Applies To:
Show Versions
BIG-IQ Security
- 4.5.0
About event logs
Viewing the event logs with BIG-IQ Web Application Security makes browsing of system event logs easier, and provides a way to obtain useful insights regarding the activity on applications and/or servers. It also enables the viewing of logs from multiple BIG-IP devices.
You can also view logs through the BIG-IP system interface. However, the BIG-IP system interface shows logs for one BIG-IP device only, and the current presentation has many nested views and complex filters. Thus, it is difficult to obtain a complete picture. The presentation on Web Application Security provides a single view of all the filters, log entries, and details for each entry. This provides a more intuitive navigation path through the log items.
To determine which events are logged, you must set up a logging profile on the BIG-IP system. The logging profile directs the security events to a BIG-IQ Logging Node, and the BIG-IQ system retrieves them from that node.
About installing the BIG-IQ Logging Node
A BIG-IQ Logging Node (also known as an ASM Logging Node) is a specially-provisioned BIG-IQ system, running the same software build as the BIG-IQ device where you manage your security policies. One or more BIG-IP systems send their logging events to a Logging Node, and the BIG-IQ system can retrieve logging events from one or more Logging Nodes.
To install a BIG-IQ Logging Node, you provision a standard BIG-IQ system as a Logging Node (by allowing a particular service on a self IP port and expanding the size of the file system that holds log files), and then upgrade the Logging Node Software to the same build that is running on its BIG-IQ partner.
Provisioning the Logging Node
About upgrading the Logging Node to the BIG-IQ build
This product ships with a software build that was current at the time of the software release. Typically, a later build is available. The build on the Logging Node must be the same as the build on its partner BIG-IQ system. If you need to upgrade the Logging Node, follow the instructions in Upgrading BIG-IQ Systems.
Configuring the logging profile
Adding the logging profile to a virtual server
Discovering a Logging Node from BIG-IQ Security
About the event logs interface
The Event Logs system interface consists of two filtering fields and three main panes:
- Filtering fields:
- Selected devices list. A horizontal list below the Event Logs heading, where you select one or more devices for event viewing.
- Filter field. A horizontal field, below the Event Logs heading to the right of the selected devices field, where you can provide text to rapidly narrow the search scope.
- Panes:
- Devices panel. At the far left, used for selecting a group of events, policies, saved filters, or pre-configured tags. This specifies the set of items in the next pane.
- Log items list. Using this pane, you can browse log items, or select one to view
details on. Each log item displays:
- URL
- Source IP address
- Response code
- Date and time
- Severity: Informational, Critical, Error
- Status
- Details pane. This pane displays details of the item selected in the Log items pane.
You can view:
- Raw HTTP[S] request
- Geolocation details
- Policy details (by clicking the expand triangle to the right of the policy name)
- General request details (by clicking the triangle to the right of the URL)
- Related tags
Using common filters
- Log in to BIG-IQ Security.
- Click Web Application Security, and then click Event Logs.
- In the Devices panel, click any sub-item under Requests or Policies.
Filtering (basic)
Filtering (advanced)
Filtering by entering query parameters
policy_name:/Common/policy1'