Vendor - F5
Product - BigIP
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/2680/ | 
| Product Manual | unknown | 
Sourcetypes
| sourcetype | notes | 
| f5:bigip:syslog | None | 
| f5:bigip:irule | None | 
| f5:bigip:ltm:http:irule | None | 
| f5:bigip:gtm:dns:request:irule | None | 
| f5:bigip:gtm:dns:response:irule | None | 
| f5:bigip:ltm:failed:irule | None | 
| f5:bigip:asm:syslog | None | 
| nix:syslog | None | 
| f5:bigip:ltm:access_json | User defined configuration via irule producing a RFC5424 syslog event with json content within the message field <111>1 2020-05-28T22:48:15Z foo.example.com F5 - access_json - {"event_type":"HTTP_REQUEST", "src_ip":"10.66.98.41"}This source type requires a customer specific Splunk Add-on for utility value | 
Index Configuration
| key | index | notes | 
| f5_bigip | netops | none | 
| f5_bigip_irule | netops | none | 
| f5_bigip_asm | netwaf | none | 
| f5_bigip_nix | netops | if f_f5_bigipis not set the index osnix will be used | 
| f5_bigip_access_json | netops | none | 
Filter type
- MSGPARSE: sourcetypes with the exception of f5:bigip:syslog
- f5:bigip:syslogMust be identified by host or ip assignment. Update the- vendor_product_by_source.conffilter- f_f5_bigipor configure a dedicated port as required
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used,
- the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration.
Options
| Variable | default | description | 
| SC4S_LISTEN_F5_BIGIP_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_F5_BIGIP_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_F5_BIGIP | no | Enable archive to disk for this specific source | 
| SC4S_DEST_F5_BIGIP_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
An active device will generate frequent events. Use the following search to validate events are present per source device
index=<asconfigured> sourcetype=f5:bigip:*| stats count by host