I am really struggling with this one. I am retiring a Splunk instance and trying to duplicate a very critical dashboard for our operations team. The dashboard displays logs from BIGIP/F5 APM module. These logs are primarily VPN authentication. I need to group usernames with sessions on a single screen.
Unfortunately, all of the logs for a session do not contain the username. So, I run the query below to join logs by session_id and can quickly get a dashboard that neatly displays the username, session, and associated logs.
sourcetype="f5:bigip:apm:syslog" | transaction session_id | stats values(_raw) as log count by user, session_id
This is proving to be a nearly impossible task within Qradar. Perhaps one of you have worked this out already? I've been looking at transactional queries in Qradar, but it is much more complex and it doesn't produce the same clean results.
select sessionId,DATEFORMAT(starttime,'YYYY-MM-dd HH:mm:ss') start_time,username,sourceip,category from events into <cursor_name> where username='joe_blogs' SESSION BY starttime username, sourceip BEGIN category=16001 END category=16003 start '2016-11-25 16:00' stop '2016-11-25 23:30'
------------------------------
Mike
------------------------------