repos.

  5. Select the repository configured for BIG-IP logs and click Done.

  6. In Ask Repos, select the dashboard and click Ok.

The dashboard will appear under Dashboards. You can view details about each widget by clicking the Info icon.

Last updated

Was this helpful?