

本文参考如下链接完成
1. https://my.f5.com/manage/s/article/K00847516
2. https://my.f5.com/manage/s/article/K73554344
3. https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/bigip-external-monitoring-implementations-13-0-0/2.html
4. https://www.cnblogs.com/JetpropelledSnake/p/10564448.html
5. https://www.cnblogs.com/JetpropelledSnake/p/10550778.html

(图片点击放大查看)

(图片点击放大查看)
例如vs_logging_to_graylog

(图片点击放大查看)

(图片点击放大查看)
模板内容为
{ "client_ip":"{X-Forwarded-For}","date":"VIRTUAL_IP","virtual_port":"VIRTUAL_NAME","virtual_pool_name":"SERVER_IP","server_port":"HTTP_PATH","http_request":"HTTP_STATCODE","response_size":"RESPONSE_MSECS","referer":"
上面的这个变量参考Request logging parameters变量表,添加你需要的参数
我这边构造成json格式,方便Graylog进行JSON日志解析

(图片点击放大查看)

(图片点击放大查看)

(图片点击放大查看)

(图片点击放大查看)
针对访问IP的访问日志,可以结合安全威胁情报(例如微步)或者内部态势感知等等安全告警 判断是否封锁攻击IP 可以联动防火墙进行封锁
可以结合F5的iRules拦截攻击IP
步骤如下
例如BlockListIP_DataGroup

(图片点击放大查看)
例如
when FLOW_INIT { if { [class match [IP::remote_addr] equals BlockListIP_DataGroup]} { log local0. "Attacker IP [IP::client_addr]" drop } }


这样就只用在Data Group List添加攻击IP黑名单即可进行拦截
本文分享自 WalkingCloud 微信公众号,前往查看
如有侵权,请联系 cloudcommunity@tencent.com 删除。
本文参与 腾讯云自媒体同步曝光计划 ,欢迎热爱写作的你一起参与!