Configure Data Intelligence
Distributed Cloud Data Intelligence processes log data collected by F5 Distributed Cloud Services and uses it to equip security and fraud prevention teams with comprehensive insights into user behavior, device identification, and network data. This enables the early detection of anomalies indicative of potential security threats and fraudulent activities.
Integrate Data Intelligence with your SIEM solution or Fraud Orchestration tools and use the log data processed by Data Intelligence along with additional context and signals from your other data sources to build better rules and models and to improve the quality of data and decisions.
Data Intelligence can send log information to the following data collection systems:
- AWS S3
- Splunk
- Datadog
- Azure Blob Storage
- GCP Buckets
- HTTPS
Configure Data Intelligence Data Delivery
Depending on the edition of Bot Defense that you have, there are two ways to configure Data Intelligence Data Delivery:
-
If you have Bot Defense Standard Edition, follow the instructions in the sections below to enable and configure Data Intelligence Data Delivery. To get started, see the prerequisites.
-
If you have Bot Defense Advanced Edition, you can contact your assigned Technical Account Manager for assistance enabling and configuring Data Intelligence Data Delivery. Your Technical Account Manager can perform most of the configuration process for you and guide you on how to get started with Data Intelligence Data Delivery.
You can also optionally decide to configure Data Intelligence Data Delivery yourself. To get started yourself, see the prerequisites.
Prerequisites
- You must have a valid Distributed Cloud Console account. If you do not have a valid account, see Create a Distributed Cloud Console Account.
- You must have an
Organization
plan. To see plan information, from the Distributed Cloud ConsoleHome
page, clickBilling
. - You must have an externally available data collection system.
- You must add the following IP addresses to the allow list on your firewall:
- 35.247.100.206
- 34.168.102.111
- 34.168.48.1
- 34.82.248.13
- 35.230.48.185
- 35.203.143.95
Enable Data Intelligence
To use Data Intelligence, you must first enable it in the Distributed Cloud Console.
- On the Distributed Cloud Console
Home
page, clickBilling
. - Click
Manage > Billing Plan
and scroll to theOrganization Plan
. - Under the
Organization Plan
, clickData Intelligence
. The Data Intelligence landing page appears.Note: If Data Intelligence is already enabled, the
Data Receivers
page appears, and you can begin using Data Intelligence. - From the Data Intelligence landing page, click
Request Service
.
Add a Data Receiver
Configure a data receiver to connect Distribute Cloud Services to your externally accessible data collection system.
- Log on to Data Intelligence in the Distributed Cloud Console.
- Click Manage > Data Delivery and then click Add Receiver.
- Add a
Name
to identify the new data receiver and optionally add aDescription
. - From the
Data Set
drop-down menu, select the data set you want to send to your data collection system. - From the
Receiver Configuration
drop-down menu, select the data collection system to which you want to send data. - To finish configuring your data receiver, see one of the following sections:
Important: When you configure your data receiver, for better security, F5 recommends that you select
Blindfolded Secret
instead ofClear Secret
so that Data Intelligence does not have access to your password.
Configure an AWS S3 Receiver
-
Complete the steps in Add a Data Receiver.
-
In the
S3 Bucket Name
field, enter the exact name of the AWS S3 bucket where you want to send log data. -
From the
AWS Cloud Credentials
drop-down list, select the cloud credentials you want Distributed Cloud Services to use to access the AWS S3 bucketIf you need to add new credentials, from the
AWS Cloud Credentials
drop-down list, clickAdd Item
. For information about adding credentials, see Cloud Credentials.Note: You must select credentials that are the AWS Programmatic Access Credentials type.
In the
AWS Region
drop-down list, select the region where you configured your S3 storage bucket.Figure: Configure an AWS S3 Receiver
-
To save your AWS S3 receiver, click
Save & Continue
.
Configure a Splunk Receiver
-
Complete the steps in Add a Data Receiver.
-
In the
Data Delivery
section, in theSplunk HEC Logs Endpoint
field, enter the name of the Splunk HTTP Event Collector (HEC) that you want use to send log data to your Splunk deployment.Figure: Configure a Splunk Receiver
-
In the
Splunk HEC token
section, clickConfigure
. Distributed Cloud Services uses an HEC token to authenticate with the HEC. -
From the
Secret Type
drop-down list, select one of the following options:-
Clear Secret
: Enter the password you want to use. If you selectClear Secret
, F5 strongly recommends that you use Base64 format. -
Blindfolded Secret
(recommended): From theAction
drop-down list, select one of the following options:Use Existing Blindfolded Secret
: Enter theBlindfolded Secret
.Blindfold New Secret
:- From the
Policy Type
drop-down list, selectBuilt-in
. - In the
Secret to Blindfold
field, enter your Splunk HEC token.
- From the
Figure: Configure a Splunk HEC Token
-
-
Click
Apply
. -
To save your Splunk receiver, click
Save & Continue
.
Configure a Datadog Receiver
-
Complete the steps in Add a Data Receiver.
-
In the
Data Delivery
section, from theEndpoint Selection
drop-down list, selectDatadog Site
. -
In the
Datadog Site
field, enter the URL for DataDog,datadoghq.com
.Figure: Datadog Image
-
To configure the
Datadog API key
, clickConfigure
. -
From the Secret Type drop-down list, select one of the following options:
Clear Secret
: Enter the password you want to use. If you selectClear Secret
, F5 strongly recommends that you use Base64 format.Blindfolded Secret
(recommended): From theAction
drop-down menu, select one of the following options:-
Use Existing Blindfolded Secret
: Enter theBlindfolded Secret
. -
Blindfold New Secret
:- From the
Policy Type
drop-down menu, selectBuilt-in
. - In the
Secret to Blindfold
field, enter your Datadog API Key.
Figure: Datadog Image
- From the
-
Note: To obtain your Datadog API key, go to https://app.datadoghq.com/organization-settings/api-keys. For more information, see Datadog documentation: https://docs.datadoghq.com/account_management/api-app-keys/#add-an-api-key-or-client-token.
-
Click
Apply
. -
To save your Datadog receiver, click
Save and Exit
.
Configure an Azure Blob Storage Receiver
Important: Before you begin, make sure you have access to your Azure Blob connection string. You need the connection string during the receiver configuration process. See your Azure documentation for information about how to obtain the Azure Blob connection string.
-
Complete the steps in Add a Data Receiver.
-
In the
Azure Blob Connection String
section, clickConfigure
.Figure: Configure an Azure Blob Receiver
-
From the
Secret Type
drop-down menu, select one of the following options:Clear Secret
: Enter the password you want to use. If you selectClear Secret
, F5 strongly recommends that you use Base64 format.Blindfolded Secret
(recommended): From theAction
drop-down menu, select one of the following options:Use Existing Blindfolded Secret
: Enter theBlindfolded Secret
.Blindfold New Secret
:- From the
Policy Type
drop-down menu, selectBuilt-in
. - In the
Secret to Blindfold
field, enter your Azure Blob connection string and then clickApply
.
- From the
-
In the
Container Name
field, enter the name of the Azure container where the logs should be stored. -
To save your Azure Blob storage receiver, click
Save and Exit
.
Configure a GCP Bucket Receiver
-
Complete the steps in Add a Data Receiver.
Figure: Configure a GCP Bucket Receiver
-
In the
GCP Bucket Name
field, enter the name of the GCP bucket where you want to send log data. -
From the
GCP Cloud Credentials
drop-down menu, select an existing set of credentials that Data Intelligence can use to access the GCP bucket.To add new cloud credential, select
Add Item
. For information, see GCP Credentials. -
To save your GCP bucket receiver, click
Save and Exit
.
Configure an HTTPS Receiver
- Complete the steps in Add a Data Receiver.
- In the
Data Delivery
section, in theHTTP URI
field, enter the URI for the HTTPS receiver. For example, enter,https://your_receiver_uri.com
. - From the
Authentication
drop-down list, select how you want to authenticate to the HTTPS endpoint. Select one of the following options:- None: Select this if no authentication is required.
- Basic Authentication:
- In the
User Name
field, enter the user name you use to connect to the HTTPS endpoint. - In the
Password
section, clickConfigure
. - From the
Secret Type
menu, select one of the following options:Clear Secret
: Enter the password for the HTTPS endpoint. If you selectClear Secret
, F5 strongly recommends that you use Base64 format.Blindfolded Secret
(recommended): From theAction
drop-down menu, select one of the following options:Use Existing Blindfolded Secret
: Enter theBlindfolded Secret
.Blindfold New Secret
:- From the
Policy Type
drop-down menu, selectBuilt-in
. - In the
Secret to Blindfold
field, enter the password for the HTTP endpoint.
- From the
- In the
- Token Authentication:
- In the
Token
section, clickConfigure
. - From the
Secret Type
menu, select one of the following options:Clear Secret
: Enter the password for the HTTPS endpoint. If you selectClear Secret
, F5 strongly recommends that you use Base64 format.Blindfolded Secret
(recommended): From theAction
drop-down menu, select one of the following options:Use Existing Blindfolded Secret
: Enter theBlindfolded Secret
.Blindfold New Secret
:- From the
Policy Type
drop-down menu, selectBuilt-in
. - In the
Secret to Blindfold
field, enter your authentication token.
- From the
- In the
- Click
Apply
. - To save your HTTPS receiver, click
Save and Exit
.
Configure Advanced Options
Advanced settings include optional settings to enable compression and to configure batch options.
Enable Compression
Enabling compression reduces the size of the log data files delivered from Data Intelligence and can help reduce your data storage costs.
- Click
Manage > Data Delivery > Add Receiver
. - In the
Data Delivery
section, enable theShow Advanced Fields
toggle. - To enable compression, from the
Compression Type
drop-down menu, selectgzip
. - When finished, click
Save and Exit
.
Configure Batch Options
Batch options allow you to apply limits such as maximum number of messages, bytes or timeout. When you configure a limit, Data Intelligence sends log data to the receiver only when the system detects that a configured limit has been reached.
- Click
Manage > Data Delivery > Add Receiver
. - In the
Data Delivery
section, enable theShow Advanced Fields
toggle. - To configure the maximum age of a batch before it is sent to a data receiver, from the
Batch Timeout Options
drop-down menu, selectTimeout Seconds
and then enter the number ofTimeout Seconds
. - To configure the maximum number of log messages that can be added to a batch before it is sent to a data receiver, from the
Batch Max Events
drop-down menu, selectMax Events
and then enter aMax Events
value between32
and100000
. - To configure the maximum byte size of a batch before it is sent to a data receiver, from the
Batch Bytes
drop-down menu, selectMax Bytes
and then enter a value between4096
and104857600
. Logs are sent after the batch is size is equal to or more than the specified byte size. - When finished, click
Save and Exit
.
Configure TLS
To encrypt the data sent from Data Intelligence to your Splunk, Datadog or HTTPS data receiver, you can enable TLS.
- Click
Manage > Data Delivery > Add Receiver
. - In the
Data Delivery
section for your data receiver, enableShow Advanced Fields
. - To enable TLS, from the
TLS
drop-down menu, selectUse TLS
. - The following options are enabled by default. You can disable them as necessary.
Perform Server Certificate Verification
Enable Server Hostname Verification
- To upload a server CA certificate, select
Server CA Certificates
and then paste or upload the certificate (.pem
,.cer
, or.crt
). - To optionally
Enable mTLS
, perform the following steps:- From the
mTLS
drop-down menu, selectEnable mTLS
. - Paste the contents of your
Client Certificate
(PEM or Base64). - In the
Client Private Key
section, select one of the following options:Clear Secret
: Paste theSecret
you want to use. If you selectClear Secret
, F5 strongly recommends that you use Base64 format.Blindfolded Secret
(recommended): Select one of the following options:Use Existing Blindfolded Secret
: Enter theBlindfolded Secret
.Blindfold New Secret
: From thePolicy Type
drop-down menu, selectBuilt-in
and then paste theSecret to Blindfold
.
- From the
- When finished, click
Save and Exit
.
Manage Data Receivers
Perform the following steps to manage, enable or disable, or delete existing data receivers.
Note: To add a new data receiver, see Add a Data Receiver.
- From the Data Intelligence navigation menu, click
Manage > Data Delivery
. - From the list of configured data receivers, in the
Actions
column, click the Action menu (…) next to the data receiver you want to manage and then click one of the following options:Manage
: Update data receiver configuration settings. For information about specific settings, see the following sections:Disable
: Temporarily disable the data receiver that connects the Distributed Cloud Service to your data collection system. This prevents the Distributed Cloud Service from sending data to your data collection systemEnable
: Re-enable a data receiver that you previously disabled. This allows the Distributed Cloud Service to resume sending data to your data collection systemDelete
: Permanently disable and remove a configured data receiver. This cannot be undone.
View the Data Dictionary
The Data Intelligence data dictionary provides information to help you understand the log data that Data Intelligence sends to your data collection system.
To view the information contained in the data sets in the data dictionary, from the Data Intelligence navigation menu, click Manage > Data Dictionary
.
Click a data set to view the following details:
Feature name
Description
Data Type
To subscribe to a data set, contact F5 Support.
On this page:
- Configure Data Intelligence Data Delivery
- Prerequisites
- Enable Data Intelligence
- Add a Data Receiver
- Configure an AWS S3 Receiver
- Configure a Splunk Receiver
- Configure a Datadog Receiver
- Configure an Azure Blob Storage Receiver
- Configure a GCP Bucket Receiver
- Configure an HTTPS Receiver
- Configure Advanced Options
- Manage Data Receivers
- View the Data Dictionary