<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381494#M46403</link>
    <description>&lt;P&gt;Hi walterk82 and thank you for your answer.&lt;BR /&gt;
I try to explain, I think there's another issue, in TA default/eventtypes.conf 61-62 lines there's configured:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[f5_bigip_apm_username_received]
search = sourcetype="f5:bigip:apm:syslog" ": Username"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;above stanza recall authentication dataset action in default/tags.conf 117-123 lines:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eventtype=f5_bigip_apm_username_received]
network = enabled
communicate  = enabled
session = enabled
authentication = enabled
default = enabled
web = enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;so when I try to searching for &lt;STRONG&gt;tag=authentication&lt;/STRONG&gt; the action field was populated in "&lt;STRONG&gt;Access policy result:&lt;/STRONG&gt;" rows only, not in "&lt;STRONG&gt;Username&lt;/STRONG&gt;" rows with field values "&lt;STRONG&gt;success&lt;/STRONG&gt;" or "&lt;STRONG&gt;failure&lt;/STRONG&gt;" that are CIM expected values for Authentication datasets for populate Splunk ITSI or Splunk ES Premium Apps.&lt;/P&gt;

&lt;P&gt;May know a temporary workaround to put in the TA local/props.conf for extract Username success or failure action as expected?&lt;BR /&gt;
Thank you in advance for any help.&lt;/P&gt;</description>
    <pubDate>Mon, 12 Nov 2018 15:51:40 GMT</pubDate>
    <dc:creator>morganfw</dc:creator>
    <dc:date>2018-11-12T15:51:40Z</dc:date>
    <item>
      <title>Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381492#M46401</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;
I've installed &lt;STRONG&gt;Splunk Add-on for F5 BIG-IP v2.6.0&lt;/STRONG&gt; and &lt;STRONG&gt;Splunk Common Information Model (CIM) v4.12.0&lt;/STRONG&gt; on &lt;STRONG&gt;Splunk Enterprise 6.6.3&lt;/STRONG&gt; when I try to search authentication logs for apm (F5 VPN)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="f5" sourcetype="f5:bigip:apm:syslog" tag=authentication
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;authentication actions field reports &lt;STRONG&gt;allowed&lt;/STRONG&gt; or &lt;STRONG&gt;blocked&lt;/STRONG&gt; on Access Policy logs only (not in Username logs), instead of &lt;STRONG&gt;success&lt;/STRONG&gt; or &lt;STRONG&gt;failure&lt;/STRONG&gt; that CIM authentication dataset documentation reports.&lt;/P&gt;

&lt;P&gt;Below log example&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice tmm1[15435]: 01490500:5: /Common/ap_web_auth:Common:85157209: New session from client IP 1.23.45.67 (ST=WA/CC=US/C=US) at VIP 192.168.131.172 Listener /Common/ap_web_auth_vs (Reputation=Unknown)
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice tmm1[15435]: 01490506:5: /Common/ap_web_auth:Common:85157209: Received User-Agent header: Mozilla%2f4.0%20(compatible%3b%20MSIE%208.0%3b%20Windows%20NT%206.1%3b%20WOW64%3b%20Trident%2f4.0%3b%20SLCC2%3b%20.NET%20CLR%202.0.50727%3b%20.NET%20CLR%203.5.30729%3b%20.NET%20CLR%203.0.30729%3b%20Media%20Center%20PC%206.0).
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice tmm3[15435]: 01490500:5: /Common/Network_Access_02:Common:8c6be305: New session from client IP 1.23.45.67 (ST=WA/CC=US/C=US) at VIP 192.168.131.174 Listener /Common/Network_Access_02_vs (Reputation=Unknown)
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice tmm3[15435]: 01490506:5: /Common/Network_Access_02:Common:8c6be305: Received User-Agent header: Mozilla%2f4.0%20(compatible%3b%20MSIE%208.0%3b%20Windows%20NT%206.1%3b%20WOW64%3b%20Trident%2f4.0%3b%20SLCC2%3b%20.NET%20CLR%202.0.50727%3b%20.NET%20CLR%203.5.30729%3b%20.NET%20CLR%203.0.30729%3b%20Media%20Center%20PC%206.0).
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice apmd[11023]: 01490248:5: /Common/Network_Access_02:Common:8c6be305: Received client info - Hostname:  Type: IE Version: 8 Platform: Win7 CPU: WOW64 UI Mode: Full Javascript Support: 1 ActiveX Support: 1 Plugin Support: 0
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice apmd[11023]: 01490102:5: /Common/Network_Access_02:Common:8c6be305: Access policy result: Full
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice apmd[11023]: 01490005:5: /Common/Network_Access_02:Common:8c6be305: Following rule 'fallback' from item 'Resource Assign' to ending 'Allow'
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice apmd[11023]: 01490128:5: /Common/Network_Access_02:Common:8c6be305: Webtop '/Common/Network_Access_02_webtop' assigned
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice apmd[11023]: 01490008:5: /Common/Network_Access_02:Common:8c6be305: Connectivity resource '/Common/Network_Access_02_na_res' assigned
Nov 9 12:37:05 x.x.x.x Nov 9 12:37:05 ##hostname## notice apmd[11023]: 01490010:5: /Common/Network_Access_02:Common:8c6be305: Username 'uuu'
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Anyone experienced same issue?&lt;BR /&gt;
Thank you in advanced for any help.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Nov 2018 22:05:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381492#M46401</guid>
      <dc:creator>morganfw</dc:creator>
      <dc:date>2018-11-09T22:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381493#M46402</link>
      <description>&lt;P&gt;Looking in the TA default/props.conf line 381&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EVAL-action = if(isnull(access_policy_result), null, if(access_policy_result="Logon_Deny","blocked","allowed"))
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Looks like it should default to "allowed" unless the deny action is reached.&lt;/P&gt;

&lt;P&gt;I would raise a support case to Splunk as this is a bug -&amp;gt; &lt;A href="http://docs.splunk.com/Documentation/CIM/4.12.0/User/Authentication"&gt;http://docs.splunk.com/Documentation/CIM/4.12.0/User/Authentication&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 13:55:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381493#M46402</guid>
      <dc:creator>walterk82</dc:creator>
      <dc:date>2018-11-12T13:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381494#M46403</link>
      <description>&lt;P&gt;Hi walterk82 and thank you for your answer.&lt;BR /&gt;
I try to explain, I think there's another issue, in TA default/eventtypes.conf 61-62 lines there's configured:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[f5_bigip_apm_username_received]
search = sourcetype="f5:bigip:apm:syslog" ": Username"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;above stanza recall authentication dataset action in default/tags.conf 117-123 lines:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eventtype=f5_bigip_apm_username_received]
network = enabled
communicate  = enabled
session = enabled
authentication = enabled
default = enabled
web = enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;so when I try to searching for &lt;STRONG&gt;tag=authentication&lt;/STRONG&gt; the action field was populated in "&lt;STRONG&gt;Access policy result:&lt;/STRONG&gt;" rows only, not in "&lt;STRONG&gt;Username&lt;/STRONG&gt;" rows with field values "&lt;STRONG&gt;success&lt;/STRONG&gt;" or "&lt;STRONG&gt;failure&lt;/STRONG&gt;" that are CIM expected values for Authentication datasets for populate Splunk ITSI or Splunk ES Premium Apps.&lt;/P&gt;

&lt;P&gt;May know a temporary workaround to put in the TA local/props.conf for extract Username success or failure action as expected?&lt;BR /&gt;
Thank you in advance for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 15:51:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381494#M46403</guid>
      <dc:creator>morganfw</dc:creator>
      <dc:date>2018-11-12T15:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381495#M46404</link>
      <description>&lt;P&gt;I don't know that much about ITSI or ES and CIM to answer that question.  Either way this is a supported TA.  Please ask support.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 15:58:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381495#M46404</guid>
      <dc:creator>walterk82</dc:creator>
      <dc:date>2018-11-12T15:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381496#M46405</link>
      <description>&lt;P&gt;Thank you for answer.&lt;BR /&gt;
I'll submit a case to Splunk Support.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 16:18:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381496#M46405</guid>
      <dc:creator>morganfw</dc:creator>
      <dc:date>2018-11-12T16:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for F5 BIG-IP v2.6.0 CIM authentication action</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381497#M46406</link>
      <description>&lt;P&gt;Thanks, please let me know the outcome.  There look to be errors in the AFM and ASM modules as well.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 18:35:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-F5-BIG-IP-v2-6-0-CIM-authentication-action/m-p/381497#M46406</guid>
      <dc:creator>walterk82</dc:creator>
      <dc:date>2018-11-12T18:35:38Z</dc:date>
    </item>
  </channel>
</rss>

