Technical Forum
Ask questions. Discover Answers.
cancel
Showing results for 
Search instead for 
Did you mean: 

Bot Log is not showing in BIG-IQ

Emon_423837
Altocumulus
Altocumulus

Hi, I am Emon and I am new member at f5 world.

I am using BIG-IP 15.1.8.2 and BIG-IQ 8.3.0 (CM and DCD). The Big-IQ is not showing the bot log as seen in the BIG-IP (ASM/WAF) itself. BIG-IP box's Event Log all bot request is seen but biq iq bot request option show empty (image attached).

M2.png

This type graph is seen but exact bot log request not seen.

Emon_0-1685819641260.png

 

I configure remote log publisher Remote High Speed Log within Splunk. I also select Local Publisher and Remote pubisher at a time.

More Info: BIG-IP and IQ connected through management ip. ASM/WAF log showing fine but Bot Request Log not showing.

Can you explain what happend that's why bot request log not showing. Please give me proper instruction how can I configure BIG-IP and IQ.

 

Thanks.

 

Best Regards,
Emon Hossain
2 ACCEPTED SOLUTIONS

Hi @Emon_423837  ,

 

For Sending Security Logs yo BIG-IQ

1. Add BIG-IP to the BIG-IQ CM

2. Enable Web Application Security in BIG-IQ DCD

3. Configuration of the Security Log profile

4. Attach the log profile to the protected Virtual Servr

5. Monitoring Profiles from BIG-IQ

 

Can you please share the BOT Logging profile details.

 

Actually, the BIG-IQ DCD has a listening service in the 8514 port then we have to configure a log profile in the BIG-IP device to send events to the 8514 port.

Once it is configured, there will be security events in the BIG-IQ Central Management (CM) device, thus, we can already watch these logs for troubleshooting and applications visibility from BIG-IQ CM.

 

For more details could you plese check the link as follows:

https://techdocs.f5.com/en-us/bigiq-8-0-0/managing-bot-defense-using-big-iq/log-bot-defense-req-over...

Have you 

Activate ASM Web Application Security events logging service for one or more BIG-IQ Data Collection Devices (DCD)

https://my.f5.com/manage/s/article/K51005651

 

Creating a DCD Pool

 

Define this pool in Log Destination

System >> Logs: Configuration : Log Destinations

System >> Logs: Configuration : Log Destinations

Now create one log destination for Splunk and here forward the destination to the previously created log destination

System >> Logs: Configuration : Log Destinations

Now check if you got 2 log destinations:

System >> Logs: Configuration : Log Destinations

Now create one log Publisher:

System >> Logs: Configuration :Log Publisher >> Log_pub_DCD

 

Can you check your logging profie and see if Bot protection is selected:

 

 

Select all the request log options of your choice

 

 

 

 

Save the logging profile

 

 

Attach/Assign this logging profile to the required Virtual Sever:

I am suspecting you may have missed this step, in case else check all the steps once again using the help of the screenshots I attached here:

 

After that hopefuy you can also see the logs in the Bot 

Hi  ,For Sending Security Logs yo BIG-IQ

1. Add BIG-IP to the BIG-IQ CM

2. Enable Web Application Security in BIG-IQ DCD

3. Configuration of the Security Log profile

4. Attach the log profile to the protected Virtual Servr

5. Monitoring Profiles from BIG-IQ

 

Can you please share the BOT Logging profile details.

 

Actually, the BIG-IQ DCD has a listening service in the 8514 port then we have to configure a log profile in the BIG-IP device to send events to the 8514 port.

Once it is configured, there will be security events in the BIG-IQ Central Management (CM) device, thus, we can already watch these logs for troubleshooting and applications visibility from BIG-IQ CM.

 

For more details could you plese check the link as follows:

https://techdocs.f5.com/en-us/bigiq-8-0-0/managing-bot-defense-using-big-iq/log-bot-defense-req-over...

Have you 

Activate ASM Web Application Security events logging service for one or more BIG-IQ Data Collection Devices (DCD)

https://my.f5.com/manage/s/article/K51005651

F5_Design_Engineer_24-1685849948103.png

 

Creating a DCD Pool , do not forget to metion the service port as 8514

F5_Design_Engineer_1-1685845017189.png

F5_Design_Engineer_2-1685845044585.png

Define this pool in Log Destination

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_3-1685845087182.png

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_4-1685845128270.png

 

Now create one log destination for Splunk and here forward the destination to the previously created log destination

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_5-1685845269482.png

 

Now check if you got 2 log destinations:

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_6-1685845341392.png

 

 

Now create one log Publisher:

System >> Logs: Configuration :Log Publisher >> Log_pub_DCD

F5_Design_Engineer_7-1685845538728.png

F5_Design_Engineer_8-1685845583361.png

Can you check your logging profie and see if Bot protection is selected:

F5_Design_Engineer_9-1685845657653.png

F5_Design_Engineer_10-1685845695931.png

F5_Design_Engineer_11-1685845734165.png

Select all the request log options of your choice

 

F5_Design_Engineer_12-1685845750991.png

 

 

Save the logging profile

F5_Design_Engineer_13-1685845774388.png

 

Attach/Assign this logging profile to the required Virtual Sever:

F5_Design_Engineer_14-1685845817497.png

I am suspecting you may have missed this step, in case else check all the steps once again using the help of the screenshots I attached here:

 

After that hopefuy you can also see the logs in the Bot 

F5_Design_Engineer_16-1685846449823.png

 

Click o any log to see its details:

 

F5_Design_Engineer_17-1685846674091.png

Bot Traffic Dashboard

F5_Design_Engineer_18-1685846946518.png

Bot Traffic By Class

F5_Design_Engineer_19-1685846985794.png

 

Bot Traffic By Status

F5_Design_Engineer_20-1685847032277.png

 

Bot Traffic By Mitigation

F5_Design_Engineer_21-1685847060764.png

 

Bot Traffic Analytics

F5_Design_Engineer_22-1685847090012.png

Layer 7 Security Dashboard

F5_Design_Engineer_23-1685847109364.png

HTH

F5 Design Engineer

INDIA

Please reach out ot me on whatsapp if you still need more assistance for quick response i will paste my comments in DevCentral.

My Whatsapp +91-9902595681

 

View solution in original post

Hi @F5_Design_Engineer,

Thanks for given me your valuable time.

One Correction:

  • You must add Splunk type log destination on log publisher, Not High Speed Log Destination. When I add HSLD profile on log publisher. Log publisher was invisible on logging profile.

Emon_0-1686023213828.png

Emon_1-1686023561576.png

One more info: Our network desing was wrong. We want to reach out BIG-IP to DCD through management interface that was the problem. Because F5 Big-ip traffic not in or out through management port.

Before :

Emon_2-1686023933924.png

After:

Emon_3-1686024286555.png

 

Best Regards,
Md. Emon Hossain

 

 

Best Regards,
Emon Hossain

View solution in original post

5 REPLIES 5

Hi @Emon_423837  ,

 

For Sending Security Logs yo BIG-IQ

1. Add BIG-IP to the BIG-IQ CM

2. Enable Web Application Security in BIG-IQ DCD

3. Configuration of the Security Log profile

4. Attach the log profile to the protected Virtual Servr

5. Monitoring Profiles from BIG-IQ

 

Can you please share the BOT Logging profile details.

 

Actually, the BIG-IQ DCD has a listening service in the 8514 port then we have to configure a log profile in the BIG-IP device to send events to the 8514 port.

Once it is configured, there will be security events in the BIG-IQ Central Management (CM) device, thus, we can already watch these logs for troubleshooting and applications visibility from BIG-IQ CM.

 

For more details could you plese check the link as follows:

https://techdocs.f5.com/en-us/bigiq-8-0-0/managing-bot-defense-using-big-iq/log-bot-defense-req-over...

Have you 

Activate ASM Web Application Security events logging service for one or more BIG-IQ Data Collection Devices (DCD)

https://my.f5.com/manage/s/article/K51005651

 

Creating a DCD Pool

 

Define this pool in Log Destination

System >> Logs: Configuration : Log Destinations

System >> Logs: Configuration : Log Destinations

Now create one log destination for Splunk and here forward the destination to the previously created log destination

System >> Logs: Configuration : Log Destinations

Now check if you got 2 log destinations:

System >> Logs: Configuration : Log Destinations

Now create one log Publisher:

System >> Logs: Configuration :Log Publisher >> Log_pub_DCD

 

Can you check your logging profie and see if Bot protection is selected:

 

 

Select all the request log options of your choice

 

 

 

 

Save the logging profile

 

 

Attach/Assign this logging profile to the required Virtual Sever:

I am suspecting you may have missed this step, in case else check all the steps once again using the help of the screenshots I attached here:

 

After that hopefuy you can also see the logs in the Bot 

Hi  ,For Sending Security Logs yo BIG-IQ

1. Add BIG-IP to the BIG-IQ CM

2. Enable Web Application Security in BIG-IQ DCD

3. Configuration of the Security Log profile

4. Attach the log profile to the protected Virtual Servr

5. Monitoring Profiles from BIG-IQ

 

Can you please share the BOT Logging profile details.

 

Actually, the BIG-IQ DCD has a listening service in the 8514 port then we have to configure a log profile in the BIG-IP device to send events to the 8514 port.

Once it is configured, there will be security events in the BIG-IQ Central Management (CM) device, thus, we can already watch these logs for troubleshooting and applications visibility from BIG-IQ CM.

 

For more details could you plese check the link as follows:

https://techdocs.f5.com/en-us/bigiq-8-0-0/managing-bot-defense-using-big-iq/log-bot-defense-req-over...

Have you 

Activate ASM Web Application Security events logging service for one or more BIG-IQ Data Collection Devices (DCD)

https://my.f5.com/manage/s/article/K51005651

F5_Design_Engineer_24-1685849948103.png

 

Creating a DCD Pool , do not forget to metion the service port as 8514

F5_Design_Engineer_1-1685845017189.png

F5_Design_Engineer_2-1685845044585.png

Define this pool in Log Destination

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_3-1685845087182.png

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_4-1685845128270.png

 

Now create one log destination for Splunk and here forward the destination to the previously created log destination

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_5-1685845269482.png

 

Now check if you got 2 log destinations:

System >> Logs: Configuration : Log Destinations

F5_Design_Engineer_6-1685845341392.png

 

 

Now create one log Publisher:

System >> Logs: Configuration :Log Publisher >> Log_pub_DCD

F5_Design_Engineer_7-1685845538728.png

F5_Design_Engineer_8-1685845583361.png

Can you check your logging profie and see if Bot protection is selected:

F5_Design_Engineer_9-1685845657653.png

F5_Design_Engineer_10-1685845695931.png

F5_Design_Engineer_11-1685845734165.png

Select all the request log options of your choice

 

F5_Design_Engineer_12-1685845750991.png

 

 

Save the logging profile

F5_Design_Engineer_13-1685845774388.png

 

Attach/Assign this logging profile to the required Virtual Sever:

F5_Design_Engineer_14-1685845817497.png

I am suspecting you may have missed this step, in case else check all the steps once again using the help of the screenshots I attached here:

 

After that hopefuy you can also see the logs in the Bot 

F5_Design_Engineer_16-1685846449823.png

 

Click o any log to see its details:

 

F5_Design_Engineer_17-1685846674091.png

Bot Traffic Dashboard

F5_Design_Engineer_18-1685846946518.png

Bot Traffic By Class

F5_Design_Engineer_19-1685846985794.png

 

Bot Traffic By Status

F5_Design_Engineer_20-1685847032277.png

 

Bot Traffic By Mitigation

F5_Design_Engineer_21-1685847060764.png

 

Bot Traffic Analytics

F5_Design_Engineer_22-1685847090012.png

Layer 7 Security Dashboard

F5_Design_Engineer_23-1685847109364.png

HTH

F5 Design Engineer

INDIA

Please reach out ot me on whatsapp if you still need more assistance for quick response i will paste my comments in DevCentral.

My Whatsapp +91-9902595681

 

Hi @F5_Design_Engineer,

Thanks for given me your valuable time.

One Correction:

  • You must add Splunk type log destination on log publisher, Not High Speed Log Destination. When I add HSLD profile on log publisher. Log publisher was invisible on logging profile.

Emon_0-1686023213828.png

Emon_1-1686023561576.png

One more info: Our network desing was wrong. We want to reach out BIG-IP to DCD through management interface that was the problem. Because F5 Big-ip traffic not in or out through management port.

Before :

Emon_2-1686023933924.png

After:

Emon_3-1686024286555.png

 

Best Regards,
Md. Emon Hossain

 

 

Best Regards,
Emon Hossain

Hi  @Emon_423837 , 

Control plane traffic can in and out from management interface as well based on you have to define a management route for that particual subnet like we do for normal routes. ou can give a try by adding MGMT route for DCD and see if it works. Based on my experience it hsould work as all our syslog servers for our hundresds of client we configure the SPLUNK or SYLOG reachablity thorugh MGMT interface by adding MGMT route insted of normal routes. MGMT routes cannot be created from GUI for that CLI is the only way. So give a try if not for this solution but it may be useful for other solutio in future.

K13284: Overview of management interface routing (11.x - 17.x)

Article Detail (f5.com)

https://my.f5.com/manage/s/article/K13284

Also thanks for the correction and thanks for acceping the solution. Highly appreciate it.

Best regards, F5 Design Engineer.

 

Hi @F5_Design_Engineer ,

Thanks you. I want to know one things,

Is it possible to any pool member (Pool_DCD) can send traffic over the management interface?

Because I think when I create a pool for send bot&dos log for the DCD listener ip, f5 on big ip for sent log as a data traffic.

Emon_0-1686218246426.png

(Attached image for visualize exact thing, what I want to say)

When i do this type of connectivity some log will see not all log.

Best Regards,

Emon Hossain

 

 

 

Best Regards,
Emon Hossain

Hi @Emon_423837 ,

Mixing control plane traffic and data plane traffic flwoing on same interfaces is not a good choice.

F5 strongly discourages you to configure a pool memeber or health monitor to send data plane traffic or probes using the management network because the management network is not intended for production traffic.

F5 recommends that the pool members/nodes reside on a network that is reachable through TMM interfaces so data plane trafic or health monitor probes are sent through TMM interfaces.

 

When configuring management traffic, you should consider the following factors:

  • F5 strongly discourages you to configure a health monitor to send probes using the management network because the management network is not intended for production traffic. F5 recommends that the pool members/nodes reside on a network that is reachable through TMM interfaces so health monitor probes are sent through TMM interfaces.
  • F5 recommends that you add static routes for management traffic whose destination does not match the directly-connected management network. This configuration is useful when you handle SNMP traffic that is directed to an SNMP Manager that resides on another network, which is accessible only through the management network or other network services that are hosted on networks that are not accessible through the TMM interfaces.
  • A Virtual Clustered Multiprocessing (vCMP) host administrator can reconfigure the default management gateway for a vCMP guest. The applied configuration takes precedence and overrides the value configured on the vCMP guest.

    Note: F5 recommends that you test any such changes during a maintenance window and consider the possible impact on your specific environment.

     

HTH

Best regards

F5 Design Engineer